Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1501462
MD5:10954d86b01d1f67f98a43858063b3dc
SHA1:66be87dba6cac60f3000e509041f7be25449359c
SHA256:20abc825e9a18eed4c4b188ef470d90282b880ea64e6252763d2ddee0aff4c7c
Tags:exe
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of debugger detection
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Maps a DLL or memory area into another process
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sleep loop found (likely to delay execution)
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 2436 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 10954D86B01D1F67F98A43858063B3DC)
    • msedge.exe (PID: 1548 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --kiosk --edge-kiosk-type=fullscreen --no-first-run --disable-features=TranslateUI --disable-popup-blocking --disable-extensions --no-default-browser-check --app=https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password MD5: BF154738460E4AB1D388970E1AB13FAB)
      • msedge.exe (PID: 1836 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=2092,i,14388813608333966908,189234157427795217,262144 --disable-features=TranslateUI /prefetch:3 MD5: BF154738460E4AB1D388970E1AB13FAB)
  • msedge.exe (PID: 5576 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --kiosk --edge-kiosk-type=fullscreen --no-first-run --disable-features=TranslateUI --disable-popup-blocking --disable-extensions --no-default-browser-check --app=https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate MD5: BF154738460E4AB1D388970E1AB13FAB)
    • msedge.exe (PID: 3268 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2080 --field-trial-handle=2000,i,3838580931908670159,11230650748107795701,262144 --disable-features=TranslateUI /prefetch:3 MD5: BF154738460E4AB1D388970E1AB13FAB)
    • msedge.exe (PID: 2244 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=7432 --field-trial-handle=2000,i,3838580931908670159,11230650748107795701,262144 --disable-features=TranslateUI /prefetch:8 MD5: BF154738460E4AB1D388970E1AB13FAB)
    • msedge.exe (PID: 616 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=6324 --field-trial-handle=2000,i,3838580931908670159,11230650748107795701,262144 --disable-features=TranslateUI /prefetch:8 MD5: BF154738460E4AB1D388970E1AB13FAB)
    • identity_helper.exe (PID: 7432 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.55\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=7292 --field-trial-handle=2000,i,3838580931908670159,11230650748107795701,262144 --disable-features=TranslateUI /prefetch:8 MD5: F8CEC3E43A6305AC9BA3700131594306)
    • identity_helper.exe (PID: 8188 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.55\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=7292 --field-trial-handle=2000,i,3838580931908670159,11230650748107795701,262144 --disable-features=TranslateUI /prefetch:8 MD5: F8CEC3E43A6305AC9BA3700131594306)
  • msedge.exe (PID: 8572 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5 MD5: BF154738460E4AB1D388970E1AB13FAB)
    • msedge.exe (PID: 8880 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=3512 --field-trial-handle=2312,i,17093364806606948359,8260213145340532299,262144 /prefetch:3 MD5: BF154738460E4AB1D388970E1AB13FAB)
    • msedge.exe (PID: 5768 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=4028 --field-trial-handle=2312,i,17093364806606948359,8260213145340532299,262144 /prefetch:8 MD5: BF154738460E4AB1D388970E1AB13FAB)
  • msedge.exe (PID: 8656 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5 MD5: BF154738460E4AB1D388970E1AB13FAB)
    • msedge.exe (PID: 9076 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=3344 --field-trial-handle=2584,i,13064354698451549742,8210782241735153549,262144 /prefetch:3 MD5: BF154738460E4AB1D388970E1AB13FAB)
    • msedge.exe (PID: 9044 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=1460 --field-trial-handle=2584,i,13064354698451549742,8210782241735153549,262144 /prefetch:8 MD5: BF154738460E4AB1D388970E1AB13FAB)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: file.exeReversingLabs: Detection: 21%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: file.exeJoe Sandbox ML: detected
Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:49710 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:49719 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:49720 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.6:49728 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.6:49734 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:49750 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.6:49753 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:49756 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:49758 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:49759 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:49760 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.6:57940 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:57944 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:57949 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:57951 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:57952 version: TLS 1.2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0014DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0014DBBE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0011C2A2 FindFirstFileExW,0_2_0011C2A2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001568EE FindFirstFileW,FindClose,0_2_001568EE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0015698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0015698F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0014D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0014D076
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0014D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0014D3A9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00159642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00159642
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0015979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0015979D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00159B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00159B2B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00155C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00155C97
Source: global trafficTCP traffic: 192.168.2.6:57938 -> 162.159.36.2:53
Source: Joe Sandbox ViewIP Address: 13.107.246.60 13.107.246.60
Source: Joe Sandbox ViewIP Address: 162.159.61.3 162.159.61.3
Source: Joe Sandbox ViewIP Address: 239.255.255.250 239.255.255.250
Source: Joe Sandbox ViewIP Address: 23.44.133.38 23.44.133.38
Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: global trafficHTTP traffic detected: GET /assets/arbitration_priority_list/4.0.5/asset?assetgroup=ArbitrationService HTTP/1.1Host: edgeassetservice.azureedge.netConnection: keep-aliveEdge-Asset-Group: ArbitrationServiceSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.55Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /assets/domains_config_gz/2.8.76/asset?assetgroup=EntityExtractionDomainsConfig HTTP/1.1Host: edgeassetservice.azureedge.netConnection: keep-aliveEdge-Asset-Group: EntityExtractionDomainsConfigSec-Mesh-Client-Edge-Version: 117.0.2045.55Sec-Mesh-Client-Edge-Channel: stableSec-Mesh-Client-OS: WindowsSec-Mesh-Client-OS-Version: 10.0.19045Sec-Mesh-Client-Arch: x86_64Sec-Mesh-Client-WebView: 0Sec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.55Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: OPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1Host: play.google.comConnection: keep-aliveAccept: */*Access-Control-Request-Method: POSTAccess-Control-Request-Headers: x-goog-authuserOrigin: https://accounts.google.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.55Sec-Fetch-Mode: corsSec-Fetch-Site: same-siteSec-Fetch-Dest: emptyReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9
Source: global trafficHTTP traffic detected: OPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1Host: play.google.comConnection: keep-aliveAccept: */*Access-Control-Request-Method: POSTAccess-Control-Request-Headers: x-goog-authuserOrigin: https://accounts.google.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.55Sec-Fetch-Mode: corsSec-Fetch-Site: same-siteSec-Fetch-Dest: emptyReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9
Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Host: www.google.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.55sec-ch-ua-arch: "x86"sec-ch-ua-full-version: "117.0.2045.55"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-full-version-list: "Microsoft Edge";v="117.0.2045.55", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.150"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9
Source: global trafficHTTP traffic detected: OPTIONS /api/report?cat=bingbusiness HTTP/1.1Host: bzib.nelreports.netConnection: keep-aliveOrigin: https://business.bing.comAccess-Control-Request-Method: POSTAccess-Control-Request-Headers: content-typeUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.55Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: POST /api/report?cat=bingbusiness HTTP/1.1Host: bzib.nelreports.netConnection: keep-aliveContent-Length: 465Content-Type: application/reports+jsonUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.55Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 142.251.35.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.251.35.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.251.35.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.251.35.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.251.35.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.251.35.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.164
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.164
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.164
Source: unknownTCP traffic detected without corresponding DNS query: 142.251.35.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.251.35.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.251.35.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.251.35.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.251.35.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.251.35.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.251.35.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.251.35.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.251.35.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.251.35.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.251.35.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.251.35.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.251.35.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.251.35.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.251.35.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.251.35.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.164
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0015CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_0015CE44
Source: global trafficHTTP traffic detected: GET /assets/arbitration_priority_list/4.0.5/asset?assetgroup=ArbitrationService HTTP/1.1Host: edgeassetservice.azureedge.netConnection: keep-aliveEdge-Asset-Group: ArbitrationServiceSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.55Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /assets/domains_config_gz/2.8.76/asset?assetgroup=EntityExtractionDomainsConfig HTTP/1.1Host: edgeassetservice.azureedge.netConnection: keep-aliveEdge-Asset-Group: EntityExtractionDomainsConfigSec-Mesh-Client-Edge-Version: 117.0.2045.55Sec-Mesh-Client-Edge-Channel: stableSec-Mesh-Client-OS: WindowsSec-Mesh-Client-OS-Version: 10.0.19045Sec-Mesh-Client-Arch: x86_64Sec-Mesh-Client-WebView: 0Sec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.55Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Host: www.google.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.55sec-ch-ua-arch: "x86"sec-ch-ua-full-version: "117.0.2045.55"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-full-version-list: "Microsoft Edge";v="117.0.2045.55", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.150"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9
Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=mEZEmrzEwgSy9mf&MD=4pmgEpFh HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: global trafficHTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=mEZEmrzEwgSy9mf&MD=4pmgEpFh HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: global trafficDNS traffic detected: DNS query: bzib.nelreports.net
Source: global trafficDNS traffic detected: DNS query: chrome.cloudflare-dns.com
Source: unknownHTTP traffic detected: POST /dns-query HTTP/1.1Host: chrome.cloudflare-dns.comConnection: keep-aliveContent-Length: 128Accept: application/dns-messageAccept-Language: *User-Agent: ChromeAccept-Encoding: identityContent-Type: application/dns-message
Source: file.exe, 00000000.00000002.3368721904.00000000009AF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3368721904.0000000000988000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.c
Source: data_10.6.drString found in binary or memory: https://arc.msn.com/v4/api/selection?placement=88000360&nct=1&fmt=json&ADEFAB=1&OPSYS=WIN10&locale=e
Source: data_10.6.drString found in binary or memory: https://azureedge.net
Source: Reporting and NEL0.6.drString found in binary or memory: https://bzib.nelreports.net/api/report?cat=bingbusiness
Source: Web Data.5.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
Source: Web Data.5.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
Source: Web Data.5.drString found in binary or memory: https://duckduckgo.com/ac/?q=
Source: Web Data.5.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
Source: Web Data.5.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
Source: data_10.6.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/arbitration_priority_list/4.0.5/asset?assetgroup=Arbit
Source: data_10.6.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/domains_config_gz/2.8.76/asset?assetgroup=EntityExtrac
Source: data_10.6.drString found in binary or memory: https://msn.com
Source: file.exe, 00000000.00000002.3368701394.0000000000890000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://myaccount.google.com/signinoptions/passwordC:
Source: Web Data.5.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
Source: Top Sites.5.drString found in binary or memory: https://www.office.com/
Source: Top Sites.5.drString found in binary or memory: https://www.office.com/Office
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 57940 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 57947 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 57952 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 57942 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 57946 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57949
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57948
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
Source: unknownNetwork traffic detected: HTTP traffic on port 57949 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57945
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57944
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57947
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57946
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57941
Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57940
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57942
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 57941 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 57945 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 57948 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57952
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57951
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 57944 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 57951 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:49710 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:49719 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:49720 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.6:49728 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.6:49734 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:49750 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.6:49753 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:49756 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:49758 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:49759 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:49760 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.6:57940 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:57944 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:57949 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:57951 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:57952 version: TLS 1.2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0015EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0015EAFF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0015ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0015ED6A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0015EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0015EAFF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0014AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_0014AA57
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00179576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00179576

System Summary

barindex
Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.
Source: file.exe, 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_641475df-4
Source: file.exe, 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_dd73704f-b
Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_838e81af-9
Source: file.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_a3b81234-a
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0014D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_0014D5EB
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00141201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00141201
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0014E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_0014E8F6
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001520460_2_00152046
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000E80600_2_000E8060
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001482980_2_00148298
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0011E4FF0_2_0011E4FF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0011676B0_2_0011676B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001748730_2_00174873
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0010CAA00_2_0010CAA0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000ECAF00_2_000ECAF0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000FCC390_2_000FCC39
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00116DD90_2_00116DD9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000FB1190_2_000FB119
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000E91C00_2_000E91C0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001013940_2_00101394
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0010781B0_2_0010781B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000E79200_2_000E7920
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000F997D0_2_000F997D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00107A4A0_2_00107A4A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00107CA70_2_00107CA7
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0016BE440_2_0016BE44
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00119EEE0_2_00119EEE
Source: C:\Users\user\Desktop\file.exeCode function: String function: 000E9CB3 appears 31 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00100A30 appears 46 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 000FF9F2 appears 40 times
Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: classification engineClassification label: mal72.evad.winEXE@75/309@12/11
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001537B5 GetLastError,FormatMessageW,0_2_001537B5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001410BF AdjustTokenPrivileges,CloseHandle,0_2_001410BF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001416C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_001416C3
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001551CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_001551CD
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0016A67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0016A67C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0015648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_0015648E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000E42A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_000E42A2
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeFile created: C:\Users\user\AppData\Local\Microsoft\Edge\User Data KioskJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeFile created: C:\Users\user\AppData\Local\Temp\33dd6559-4cbf-4f22-96a7-6e5301ff2e24.tmpJump to behavior
Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Login Data.5.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
Source: file.exeReversingLabs: Detection: 21%
Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --kiosk --edge-kiosk-type=fullscreen --no-first-run --disable-features=TranslateUI --disable-popup-blocking --disable-extensions --no-default-browser-check --app=https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=2092,i,14388813608333966908,189234157427795217,262144 --disable-features=TranslateUI /prefetch:3
Source: unknownProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --kiosk --edge-kiosk-type=fullscreen --no-first-run --disable-features=TranslateUI --disable-popup-blocking --disable-extensions --no-default-browser-check --app=https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2080 --field-trial-handle=2000,i,3838580931908670159,11230650748107795701,262144 --disable-features=TranslateUI /prefetch:3
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=7432 --field-trial-handle=2000,i,3838580931908670159,11230650748107795701,262144 --disable-features=TranslateUI /prefetch:8
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=6324 --field-trial-handle=2000,i,3838580931908670159,11230650748107795701,262144 --disable-features=TranslateUI /prefetch:8
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.55\identity_helper.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.55\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=7292 --field-trial-handle=2000,i,3838580931908670159,11230650748107795701,262144 --disable-features=TranslateUI /prefetch:8
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.55\identity_helper.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.55\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=7292 --field-trial-handle=2000,i,3838580931908670159,11230650748107795701,262144 --disable-features=TranslateUI /prefetch:8
Source: unknownProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=3512 --field-trial-handle=2312,i,17093364806606948359,8260213145340532299,262144 /prefetch:3
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=4028 --field-trial-handle=2312,i,17093364806606948359,8260213145340532299,262144 /prefetch:8
Source: unknownProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=3344 --field-trial-handle=2584,i,13064354698451549742,8210782241735153549,262144 /prefetch:3
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=1460 --field-trial-handle=2584,i,13064354698451549742,8210782241735153549,262144 /prefetch:8
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --kiosk --edge-kiosk-type=fullscreen --no-first-run --disable-features=TranslateUI --disable-popup-blocking --disable-extensions --no-default-browser-check --app=https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/passwordJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=2092,i,14388813608333966908,189234157427795217,262144 --disable-features=TranslateUI /prefetch:3Jump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2080 --field-trial-handle=2000,i,3838580931908670159,11230650748107795701,262144 --disable-features=TranslateUI /prefetch:3Jump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=7432 --field-trial-handle=2000,i,3838580931908670159,11230650748107795701,262144 --disable-features=TranslateUI /prefetch:8Jump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=6324 --field-trial-handle=2000,i,3838580931908670159,11230650748107795701,262144 --disable-features=TranslateUI /prefetch:8Jump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.55\identity_helper.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.55\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=7292 --field-trial-handle=2000,i,3838580931908670159,11230650748107795701,262144 --disable-features=TranslateUI /prefetch:8Jump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.55\identity_helper.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.55\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=7292 --field-trial-handle=2000,i,3838580931908670159,11230650748107795701,262144 --disable-features=TranslateUI /prefetch:8Jump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=3512 --field-trial-handle=2312,i,17093364806606948359,8260213145340532299,262144 /prefetch:3Jump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=4028 --field-trial-handle=2312,i,17093364806606948359,8260213145340532299,262144 /prefetch:8Jump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknown
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknown
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=3344 --field-trial-handle=2584,i,13064354698451549742,8210782241735153549,262144 /prefetch:3
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknown
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknown
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=1460 --field-trial-handle=2584,i,13064354698451549742,8210782241735153549,262144 /prefetch:8
Source: C:\Users\user\Desktop\file.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000E42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_000E42DE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00100A76 push ecx; ret 0_2_00100A89
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run MicrosoftEdgeAutoLaunch_514DE308F6F4B9B80A28CF3B7E19969FJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run MicrosoftEdgeAutoLaunch_514DE308F6F4B9B80A28CF3B7E19969FJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000FF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_000FF98E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00171C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00171C41
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\file.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-96967
Source: C:\Users\user\Desktop\file.exeWindow / User API: threadDelayed 6562Jump to behavior
Source: C:\Users\user\Desktop\file.exeAPI coverage: 3.2 %
Source: C:\Users\user\Desktop\file.exe TID: 2448Thread sleep time: -65620s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\file.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\file.exeThread sleep count: Count: 6562 delay: -10Jump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0014DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0014DBBE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0011C2A2 FindFirstFileExW,0_2_0011C2A2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001568EE FindFirstFileW,FindClose,0_2_001568EE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0015698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0015698F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0014D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0014D076
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0014D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0014D3A9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00159642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00159642
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0015979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0015979D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00159B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00159B2B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00155C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00155C97
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000E42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_000E42DE
Source: Web Data.16.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
Source: Web Data.16.drBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
Source: Web Data.16.drBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
Source: Web Data.16.drBinary or memory string: discord.comVMware20,11696487552f
Source: Web Data.16.drBinary or memory string: bankofamerica.comVMware20,11696487552x
Source: Web Data.16.drBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
Source: Web Data.16.drBinary or memory string: ms.portal.azure.comVMware20,11696487552
Source: Web Data.16.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
Source: Web Data.16.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
Source: Web Data.16.drBinary or memory string: global block list test formVMware20,11696487552
Source: Web Data.16.drBinary or memory string: tasks.office.comVMware20,11696487552o
Source: Web Data.16.drBinary or memory string: AMC password management pageVMware20,11696487552
Source: Web Data.16.drBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
Source: Web Data.16.drBinary or memory string: interactivebrokers.comVMware20,11696487552
Source: Web Data.16.drBinary or memory string: dev.azure.comVMware20,11696487552j
Source: Web Data.16.drBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
Source: Web Data.16.drBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
Source: Web Data.16.drBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
Source: Web Data.16.drBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
Source: Web Data.16.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
Source: Web Data.16.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
Source: Web Data.16.drBinary or memory string: outlook.office365.comVMware20,11696487552t
Source: Web Data.16.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
Source: Web Data.16.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
Source: Web Data.16.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
Source: Web Data.16.drBinary or memory string: outlook.office.comVMware20,11696487552s
Source: Web Data.16.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
Source: Web Data.16.drBinary or memory string: turbotax.intuit.comVMware20,11696487552t
Source: Web Data.16.drBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
Source: Web Data.16.drBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
Source: Web Data.16.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552

Anti Debugging

barindex
Source: C:\Users\user\Desktop\file.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_0-96711
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0015EAA2 BlockInput,0_2_0015EAA2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00112622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00112622
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000E42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_000E42DE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00104CE8 mov eax, dword ptr fs:[00000030h]0_2_00104CE8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00140B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00140B62
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00112622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00112622
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0010083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0010083F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001009D5 SetUnhandledExceptionFilter,0_2_001009D5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00100C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00100C21

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeSection loaded: NULL target: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.55\identity_helper.exe protection: readonlyJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00141201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00141201
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00122BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00122BA5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0014B226 SendInput,keybd_event,0_2_0014B226
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_001622DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_001622DA
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00140B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00140B62
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00141663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00141663
Source: file.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
Source: file.exeBinary or memory string: Shell_TrayWnd
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00100698 cpuid 0_2_00100698
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00158195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00158195
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0013D27A GetUserNameW,0_2_0013D27A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0011B952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_0011B952
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000E42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_000E42DE
Source: file.exeBinary or memory string: WIN_81
Source: file.exeBinary or memory string: WIN_XP
Source: file.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
Source: file.exeBinary or memory string: WIN_XPe
Source: file.exeBinary or memory string: WIN_VISTA
Source: file.exeBinary or memory string: WIN_7
Source: file.exeBinary or memory string: WIN_8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00161204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00161204
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00161806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00161806
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure2
Valid Accounts
1
Native API
1
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Disable or Modify Tools
21
Input Capture
2
System Time Discovery
Remote Services1
Archive Collected Data
2
Ingress Tool Transfer
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/Job2
Valid Accounts
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory1
Account Discovery
Remote Desktop Protocol21
Input Capture
11
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
Registry Run Keys / Startup Folder
2
Valid Accounts
2
Obfuscated Files or Information
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin Shares3
Clipboard Data
3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
Access Token Manipulation
1
DLL Side-Loading
NTDS15
System Information Discovery
Distributed Component Object ModelInput Capture14
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
Process Injection
1
Masquerading
LSA Secrets221
Security Software Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
Registry Run Keys / Startup Folder
2
Valid Accounts
Cached Domain Credentials22
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
Virtualization/Sandbox Evasion
DCSync2
Process Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
Access Token Manipulation
Proc Filesystem11
Application Window Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt12
Process Injection
/etc/passwd and /etc/shadow1
System Owner/User Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1501462 Sample: file.exe Startdate: 30/08/2024 Architecture: WINDOWS Score: 72 50 Multi AV Scanner detection for submitted file 2->50 52 Binary is likely a compiled AutoIt script file 2->52 54 Machine Learning detection for sample 2->54 56 AI detected suspicious sample 2->56 7 file.exe 2->7         started        10 msedge.exe 20 358 2->10         started        13 msedge.exe 11 51 2->13         started        15 msedge.exe 2->15         started        process3 dnsIp4 58 Binary is likely a compiled AutoIt script file 7->58 60 Found API chain indicative of debugger detection 7->60 62 Found API chain indicative of sandbox detection 7->62 17 msedge.exe 22 7->17         started        44 192.168.2.4 unknown unknown 10->44 46 192.168.2.6, 443, 49526, 49704 unknown unknown 10->46 48 239.255.255.250 unknown Reserved 10->48 64 Maps a DLL or memory area into another process 10->64 19 msedge.exe 37 10->19         started        22 msedge.exe 10->22         started        24 msedge.exe 10->24         started        34 2 other processes 10->34 26 msedge.exe 13->26         started        28 msedge.exe 13->28         started        30 msedge.exe 15->30         started        32 msedge.exe 15->32         started        signatures5 process6 dnsIp7 36 msedge.exe 17->36         started        38 s-part-0032.t-0009.t-msedge.net 13.107.246.60, 443, 49732, 49733 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 19->38 40 142.250.65.164, 443, 49749 GOOGLEUS United States 19->40 42 8 other IPs or domains 19->42 process8

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe21%ReversingLabs
file.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
https://bzib.nelreports.net/api/report?cat=bingbusiness0%URL Reputationsafe
https://duckduckgo.com/ac/?q=0%URL Reputationsafe
https://chrome.cloudflare-dns.com/dns-query0%URL Reputationsafe
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
https://www.office.com/0%Avira URL Cloudsafe
https://www.office.com/Office0%Avira URL Cloudsafe
https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
https://msn.com0%Avira URL Cloudsafe
https://www.google.com/favicon.ico0%Avira URL Cloudsafe
https://myaccount.google.com/signinoptions/passwordC:0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
chrome.cloudflare-dns.com
162.159.61.3
truefalse
    unknown
    s-part-0032.t-0009.t-msedge.net
    13.107.246.60
    truefalse
      unknown
      bzib.nelreports.net
      unknown
      unknownfalse
        unknown
        NameMaliciousAntivirus DetectionReputation
        https://bzib.nelreports.net/api/report?cat=bingbusinessfalse
        • URL Reputation: safe
        unknown
        https://chrome.cloudflare-dns.com/dns-queryfalse
        • URL Reputation: safe
        unknown
        https://www.google.com/favicon.icofalse
        • Avira URL Cloud: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        https://www.office.com/Top Sites.5.drfalse
        • Avira URL Cloud: safe
        unknown
        https://duckduckgo.com/chrome_newtabWeb Data.5.drfalse
        • URL Reputation: safe
        unknown
        https://duckduckgo.com/ac/?q=Web Data.5.drfalse
        • URL Reputation: safe
        unknown
        https://msn.comdata_10.6.drfalse
        • Avira URL Cloud: safe
        unknown
        https://www.google.com/images/branding/product/ico/googleg_lodp.icoWeb Data.5.drfalse
        • Avira URL Cloud: safe
        unknown
        https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchWeb Data.5.drfalse
        • URL Reputation: safe
        unknown
        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Web Data.5.drfalse
        • URL Reputation: safe
        unknown
        https://www.office.com/OfficeTop Sites.5.drfalse
        • Avira URL Cloud: safe
        unknown
        https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Web Data.5.drfalse
        • URL Reputation: safe
        unknown
        https://myaccount.google.com/signinoptions/passwordC:file.exe, 00000000.00000002.3368701394.0000000000890000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        142.251.179.84
        unknownUnited States
        15169GOOGLEUSfalse
        142.251.40.206
        unknownUnited States
        15169GOOGLEUSfalse
        13.107.246.60
        s-part-0032.t-0009.t-msedge.netUnited States
        8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
        162.159.61.3
        chrome.cloudflare-dns.comUnited States
        13335CLOUDFLARENETUSfalse
        239.255.255.250
        unknownReserved
        unknownunknownfalse
        23.44.133.38
        unknownUnited States
        20940AKAMAI-ASN1EUfalse
        142.250.65.164
        unknownUnited States
        15169GOOGLEUSfalse
        172.64.41.3
        unknownUnited States
        13335CLOUDFLARENETUSfalse
        142.251.35.174
        unknownUnited States
        15169GOOGLEUSfalse
        IP
        192.168.2.4
        192.168.2.6
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1501462
        Start date and time:2024-08-30 00:14:06 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 5m 45s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:23
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:file.exe
        Detection:MAL
        Classification:mal72.evad.winEXE@75/309@12/11
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 97%
        • Number of executed functions: 40
        • Number of non-executed functions: 308
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): dllhost.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 74.125.133.84, 13.107.42.16, 13.107.21.239, 204.79.197.239, 13.107.6.158, 2.19.126.152, 2.19.126.145, 142.250.186.131, 142.250.185.195, 2.23.209.185, 2.23.209.130, 2.23.209.133, 2.23.209.176, 2.23.209.140, 2.23.209.149, 2.23.209.179, 2.23.209.182, 2.23.209.187, 20.96.153.111, 192.229.221.95, 93.184.221.240, 142.251.40.195, 142.250.80.99, 142.250.65.163, 142.251.35.163, 142.250.80.67
        • Excluded domains from analysis (whitelisted): config.edge.skype.com.trafficmanager.net, slscr.update.microsoft.com, a416.dscd.akamai.net, edgeassetservice.afd.azureedge.net, arc.msn.com, e86303.dscx.akamaiedge.net, ocsp.digicert.com, www.bing.com.edgekey.net, config-edge-skype.l-0007.l-msedge.net, msedge.b.tlu.dl.delivery.mp.microsoft.com, arc.trafficmanager.net, www.gstatic.com, l-0007.l-msedge.net, config.edge.skype.com, iris-de-prod-azsc-v2-eus2.eastus2.cloudapp.azure.com, www.bing.com, edge-microsoft-com.dual-a-0036.a-msedge.net, client.wns.windows.com, fs.microsoft.com, accounts.google.com, bzib.nelreports.net.akamaized.net, fonts.gstatic.com, ctldl.windowsupdate.com, b-0005.b-msedge.net, www-www.bing.com.trafficmanager.net, edge.microsoft.com, business-bing-com.b-0005.b-msedge.net, fe3cr.delivery.mp.microsoft.com, l-0007.config.skype.com, 4.8.2.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.0.2.0.c.0.0.3.0.1.3.0.6.2.ip6.arpa, edgeassetservice.azureedge.net, azureedge-t-prod.trafficmanager.net, business.bing.com, dual-
        • Report size exceeded maximum capacity and may have missing behavior information.
        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
        • Report size getting too big, too many NtOpenFile calls found.
        • Report size getting too big, too many NtProtectVirtualMemory calls found.
        • Report size getting too big, too many NtWriteVirtualMemory calls found.
        • VT rate limit hit for: file.exe
        TimeTypeDescription
        00:15:05AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run MicrosoftEdgeAutoLaunch_514DE308F6F4B9B80A28CF3B7E19969F "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5
        00:15:13AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run MicrosoftEdgeAutoLaunch_514DE308F6F4B9B80A28CF3B7E19969F "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        162.159.61.3file.exeGet hashmaliciousUnknownBrowse
          file.exeGet hashmaliciousUnknownBrowse
            file.exeGet hashmaliciousUnknownBrowse
              file.exeGet hashmaliciousUnknownBrowse
                file.exeGet hashmaliciousUnknownBrowse
                  file.exeGet hashmaliciousUnknownBrowse
                    file.exeGet hashmaliciousUnknownBrowse
                      file.exeGet hashmaliciousUnknownBrowse
                        file.exeGet hashmaliciousUnknownBrowse
                          file.exeGet hashmaliciousUnknownBrowse
                            239.255.255.250https://claims-hadiah-dxna.t5t.my.id/Get hashmaliciousHTMLPhisherBrowse
                              http://baseprocoinlogen.gitbook.io/Get hashmaliciousUnknownBrowse
                                https://currentlyatt64578.weebly.com/Get hashmaliciousHTMLPhisherBrowse
                                  https://rvjhkwq945.weebly.com/Get hashmaliciousHTMLPhisherBrowse
                                    http://shaw-104552.weeblysite.com/Get hashmaliciousUnknownBrowse
                                      http://document-snowflake-569e.oh82qrts.workers.dev/Get hashmaliciousHTMLPhisherBrowse
                                        http://dhl-tracking-au.blogspot.tw/Get hashmaliciousUnknownBrowse
                                          https://daehwa.info/uploaded/file/71677108868.pdfGet hashmaliciousPDFPhishBrowse
                                            https://uaj.sa/api/aHR0cHM6Ly9nb29nbGUuY29t&sig=ZDUxNjU0ZTllNzZkYTAxNWE4OTNkZTAyM2ZkZDA1MGViMGIzY2UyOTU1MzY1NGMyNjFlOTExM2ZiMzA5MzdmMg&exp=MTcyNDIzOTUzMQGet hashmaliciousHTMLPhisherBrowse
                                              file.exeGet hashmaliciousUnknownBrowse
                                                23.44.133.38file.exeGet hashmaliciousUnknownBrowse
                                                  file.exeGet hashmaliciousUnknownBrowse
                                                    file.exeGet hashmaliciousUnknownBrowse
                                                      file.exeGet hashmaliciousUnknownBrowse
                                                        file.exeGet hashmaliciousUnknownBrowse
                                                          file.exeGet hashmaliciousUnknownBrowse
                                                            file.exeGet hashmaliciousUnknownBrowse
                                                              file.exeGet hashmaliciousUnknownBrowse
                                                                file.exeGet hashmaliciousUnknownBrowse
                                                                  13.107.246.60https://protect-us.mimecast.com/s/wFHoCqxrAnt7V914iZaD1vGet hashmaliciousUnknownBrowse
                                                                  • www.mimecast.com/Customers/Support/Contact-support/
                                                                  http://wellsfargo.dealogic.com/clientportal/Conferences/Registration/Form/368?menuItemId=5Get hashmaliciousUnknownBrowse
                                                                  • wellsfargo.dealogic.com/clientportal/Conferences/Registration/Form/368?menuItemId=5
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  chrome.cloudflare-dns.comfile.exeGet hashmaliciousUnknownBrowse
                                                                  • 172.64.41.3
                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                  • 162.159.61.3
                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                  • 172.64.41.3
                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                  • 172.64.41.3
                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                  • 162.159.61.3
                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                  • 172.64.41.3
                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                  • 172.64.41.3
                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                  • 172.64.41.3
                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                  • 162.159.61.3
                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                  • 162.159.61.3
                                                                  s-part-0032.t-0009.t-msedge.nethttps://uaj.sa/api/aHR0cHM6Ly9nb29nbGUuY29t&sig=ZDUxNjU0ZTllNzZkYTAxNWE4OTNkZTAyM2ZkZDA1MGViMGIzY2UyOTU1MzY1NGMyNjFlOTExM2ZiMzA5MzdmMg&exp=MTcyNDIzOTUzMQGet hashmaliciousHTMLPhisherBrowse
                                                                  • 13.107.246.60
                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                  • 13.107.246.60
                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                  • 13.107.246.60
                                                                  https://cvccworks-my.sharepoint.com/:o:/g/personal/tbrosseau_cvccworks_edu/Eq-UyPVcAplCp0EtULhG-vgBSBG-0YnvqRHIOFaj8gAVeA?e=0GtZle&c=E,1,DChFGbEapD80-9FdFFEzIgnps7b6noVGZQKGJYQxe5NZ1bO4xoHQSXTZoDZYFQom26YXPkpXr4g-Zcy6HwaX1DHyE-5Bk2WBwo9od82Z27DPdBWYzulyG2zvnA,,&typo=1Get hashmaliciousHTMLPhisherBrowse
                                                                  • 13.107.246.60
                                                                  Message-ID 08282024 110831 PM.pdfGet hashmaliciousHTMLPhisherBrowse
                                                                  • 13.107.246.60
                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                  • 13.107.246.60
                                                                  http://control.frilix.com/grace/fxc/aW5mby5jcmVkaXRldXJlbkBicmVkYS5ubA==Get hashmaliciousHTMLPhisherBrowse
                                                                  • 13.107.246.60
                                                                  https://set.page/cdtautomotive/Get hashmaliciousUnknownBrowse
                                                                  • 13.107.246.60
                                                                  PO 710467.xlam.xlsxGet hashmaliciousUnknownBrowse
                                                                  • 13.107.246.60
                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                  • 13.107.246.60
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  CLOUDFLARENETUShttps://claims-hadiah-dxna.t5t.my.id/Get hashmaliciousHTMLPhisherBrowse
                                                                  • 172.67.167.190
                                                                  http://baseprocoinlogen.gitbook.io/Get hashmaliciousUnknownBrowse
                                                                  • 104.16.117.116
                                                                  http://shaw-104552.weeblysite.com/Get hashmaliciousUnknownBrowse
                                                                  • 104.18.86.42
                                                                  http://document-snowflake-569e.oh82qrts.workers.dev/Get hashmaliciousHTMLPhisherBrowse
                                                                  • 172.67.207.133
                                                                  https://daehwa.info/uploaded/file/71677108868.pdfGet hashmaliciousPDFPhishBrowse
                                                                  • 172.67.170.19
                                                                  Loader.exeGet hashmaliciousLummaCBrowse
                                                                  • 188.114.97.3
                                                                  cJX8BV8LYG.exeGet hashmaliciousAzorultBrowse
                                                                  • 172.67.128.117
                                                                  If doesnt work open it.exeGet hashmaliciousLummaCBrowse
                                                                  • 172.67.177.157
                                                                  https://uaj.sa/api/aHR0cHM6Ly9nb29nbGUuY29t&sig=ZDUxNjU0ZTllNzZkYTAxNWE4OTNkZTAyM2ZkZDA1MGViMGIzY2UyOTU1MzY1NGMyNjFlOTExM2ZiMzA5MzdmMg&exp=MTcyNDIzOTUzMQGet hashmaliciousHTMLPhisherBrowse
                                                                  • 1.1.1.1
                                                                  file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                  • 188.114.96.3
                                                                  AKAMAI-ASN1EUhttps://daehwa.info/uploaded/file/71677108868.pdfGet hashmaliciousPDFPhishBrowse
                                                                  • 172.232.31.180
                                                                  https://uaj.sa/api/aHR0cHM6Ly9nb29nbGUuY29t&sig=ZDUxNjU0ZTllNzZkYTAxNWE4OTNkZTAyM2ZkZDA1MGViMGIzY2UyOTU1MzY1NGMyNjFlOTExM2ZiMzA5MzdmMg&exp=MTcyNDIzOTUzMQGet hashmaliciousHTMLPhisherBrowse
                                                                  • 2.16.238.149
                                                                  https://hkwyolaw.ency.cloud/Get hashmaliciousHTMLPhisherBrowse
                                                                  • 172.233.123.231
                                                                  file.exeGet hashmaliciousVidarBrowse
                                                                  • 23.197.127.21
                                                                  https://cvccworks-my.sharepoint.com/:o:/g/personal/tbrosseau_cvccworks_edu/Eq-UyPVcAplCp0EtULhG-vgBSBG-0YnvqRHIOFaj8gAVeA?e=0GtZle&c=E,1,DChFGbEapD80-9FdFFEzIgnps7b6noVGZQKGJYQxe5NZ1bO4xoHQSXTZoDZYFQom26YXPkpXr4g-Zcy6HwaX1DHyE-5Bk2WBwo9od82Z27DPdBWYzulyG2zvnA,,&typo=1Get hashmaliciousHTMLPhisherBrowse
                                                                  • 2.16.164.49
                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                  • 23.44.133.38
                                                                  http://www.water-filter.comGet hashmaliciousHTMLPhisherBrowse
                                                                  • 23.67.131.235
                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                  • 23.219.161.132
                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                  • 23.44.133.57
                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                  • 23.200.0.9
                                                                  CLOUDFLARENETUShttps://claims-hadiah-dxna.t5t.my.id/Get hashmaliciousHTMLPhisherBrowse
                                                                  • 172.67.167.190
                                                                  http://baseprocoinlogen.gitbook.io/Get hashmaliciousUnknownBrowse
                                                                  • 104.16.117.116
                                                                  http://shaw-104552.weeblysite.com/Get hashmaliciousUnknownBrowse
                                                                  • 104.18.86.42
                                                                  http://document-snowflake-569e.oh82qrts.workers.dev/Get hashmaliciousHTMLPhisherBrowse
                                                                  • 172.67.207.133
                                                                  https://daehwa.info/uploaded/file/71677108868.pdfGet hashmaliciousPDFPhishBrowse
                                                                  • 172.67.170.19
                                                                  Loader.exeGet hashmaliciousLummaCBrowse
                                                                  • 188.114.97.3
                                                                  cJX8BV8LYG.exeGet hashmaliciousAzorultBrowse
                                                                  • 172.67.128.117
                                                                  If doesnt work open it.exeGet hashmaliciousLummaCBrowse
                                                                  • 172.67.177.157
                                                                  https://uaj.sa/api/aHR0cHM6Ly9nb29nbGUuY29t&sig=ZDUxNjU0ZTllNzZkYTAxNWE4OTNkZTAyM2ZkZDA1MGViMGIzY2UyOTU1MzY1NGMyNjFlOTExM2ZiMzA5MzdmMg&exp=MTcyNDIzOTUzMQGet hashmaliciousHTMLPhisherBrowse
                                                                  • 1.1.1.1
                                                                  file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                  • 188.114.96.3
                                                                  MICROSOFT-CORP-MSN-AS-BLOCKUShttp://shaw-104552.weeblysite.com/Get hashmaliciousUnknownBrowse
                                                                  • 150.171.28.10
                                                                  https://uaj.sa/api/aHR0cHM6Ly9nb29nbGUuY29t&sig=ZDUxNjU0ZTllNzZkYTAxNWE4OTNkZTAyM2ZkZDA1MGViMGIzY2UyOTU1MzY1NGMyNjFlOTExM2ZiMzA5MzdmMg&exp=MTcyNDIzOTUzMQGet hashmaliciousHTMLPhisherBrowse
                                                                  • 20.190.160.20
                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                  • 13.107.246.60
                                                                  https://autode.sk/4g6XSl8&c=E,1,I0OgoTIAL6zcaU4kgbWKwMGE3oDCv6iOL9CcUXdPtaitrRYDaY2yqyg5z3Y_ue3psEsBTb_33PlDmEStP6z69HizNf2ISciGwmDuh9q-ApyQjjb2ectuilD2Rn0,&typo=1Get hashmaliciousUnknownBrowse
                                                                  • 150.171.28.10
                                                                  Izvod racuna u prilogu.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                                                  • 13.107.137.11
                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                  • 13.107.246.60
                                                                  Stacey Opted PYMT Tokyo electron limited.docxGet hashmaliciousEvilProxy, HTMLPhisherBrowse
                                                                  • 52.109.28.46
                                                                  66cf818156193_ldjfnsfd.exeGet hashmaliciousLummaCBrowse
                                                                  • 20.189.173.22
                                                                  http://my.manychat.com/Get hashmaliciousUnknownBrowse
                                                                  • 13.107.246.57
                                                                  https://cvccworks-my.sharepoint.com/:o:/g/personal/tbrosseau_cvccworks_edu/Eq-UyPVcAplCp0EtULhG-vgBSBG-0YnvqRHIOFaj8gAVeA?e=0GtZle&c=E,1,DChFGbEapD80-9FdFFEzIgnps7b6noVGZQKGJYQxe5NZ1bO4xoHQSXTZoDZYFQom26YXPkpXr4g-Zcy6HwaX1DHyE-5Bk2WBwo9od82Z27DPdBWYzulyG2zvnA,,&typo=1Get hashmaliciousHTMLPhisherBrowse
                                                                  • 51.105.71.136
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  28a2c9bd18a11de089ef85a160da29e4https://claims-hadiah-dxna.t5t.my.id/Get hashmaliciousHTMLPhisherBrowse
                                                                  • 40.127.169.103
                                                                  • 184.28.90.27
                                                                  • 20.114.59.183
                                                                  http://baseprocoinlogen.gitbook.io/Get hashmaliciousUnknownBrowse
                                                                  • 40.127.169.103
                                                                  • 184.28.90.27
                                                                  • 20.114.59.183
                                                                  https://currentlyatt64578.weebly.com/Get hashmaliciousHTMLPhisherBrowse
                                                                  • 40.127.169.103
                                                                  • 184.28.90.27
                                                                  • 20.114.59.183
                                                                  https://rvjhkwq945.weebly.com/Get hashmaliciousHTMLPhisherBrowse
                                                                  • 40.127.169.103
                                                                  • 184.28.90.27
                                                                  • 20.114.59.183
                                                                  http://shaw-104552.weeblysite.com/Get hashmaliciousUnknownBrowse
                                                                  • 40.127.169.103
                                                                  • 184.28.90.27
                                                                  • 20.114.59.183
                                                                  http://document-snowflake-569e.oh82qrts.workers.dev/Get hashmaliciousHTMLPhisherBrowse
                                                                  • 40.127.169.103
                                                                  • 184.28.90.27
                                                                  • 20.114.59.183
                                                                  http://dhl-tracking-au.blogspot.tw/Get hashmaliciousUnknownBrowse
                                                                  • 40.127.169.103
                                                                  • 184.28.90.27
                                                                  • 20.114.59.183
                                                                  https://daehwa.info/uploaded/file/71677108868.pdfGet hashmaliciousPDFPhishBrowse
                                                                  • 40.127.169.103
                                                                  • 184.28.90.27
                                                                  • 20.114.59.183
                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                  • 40.127.169.103
                                                                  • 184.28.90.27
                                                                  • 20.114.59.183
                                                                  https://5kirp.mellifluous5.com/5kiRp/Get hashmaliciousHTMLPhisherBrowse
                                                                  • 40.127.169.103
                                                                  • 184.28.90.27
                                                                  • 20.114.59.183
                                                                  3b5074b1b5d032e5620f69f9f700ff0ehttp://dhl-tracking-au.blogspot.tw/Get hashmaliciousUnknownBrowse
                                                                  • 40.113.110.67
                                                                  rPEDIDO.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • 40.113.110.67
                                                                  rNuevoPedidoPO-00843.pdf.com.exeGet hashmaliciousQuasarBrowse
                                                                  • 40.113.110.67
                                                                  MT TBA VESSELPARTICULARS_PDF.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • 40.113.110.67
                                                                  DTR Image_capture 27082024 JPEG FILE.exeGet hashmaliciousFormBookBrowse
                                                                  • 40.113.110.67
                                                                  file.exeGet hashmaliciousUnknownBrowse
                                                                  • 40.113.110.67
                                                                  Invoice.wsfGet hashmaliciousAsyncRAT, PureLog StealerBrowse
                                                                  • 40.113.110.67
                                                                  SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeGet hashmaliciousUnknownBrowse
                                                                  • 40.113.110.67
                                                                  SecuriteInfo.com.Win64.DropperX-gen.8867.28776.exeGet hashmaliciousUnknownBrowse
                                                                  • 40.113.110.67
                                                                  http://getquckbulck.topGet hashmaliciousUnknownBrowse
                                                                  • 40.113.110.67
                                                                  No context
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):20958
                                                                  Entropy (8bit):6.064763871065312
                                                                  Encrypted:false
                                                                  SSDEEP:384:wtMGQ7LBjuYXGIgtDAW5u0TDJ2q03X8NBSujO5p4cE+Mh0lkdHd5qq:wMGQ7FCYXGIgtDAWtJ4n9p4ckh02tdJ
                                                                  MD5:8BC9B964CCEB88995DE2D290175D4A7C
                                                                  SHA1:57A541E25B260D29C5303C9A4DE43316E767B488
                                                                  SHA-256:C44B60EB70A838F19C7839EC2C9EFD70CAF31480DC9FAA1AAB2641573FB47FF3
                                                                  SHA-512:1E8AA77EC671BE300E5A5516C0EFBD57E1CDD9FD6F9169F8A7ED6BC5D317FCD2DC7D7D085FD86364472C2B27E60EA1135A3A2F888442DFE6D5B0FB633BA5B6E4
                                                                  Malicious:false
                                                                  Preview:{"abusive_adblocker_etag":"\"5E25271B8190D943537AD3FDB50874FC133E8B4A00380E2A6A888D63386F728B\"","apps_count_check_time":"13369443297876732","domain_actions_config":"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
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):2957
                                                                  Entropy (8bit):5.577312710399502
                                                                  Encrypted:false
                                                                  SSDEEP:48:YuBqDPEFMsFiHC0af4V4OjDK+3QemkHB+13drxhvBkoVRRpLOJkXscXwlRJfNNFs:Xq8NkC1f4SOjm+3rZBc9fvCopKJkccMw
                                                                  MD5:74B4DAD1681800703100E6DF4EA05823
                                                                  SHA1:FA6586E5F0B41DBCB04893F0B7E9F2195C38B193
                                                                  SHA-256:8C1458652B839820B18F78D3660AC2BDA6BBB1BF10B66B23B76BC1B153F62174
                                                                  SHA-512:CEF4B7EE738A372C98862AF2DFFF03A680FB683CCE5E22EEDFF35E9E8F478F0C3B7B06C725D3868A99E99325EBB9B38C0F459F47CDEF4D765CC6E523F2D52C4A
                                                                  Malicious:false
                                                                  Preview:{"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false},"tab_stabs":{"closed_without_unfreeze_never_unfrozen":0,"closed_without_unfreeze_previously_unfrozen":0,"discard_without_unfreeze_never_unfrozen":0,"discard_without_unfreeze_previously_unfrozen":0},"tab_stats":{"frozen_daily":0,"unfrozen_daily":0}},"hardware_acceleration_mode_previous":true,"legacy":{"profile":{"name":{"migrated":true}}},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAACil8ci2iRiRbc/M6tnn7Y/EAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAABGd/X1X+IFVGYzzRRY1edL4H9bG+nyLnECwMmdCzgtdgAAAAAOgAAAAAIAACAAAAClBbgibr9cptpL1vmpa1Q8rCjIEnM5NvEjhoWQicFzODAAAABGWrmYfaH1aGfTR/5m8YaNIaNuTIcY+e2mHFUDKbPg85zCIsvRrEhMW/nTOk+/9xRAAAAAmXLbfixgDAKcs4en34Xgn/dqHCR87fpe4wcmeVl01V7s+/EGFfVOE6S2xOU8mcmP4d9gt/wWm9UMIoztIn70HA=="},"policy":{"last_statistics_update":"13369443295810376"},"profile":{"info_ca
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):4233
                                                                  Entropy (8bit):5.48882368160279
                                                                  Encrypted:false
                                                                  SSDEEP:96:0q8NkGS1f4SOjm+3r58rh/cI9URoDotoaABc9fvCb41JkccJSDS4S4SDS+e4a:/8NBSKSZjeoDU+l47kcZ
                                                                  MD5:EB76479731FA6A830733609702CCF52A
                                                                  SHA1:D46041C9E3AD926DC956F485D76299F7FD86F2C5
                                                                  SHA-256:E9331FC9B2AD0EB6FCBB1E9AEB3FFA360EFB84C6A4D569839FC6CC24504FB9DD
                                                                  SHA-512:94D0235B23357ED3E6E69735A9599F69AF92F5989BAA29A6B567D2E670BADBE6635C8F08181BE7604EDF34B76D8589AF74505D24870D7BE8F61A3C2A2C34D526
                                                                  Malicious:false
                                                                  Preview:{"dual_user":{"ie_to_edge":{"redirection_mode":0}},"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false},"tab_stabs":{"closed_without_unfreeze_never_unfrozen":0,"closed_without_unfreeze_previously_unfrozen":0,"discard_without_unfreeze_never_unfrozen":0,"discard_without_unfreeze_previously_unfrozen":0},"tab_stats":{"frozen_daily":0,"unfrozen_daily":0}},"fre":{"oem_bookmarks_set":true},"hardware_acceleration_mode_previous":true,"legacy":{"profile":{"name":{"migrated":true}}},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAACil8ci2iRiRbc/M6tnn7Y/EAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAABGd/X1X+IFVGYzzRRY1edL4H9bG+nyLnECwMmdCzgtdgAAAAAOgAAAAAIAACAAAAClBbgibr9cptpL1vmpa1Q8rCjIEnM5NvEjhoWQicFzODAAAABGWrmYfaH1aGfTR/5m8YaNIaNuTIcY+e2mHFUDKbPg85zCIsvRrEhMW/nTOk+/9xRAAAAAmXLbfixgDAKcs4en34Xgn/dqHCR87fpe4wcmeVl01V7s+/EGFfVOE6S2xOU8mcmP4d9gt/wWm9UMIoztI
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):3333
                                                                  Entropy (8bit):5.602607424026606
                                                                  Encrypted:false
                                                                  SSDEEP:96:0q8NkC1f4SOjm+3rtmBc9fvCb41JkccJSDS4S4SDS+e4a:/8NbKSZXl47kcZ
                                                                  MD5:12C7E8A6561B3125691193B646318A29
                                                                  SHA1:854164DA0AC3AD758DBD4B8C22B43775D88B4A2C
                                                                  SHA-256:39B3763D94C8BC0147339D6BB0CDFE3D67F7AC77EDE2714B64089A7B91876D42
                                                                  SHA-512:E296F598519713EA0AAB81E2AE0B2967B45AE768F3BD23678813059A4AEC4AEBF75030C221D2289C6F37E8205F50CE41533C24B28B9BCCF8490B258C4DEF228D
                                                                  Malicious:false
                                                                  Preview:{"dual_user":{"ie_to_edge":{"redirection_mode":0}},"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false},"tab_stabs":{"closed_without_unfreeze_never_unfrozen":0,"closed_without_unfreeze_previously_unfrozen":0,"discard_without_unfreeze_never_unfrozen":0,"discard_without_unfreeze_previously_unfrozen":0},"tab_stats":{"frozen_daily":0,"unfrozen_daily":0}},"hardware_acceleration_mode_previous":true,"legacy":{"profile":{"name":{"migrated":true}}},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAACil8ci2iRiRbc/M6tnn7Y/EAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAABGd/X1X+IFVGYzzRRY1edL4H9bG+nyLnECwMmdCzgtdgAAAAAOgAAAAAIAACAAAAClBbgibr9cptpL1vmpa1Q8rCjIEnM5NvEjhoWQicFzODAAAABGWrmYfaH1aGfTR/5m8YaNIaNuTIcY+e2mHFUDKbPg85zCIsvRrEhMW/nTOk+/9xRAAAAAmXLbfixgDAKcs4en34Xgn/dqHCR87fpe4wcmeVl01V7s+/EGFfVOE6S2xOU8mcmP4d9gt/wWm9UMIoztIn70HA=="},"policy":{"last_statist
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:modified
                                                                  Size (bytes):24314
                                                                  Entropy (8bit):6.053512737809877
                                                                  Encrypted:false
                                                                  SSDEEP:384:wtMGQ7LBjuYXGIgtDAW5u0TDJ2q03X8NGus5TtqdqVETCoz+Mh0lkdHd5qq:wMGQ7FCYXGIgtDAWtJ4nVT+GoXh02tdJ
                                                                  MD5:FF15025D69727F207A1E7BCCADB975EA
                                                                  SHA1:9AB0ADFBA93747038D1CC93B0518A8FEA619B78A
                                                                  SHA-256:B3E0C50D8AC47AA17AD512B0A246F8C5C876476D596306EA7A2956D585806493
                                                                  SHA-512:57A996AC0624C104E151282C7583EAE73483AF373C070301DED5D9E1E34E77DDF7593944F3073F53D17A4CA20BDC87FDF10FAE59F4876E30A3CF1E86AFA10902
                                                                  Malicious:false
                                                                  Preview:{"abusive_adblocker_etag":"\"5E25271B8190D943537AD3FDB50874FC133E8B4A00380E2A6A888D63386F728B\"","apps_count_check_time":"13369443297876732","domain_actions_config":"H4sIAAAAAAAAAL1dWZPktpH+KxP9ZDtU6GMujfykHY9txVpHyHIoYh2ODhBEkWiCAAdHVbEc/u+bCVb1dE8RqEqOdh806mbzw8VEXshM/PuKb27vha2luF9LHqKT96KVoru3G+mcquXVN/++4sOgleBBWeOvvvnn4YGs7wcLz8erb65+HMKPMVx9dVXbnisDT4wMa612TNj+6j9fUSA+xFpZPyH/9dVVQig59Wx4L5+Cwzjg799ubt/jJP48zeE9TuHwDjYBc/Ew+Ktvbv/z1ZWoe+rsjB4/7Abr5U+ajz9LXo9Px+21Mk1hoo/oX6HHjTLyKTjYyMJmCbLnO/hZMpjFAjSvxOIhbxgi5FK85m+ZCkuQu7UyKoxLO97yIFoYvbAluiw2oRoYgIQ2nG2AqJY2U+koRXQbbMm3fMsEX9JMK3GLbeAvNjhrlo5GOJiTA/oXLTdG6qXtmMBDiyS59PvY7eCklyb4QcfFi7tpdwu3VBt1XNorvM4+RiU6+CjD0kb+pHz7rRm3rXSyzABnWdKBG+Ijlx7hEE4QTzo+AB6fnDLLJBpo7PKv8Ob367/KjUg8mcY6CmCjTJCmtsWFOcUf5vj04cw0e1yZe2WAl8svFn5IC43jfc+dLnGrEyDwAicHCxNdhlrVa5LEtTgt5u2lAK02pd198r5dr5VYgHj55jUJZGTtlg0NlA7S5AnvB8l7z3olnPV2vfCLsugvBUH7vTVIe9Y151SnmS2Auyvcr5UGYXBvzT2s0L3fKpCZl+2D91MLf04NPNNUni9BZmDP4Sfjk2Ig7ktgg8r8InfhHz//zSP7e8bquWlsDJ411j
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):2957
                                                                  Entropy (8bit):5.577312710399502
                                                                  Encrypted:false
                                                                  SSDEEP:48:YuBqDPEFMsFiHC0af4V4OjDK+3QemkHB+13drxhvBkoVRRpLOJkXscXwlRJfNNFs:Xq8NkC1f4SOjm+3rZBc9fvCopKJkccMw
                                                                  MD5:74B4DAD1681800703100E6DF4EA05823
                                                                  SHA1:FA6586E5F0B41DBCB04893F0B7E9F2195C38B193
                                                                  SHA-256:8C1458652B839820B18F78D3660AC2BDA6BBB1BF10B66B23B76BC1B153F62174
                                                                  SHA-512:CEF4B7EE738A372C98862AF2DFFF03A680FB683CCE5E22EEDFF35E9E8F478F0C3B7B06C725D3868A99E99325EBB9B38C0F459F47CDEF4D765CC6E523F2D52C4A
                                                                  Malicious:false
                                                                  Preview:{"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false},"tab_stabs":{"closed_without_unfreeze_never_unfrozen":0,"closed_without_unfreeze_previously_unfrozen":0,"discard_without_unfreeze_never_unfrozen":0,"discard_without_unfreeze_previously_unfrozen":0},"tab_stats":{"frozen_daily":0,"unfrozen_daily":0}},"hardware_acceleration_mode_previous":true,"legacy":{"profile":{"name":{"migrated":true}}},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAACil8ci2iRiRbc/M6tnn7Y/EAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAABGd/X1X+IFVGYzzRRY1edL4H9bG+nyLnECwMmdCzgtdgAAAAAOgAAAAAIAACAAAAClBbgibr9cptpL1vmpa1Q8rCjIEnM5NvEjhoWQicFzODAAAABGWrmYfaH1aGfTR/5m8YaNIaNuTIcY+e2mHFUDKbPg85zCIsvRrEhMW/nTOk+/9xRAAAAAmXLbfixgDAKcs4en34Xgn/dqHCR87fpe4wcmeVl01V7s+/EGFfVOE6S2xOU8mcmP4d9gt/wWm9UMIoztIn70HA=="},"policy":{"last_statistics_update":"13369443295810376"},"profile":{"info_ca
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):20958
                                                                  Entropy (8bit):6.0647662979685855
                                                                  Encrypted:false
                                                                  SSDEEP:384:wtMGQ7LBjuYXGIgtDAW5u0TDJ2q03X8NBSus5p4cE+Mh0lkdHd5qq:wMGQ7FCYXGIgtDAWtJ4nzp4ckh02tdJ
                                                                  MD5:5CD97F71BC9B554DE50AC3CD9E1913FC
                                                                  SHA1:F0D55C1AE28A0D4D3BFB8F09B4ABC4155AFD5B17
                                                                  SHA-256:E74E9AAD02BAE81F94D736BA9840BDFFD4DC7B7D7D293DCD8F59E415340EB9AB
                                                                  SHA-512:70BA483ADA29AE8F4108CCE33A69E07BED8C27A8279A58461BDDA3B0DC674277F420058B178BD0723DC4F9D658310087DD8972A55574ACB3E8C9496CA21049E9
                                                                  Malicious:false
                                                                  Preview:{"abusive_adblocker_etag":"\"5E25271B8190D943537AD3FDB50874FC133E8B4A00380E2A6A888D63386F728B\"","apps_count_check_time":"13369443297876732","domain_actions_config":"H4sIAAAAAAAAAL1dWZPktpH+KxP9ZDtU6GMujfykHY9txVpHyHIoYh2ODhBEkWiCAAdHVbEc/u+bCVb1dE8RqEqOdh806mbzw8VEXshM/PuKb27vha2luF9LHqKT96KVoru3G+mcquXVN/++4sOgleBBWeOvvvnn4YGs7wcLz8erb65+HMKPMVx9dVXbnisDT4wMa612TNj+6j9fUSA+xFpZPyH/9dVVQig59Wx4L5+Cwzjg799ubt/jJP48zeE9TuHwDjYBc/Ew+Ktvbv/z1ZWoe+rsjB4/7Abr5U+ajz9LXo9Px+21Mk1hoo/oX6HHjTLyKTjYyMJmCbLnO/hZMpjFAjSvxOIhbxgi5FK85m+ZCkuQu7UyKoxLO97yIFoYvbAluiw2oRoYgIQ2nG2AqJY2U+koRXQbbMm3fMsEX9JMK3GLbeAvNjhrlo5GOJiTA/oXLTdG6qXtmMBDiyS59PvY7eCklyb4QcfFi7tpdwu3VBt1XNorvM4+RiU6+CjD0kb+pHz7rRm3rXSyzABnWdKBG+Ijlx7hEE4QTzo+AB6fnDLLJBpo7PKv8Ob367/KjUg8mcY6CmCjTJCmtsWFOcUf5vj04cw0e1yZe2WAl8svFn5IC43jfc+dLnGrEyDwAicHCxNdhlrVa5LEtTgt5u2lAK02pd198r5dr5VYgHj55jUJZGTtlg0NlA7S5AnvB8l7z3olnPV2vfCLsugvBUH7vTVIe9Y151SnmS2Auyvcr5UGYXBvzT2s0L3fKpCZl+2D91MLf04NPNNUni9BZmDP4Sfjk2Ig7ktgg8r8InfhHz//zSP7e8bquWlsDJ411j
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):107893
                                                                  Entropy (8bit):4.640145133154881
                                                                  Encrypted:false
                                                                  SSDEEP:1536:B/lv4EsQMNeQ9s5VwB34PsiaR+tjvYArQdW+Iuh57P7Y:fwUQC5VwBIiElEd2K57P7Y
                                                                  MD5:46BC3CA050C9032312C051408F8C6227
                                                                  SHA1:4EC92F610AC217A2AB2927A8B71AD8BF5157D72D
                                                                  SHA-256:CB9C9EED0F363C3193E8676B326299AED296899E17323BA2D48619BAF5249FC6
                                                                  SHA-512:BB3126EBAD87C08B80CF3125BCDF838CEB7012F72B142B6CE67C8DAB7E57C52478876CAF19ECAC5670D5A0C2C3505F92DFB2E3013791359BFDD7094B29FC157F
                                                                  Malicious:false
                                                                  Preview:{"sites":[{"url":"24video.be"},{"url":"7dnifutbol.bg"},{"url":"6tv.dk"},{"url":"9kefa.com"},{"url":"aculpaedoslb.blogspot.pt"},{"url":"aek-live.gr"},{"url":"arcadepunk.co.uk"},{"url":"acidimg.cc"},{"url":"aazah.com"},{"url":"allehensbeverwijk.nl"},{"url":"amateurgonewild.org"},{"url":"aindasoudotempo.blogspot.com"},{"url":"anorthosis365.com"},{"url":"autoreview.bg"},{"url":"alivefoot.us"},{"url":"arbitro10.com"},{"url":"allhard.org"},{"url":"babesnude.info"},{"url":"aysel.today"},{"url":"animepornx.com"},{"url":"bahisideal20.com"},{"url":"analyseindustrie.nl"},{"url":"bahis10line.org"},{"url":"apoel365.net"},{"url":"bahissitelerisikayetleri.com"},{"url":"bambusratte.com"},{"url":"banzaj.pl"},{"url":"barlevegas.com"},{"url":"baston.info"},{"url":"atomcurve.com"},{"url":"atascadocherba.com"},{"url":"astrologer.gr"},{"url":"adultpicz.com"},{"url":"alleporno.com"},{"url":"beaver-tube.com"},{"url":"beachbabes.info"},{"url":"bearworldmagazine.com"},{"url":"bebegimdensonra.com"},{"url":"autoy
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):107893
                                                                  Entropy (8bit):4.640145133154881
                                                                  Encrypted:false
                                                                  SSDEEP:1536:B/lv4EsQMNeQ9s5VwB34PsiaR+tjvYArQdW+Iuh57P7Y:fwUQC5VwBIiElEd2K57P7Y
                                                                  MD5:46BC3CA050C9032312C051408F8C6227
                                                                  SHA1:4EC92F610AC217A2AB2927A8B71AD8BF5157D72D
                                                                  SHA-256:CB9C9EED0F363C3193E8676B326299AED296899E17323BA2D48619BAF5249FC6
                                                                  SHA-512:BB3126EBAD87C08B80CF3125BCDF838CEB7012F72B142B6CE67C8DAB7E57C52478876CAF19ECAC5670D5A0C2C3505F92DFB2E3013791359BFDD7094B29FC157F
                                                                  Malicious:false
                                                                  Preview:{"sites":[{"url":"24video.be"},{"url":"7dnifutbol.bg"},{"url":"6tv.dk"},{"url":"9kefa.com"},{"url":"aculpaedoslb.blogspot.pt"},{"url":"aek-live.gr"},{"url":"arcadepunk.co.uk"},{"url":"acidimg.cc"},{"url":"aazah.com"},{"url":"allehensbeverwijk.nl"},{"url":"amateurgonewild.org"},{"url":"aindasoudotempo.blogspot.com"},{"url":"anorthosis365.com"},{"url":"autoreview.bg"},{"url":"alivefoot.us"},{"url":"arbitro10.com"},{"url":"allhard.org"},{"url":"babesnude.info"},{"url":"aysel.today"},{"url":"animepornx.com"},{"url":"bahisideal20.com"},{"url":"analyseindustrie.nl"},{"url":"bahis10line.org"},{"url":"apoel365.net"},{"url":"bahissitelerisikayetleri.com"},{"url":"bambusratte.com"},{"url":"banzaj.pl"},{"url":"barlevegas.com"},{"url":"baston.info"},{"url":"atomcurve.com"},{"url":"atascadocherba.com"},{"url":"astrologer.gr"},{"url":"adultpicz.com"},{"url":"alleporno.com"},{"url":"beaver-tube.com"},{"url":"beachbabes.info"},{"url":"bearworldmagazine.com"},{"url":"bebegimdensonra.com"},{"url":"autoy
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):4194304
                                                                  Entropy (8bit):0.0
                                                                  Encrypted:false
                                                                  SSDEEP:3::
                                                                  MD5:B5CFA9D6C8FEBD618F91AC2843D50A1C
                                                                  SHA1:2BCCBD2F38F15C13EB7D5A89FD9D85F595E23BC3
                                                                  SHA-256:BB9F8DF61474D25E71FA00722318CD387396CA1736605E1248821CC0DE3D3AF8
                                                                  SHA-512:BD273BF4E10ED6E305ECB7B781CB065545FCE9BE9F1E2968DF22C3A98F82D719855AAFE5FF303D14EA623A5C55E51E924E10033A92A7A6B07725D7E9692B74F5
                                                                  Malicious:false
                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):4194304
                                                                  Entropy (8bit):0.0
                                                                  Encrypted:false
                                                                  SSDEEP:3::
                                                                  MD5:B5CFA9D6C8FEBD618F91AC2843D50A1C
                                                                  SHA1:2BCCBD2F38F15C13EB7D5A89FD9D85F595E23BC3
                                                                  SHA-256:BB9F8DF61474D25E71FA00722318CD387396CA1736605E1248821CC0DE3D3AF8
                                                                  SHA-512:BD273BF4E10ED6E305ECB7B781CB065545FCE9BE9F1E2968DF22C3A98F82D719855AAFE5FF303D14EA623A5C55E51E924E10033A92A7A6B07725D7E9692B74F5
                                                                  Malicious:false
                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):4194304
                                                                  Entropy (8bit):0.04044892159863649
                                                                  Encrypted:false
                                                                  SSDEEP:192:BcUjLYiVWK+ggCdlFJtD+FX9XkokgV8vYhafvNEfbcRQM9MbKLn8y08Tcm2RGOdB:mUjjlxq1nhIuQSKL08T2RGOD
                                                                  MD5:9BDB6ACA70D89F255BB5E86F9EFDFD9C
                                                                  SHA1:B31E8BAAA74CD079FE9E547A413037C188792E79
                                                                  SHA-256:12DF25E4526CEC7A4FABFFBE3FD7F4CCFD2C1D4F8A50A5FB0D69F435C853E5D5
                                                                  SHA-512:E2FEC98306A69C94A12EF3833646ACA21A6CDBFEEFA8FAD739AE71E8397E4C8B8F7181E9EFBE0D34222418A9ACAF77614A7C453BEA6F030810434BE792989C08
                                                                  Malicious:false
                                                                  Preview:...@..@...@.....C.].....@...............p_..(O..............`... ...i.y.........BrowserMetrics......i.y..Yd. .......A...................v.0.....UV&K.k<................UV&K.k<................UMA.PersistentHistograms.InitResult.....8...i.y.[".................................................i.y.Pq.30...............117.0.2045.55-64..".en-GB*...Windows NT..10.0.190452l..x86_64..?........".stqbdd20,1(.0..8..B.......2.:.M..BU..Be...?j...GenuineIntel... .. ..........x86_64...J....k..^o..J..l.zL.^o..J....\.^o..J.....f.^o..J....?.^o..P.Z...b.INBXj....... .8.@.............&.....................$}.CG....L.T.w..Ucw.}....u.$r....9...>.........."....."...2...".*.:............B)..1.3.177.11.. .*.RegKeyNotFound2.windowsR...Z...;.O...U@..$...SF@.......Y@.......Y@.......Y@........?........?.................?.......Y@.......Y@.......Y@.......Y@.......Y@.......Y@.......Y@.......Y@.......Y@................Y@.......Y@.......Y@........?........?z.......................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):4194304
                                                                  Entropy (8bit):0.45241480682665347
                                                                  Encrypted:false
                                                                  SSDEEP:3072:g/Vk6vV9VEBjMe14EIFCfnx99fd5WZIkGM8ShYg1HFmwy/noGV7SoCcqjptbf8JM:cDVGMEShYaHGsFsQoaHsghx
                                                                  MD5:DB1908359FB7BE168BF8F6EC5AE3422A
                                                                  SHA1:4A66834A30293ACECDEADA417ADDA496A3E644B6
                                                                  SHA-256:8C763FAE19B5AD1B27913E910772CF48FEC6F44E4F0BD52100EEF35CFC19AABC
                                                                  SHA-512:1C37C4D64039FE7C1475EF854E8822FA4CF0F7BE2A45AD9C4B8E6713B8274503E102C14014B994700DA1EAE94CA49E2B411DF4F9E32237DC67AC5397F6B25121
                                                                  Malicious:false
                                                                  Preview:...@..@...@.....C.].....@...............(5...4..............`... ...i.y.........BrowserMetrics......i.y..Yd. .......A...................v.0.....UV&K.k<................UV&K.k<................UMA.PersistentHistograms.InitResult.....8...i.y.[".................................................i.y.Pq.30...............117.0.2045.55-64..".en-GB*...Windows NT..10.0.190452....x86_64..?........".stqbdd20,1(.0..8..B....(.....10.0.19041.5462.Google Inc. (Google):bANGLE (Google, Vulkan 1.3.0 (SwiftShader Device (Subzero) (0x0000C0DE)), SwiftShader driver-5.0.0)M..BU..Be...?j...GenuineIntel... .. ..............x86_64...J....s..^o..J...W..^o..J..,jp..^o..J.......^o..J../T...^o..J...X.p.^o..J.....p.^o..J...c...^o..J...Y...^o..J.......^o..J..w....^o..J...G.Y.^o..J..A....^o..J....c..^o..J...c=..^o..J....J..^o..J...h8..^o..J..3.(..^o..J.......^o..J..!n...^o..J...S@".^o..J.......^o..J.......^o..J...j.8.^o..J..@....^o..J.......^o..J...b.J.^o..J..G....^o..J..8...^o..J...#...^o..J....k..^o..J..S..O.^o.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):280
                                                                  Entropy (8bit):4.148459480850003
                                                                  Encrypted:false
                                                                  SSDEEP:3:FiWWltl+n8l3ViHSRqOFhJXI2EyBl+BVP/Sh/JzvC5dtwE4ll:o1q8tViyRqsx+BVsJDCntwE4/
                                                                  MD5:AF3A4CEC43F6F79F10B1B5FAF323CB93
                                                                  SHA1:1F3800D039ABC134762EC9687E1EFE2F091E6E33
                                                                  SHA-256:40506581568683FD77970C6EB2090C9ADE297DCA2608ECB8ED6FE66A1D4A4A4B
                                                                  SHA-512:37CD58D028A7FC2ABD268FCCA66FD61203F2B1AEFED23AC82F53DC62C838B6F7C34F0A5259AC677A346F2D5FC3BC1DE46B2DAB3CE5EE4A7D772EADC6AE59F963
                                                                  Malicious:false
                                                                  Preview:sdPC....................(...V..A...j..vq"1SCRpGKHAwpF5kOwXUUSc/ojBrTkNG2SgkvqW1WE7kI="..................................................................................47DEQpj8HBSa+/TImW+5JCeuQeRkm5NMpJWZG3hSuFU=....................d59f03ab-492b-43e7-8b2e-945b027a13e9............
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):20
                                                                  Entropy (8bit):3.6219280948873624
                                                                  Encrypted:false
                                                                  SSDEEP:3:8g6Vvn:8g6Vv
                                                                  MD5:9E4E94633B73F4A7680240A0FFD6CD2C
                                                                  SHA1:E68E02453CE22736169A56FDB59043D33668368F
                                                                  SHA-256:41C91A9C93D76295746A149DCE7EBB3B9EE2CB551D84365FFF108E59A61CC304
                                                                  SHA-512:193011A756B2368956C71A9A3AE8BC9537D99F52218F124B2E64545EEB5227861D372639052B74D0DD956CB33CA72A9107E069F1EF332B9645044849D14AF337
                                                                  Malicious:false
                                                                  Preview:level=none expiry=0.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):24799
                                                                  Entropy (8bit):5.56568303943327
                                                                  Encrypted:false
                                                                  SSDEEP:768:eSPnYzWBYW5wqof4ra8F1+UoAYDCx9Tuqh0VfUC9xbog/OVPccIIFNnrwXmpGtu8:e+YzqYWaqofaau1jaFO70zt7
                                                                  MD5:5812BF2E4A6F364BADB4E48CE566C71F
                                                                  SHA1:3FF14DB27680284BE49D542D968F66B7DBA99466
                                                                  SHA-256:4F4F7640E973F76FAE9BE8369D9BB79C057F178967EACEB59B43D109A6D158E0
                                                                  SHA-512:C9795E16AD9E27B96993CD68D6BD1ED7DCCDA5A1CB0C5CE3BF7132991706895079431CE472C8EC774BE9B91F27193A84EF0BBCFFBBA637DC31725B6B92610339
                                                                  Malicious:false
                                                                  Preview:{"edge_fundamentals_appdefaults":{"ess_lightweight_version":101},"ess_kv_states":{"restore_on_startup":{"closed_notification":false,"decrypt_success":true,"key":"restore_on_startup","notification_popup_count":0},"startup_urls":{"closed_notification":false,"decrypt_success":true,"key":"startup_urls","notification_popup_count":0},"template_url_data":{"closed_notification":false,"decrypt_success":true,"key":"template_url_data","notification_popup_count":0}},"extensions":{"settings":{"ahfgeienlihckogmohjhadlkjgocpleb":{"active_permissions":{"api":["management","system.display","system.storage","webstorePrivate","system.cpu","system.memory","system.network"],"explicit_host":[],"manifest_permissions":[],"scriptable_host":[]},"app_launcher_ordinal":"t","commands":{},"content_settings":[],"creation_flags":1,"events":[],"first_install_time":"13369443296462281","from_webstore":false,"incognito_content_settings":[],"incognito_preferences":{},"last_update_time":"13369443296462281","location":5,"ma
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:very short file (no magic)
                                                                  Category:dropped
                                                                  Size (bytes):1
                                                                  Entropy (8bit):0.0
                                                                  Encrypted:false
                                                                  SSDEEP:3:L:L
                                                                  MD5:5058F1AF8388633F609CADB75A75DC9D
                                                                  SHA1:3A52CE780950D4D969792A2559CD519D7EE8C727
                                                                  SHA-256:CDB4EE2AEA69CC6A83331BBE96DC2CAA9A299D21329EFB0336FC02A82E1839A8
                                                                  SHA-512:0B61241D7C17BCBB1BAEE7094D14B7C451EFECC7FFCBD92598A0F13D313CC9EBC2A07E61F007BAF58FBF94FF9A8695BDD5CAE7CE03BBF1E94E93613A00F25F21
                                                                  Malicious:false
                                                                  Preview:.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:very short file (no magic)
                                                                  Category:dropped
                                                                  Size (bytes):1
                                                                  Entropy (8bit):0.0
                                                                  Encrypted:false
                                                                  SSDEEP:3:L:L
                                                                  MD5:5058F1AF8388633F609CADB75A75DC9D
                                                                  SHA1:3A52CE780950D4D969792A2559CD519D7EE8C727
                                                                  SHA-256:CDB4EE2AEA69CC6A83331BBE96DC2CAA9A299D21329EFB0336FC02A82E1839A8
                                                                  SHA-512:0B61241D7C17BCBB1BAEE7094D14B7C451EFECC7FFCBD92598A0F13D313CC9EBC2A07E61F007BAF58FBF94FF9A8695BDD5CAE7CE03BBF1E94E93613A00F25F21
                                                                  Malicious:false
                                                                  Preview:.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):6532
                                                                  Entropy (8bit):4.984353917032923
                                                                  Encrypted:false
                                                                  SSDEEP:96:stHqfIis13b946bzq8zUs85eh6Cb7/x+6MhmuecmAeZ0QA2Mw/EJ:stHws/bzqkUs88bV+FiA7PwMJ
                                                                  MD5:3949599DDD325F0583581B9329EBA33C
                                                                  SHA1:3C59D00A05E440DC7802670DDDCAF673C2ED7A46
                                                                  SHA-256:378CD0B99BAECAC017853F67243E1FC13A302C0D4A93A8B1BD27949E1DCB8B4F
                                                                  SHA-512:21ABABB20B916AF6FC187A419DE843AA52575086731E60E940A4B72FEA8AEA10357C829F30D83BE4715A423EF38C023F06C396B9973EBFABC0E83A97768D9C35
                                                                  Malicious:false
                                                                  Preview:{"aadc_info":{"age_group":0},"account_tracker_service_last_update":"13369443297741956","alternate_error_pages":{"backup":true},"apps":{"shortcuts_arch":"","shortcuts_version":0},"arbitration_using_experiment_config":false,"browser":{"available_dark_theme_options":"All","has_seen_welcome_page":false},"continuous_migration":{"ci_correction_for_holdout_treatment_state":1},"countryid_at_install":17224,"custom_links":{"list":[]},"domain_diversity":{"last_reporting_timestamp":"13369443297748189"},"download":{"default_directory":"C:\\Users\\user\\AppData\\Local\\Microsoft\\Edge\\KioskDownloads\\","directory_upgrade":true},"dual_user":{"consumer_mode":{"ie_user":false},"consumer_site_list_with_ie_entries":false,"consumer_sitelist_location":"","consumer_sitelist_version":"","external_consumer_shared_cookie_data":{},"shared_cookie_data":{},"sitelist_data_2":{},"sitelist_has_consumer_data":false,"sitelist_has_enterprise_data":false,"sitelist_location":"","sitelist_source":0,"sitelist_versio
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):24800
                                                                  Entropy (8bit):5.565685807021158
                                                                  Encrypted:false
                                                                  SSDEEP:768:eSPnYzWBYW5wqof4oa8F1+UoAYDCx9Tuqh0VfUC9xbog/OVPccIIFNnrwX9pGtuT:e+YzqYWaqofnau1jaFO70atA
                                                                  MD5:BCB45975C35903847904C11950440250
                                                                  SHA1:4296DF7EA354BE3D48D3166574438064CB6A9F1B
                                                                  SHA-256:8E888A013FFF81794FAF66EA484B7AA2986A1744BF9B9E1E933A2E47B65157CA
                                                                  SHA-512:432901A3C1A2B4A9A09812346A638095414551C2C966AE78C947A654D3F2377647177E9817A0A761C6A616421719764F430AE68F6B828B43B1CF1A05000B555A
                                                                  Malicious:false
                                                                  Preview:{"edge_fundamentals_appdefaults":{"ess_lightweight_version":101},"ess_kv_states":{"restore_on_startup":{"closed_notification":false,"decrypt_success":true,"key":"restore_on_startup","notification_popup_count":0},"startup_urls":{"closed_notification":false,"decrypt_success":true,"key":"startup_urls","notification_popup_count":0},"template_url_data":{"closed_notification":false,"decrypt_success":true,"key":"template_url_data","notification_popup_count":0}},"extensions":{"settings":{"ahfgeienlihckogmohjhadlkjgocpleb":{"active_permissions":{"api":["management","system.display","system.storage","webstorePrivate","system.cpu","system.memory","system.network"],"explicit_host":[],"manifest_permissions":[],"scriptable_host":[]},"app_launcher_ordinal":"t","commands":{},"content_settings":[],"creation_flags":1,"events":[],"first_install_time":"13369443296462281","from_webstore":false,"incognito_content_settings":[],"incognito_preferences":{},"last_update_time":"13369443296462281","location":5,"ma
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):6430
                                                                  Entropy (8bit):4.982341645909405
                                                                  Encrypted:false
                                                                  SSDEEP:96:stHqfIis13b946bzq8zUs85eh6Cb7/x+6MhmuecmAeZNQA2Mw/EJ:stHws/bzqkUs88bV+FiAMPwMJ
                                                                  MD5:874618A90A68C31E3905BB096A92B4BC
                                                                  SHA1:62CA4C71F76672F21EA29A8D56784A6FFF22D2FA
                                                                  SHA-256:04D06468BCDAB2BACF3155E6A32084D6F4D6D6538E74DE381DDC7E0A91C7E10D
                                                                  SHA-512:491279DEFA363944A6C32C2943A69E299DA7998EF16B3EA92B0EC928DD8E895D8F2CC8B8D687A6D84126AEB0195BAB018FFDF974CB4D4E8FA18DD25BAA6AD984
                                                                  Malicious:false
                                                                  Preview:{"aadc_info":{"age_group":0},"account_tracker_service_last_update":"13369443297741956","alternate_error_pages":{"backup":true},"apps":{"shortcuts_arch":"","shortcuts_version":0},"arbitration_using_experiment_config":false,"browser":{"available_dark_theme_options":"All","has_seen_welcome_page":false},"continuous_migration":{"ci_correction_for_holdout_treatment_state":1},"countryid_at_install":17224,"custom_links":{"list":[]},"domain_diversity":{"last_reporting_timestamp":"13369443297748189"},"download":{"default_directory":"C:\\Users\\user\\AppData\\Local\\Microsoft\\Edge\\KioskDownloads\\","directory_upgrade":true},"dual_user":{"consumer_mode":{"ie_user":false},"consumer_site_list_with_ie_entries":false,"consumer_sitelist_location":"","consumer_sitelist_version":"","external_consumer_shared_cookie_data":{},"shared_cookie_data":{},"sitelist_data_2":{},"sitelist_has_consumer_data":false,"sitelist_has_enterprise_data":false,"sitelist_location":"","sitelist_source":0,"sitelist_versio
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):16
                                                                  Entropy (8bit):3.2743974703476995
                                                                  Encrypted:false
                                                                  SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                  MD5:46295CAC801E5D4857D09837238A6394
                                                                  SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                  SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                  SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                  Malicious:false
                                                                  Preview:MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:modified
                                                                  Size (bytes):12600
                                                                  Entropy (8bit):5.321015214704078
                                                                  Encrypted:false
                                                                  SSDEEP:192:mAOEH/WCxkD7MDPSYAxmemxb7mngJdv9TXJ4MQmLu5/4eeNdl:5OEOKSXs/J7mGnQmLu5/5eNdl
                                                                  MD5:914EDDF29FF71A25B85C1E4531671140
                                                                  SHA1:8BECED91FAE97FA58B58EE7C5139D6C52D5EC922
                                                                  SHA-256:4B0876F98987887ABDB1FF3C60A767ADEED56647B54C128622D9381F862483E4
                                                                  SHA-512:67409D5B147A3265FAA29035115E6FF28B15AD423D9287FF2C1B1EF64B8CB096DB65F7FB071204B71BAA7D94A007684D1BD19F39ABB400E331E52D86E7D2FCB7
                                                                  Malicious:false
                                                                  Preview:...m.................DB_VERSION.1.I...................QUERY_TIMESTAMP:arbitration_priority_list4.*.*.13369443302334705.$QUERY:arbitration_priority_list4.*.*..[{"name":"arbitration_priority_list","url":"https://edgeassetservice.azureedge.net/assets/arbitration_priority_list/4.0.5/asset?assetgroup=ArbitrationService","version":{"major":4,"minor":0,"patch":5},"hash":"2DPW9BV28WrPpgGHdKsEvldNQvD7dA0AAxPa3B/lKN0=","size":11989}]..A./..............'ASSET_VERSION:arbitration_priority_list.4.0.5..ASSET:arbitration_priority_list.]{.. "configVersion": 32,.. "PrivilegedExperiences": [.. "ShorelinePrivilegedExperienceID",.. "SHOPPING_AUTO_SHOW_COUPONS_CHECKOUT",.. "SHOPPING_AUTO_SHOW_LOWER_PRICE_FOUND",.. "SHOPPING_AUTO_SHOW_BING_SEARCH",.. "SHOPPING_AUTO_SHOW_REBATES",.. "SHOPPING_AUTO_SHOW_REBATES_CONFIRMATION",.. "SHOPPING_AUTO_SHOW_REBATES_DEACTIVATED",.. "SHOPPING_AUTO_SHOW_REBATES_BING",.. "SHOPPING_AUTO_SHOW_REBATES_ORGANIC",.. "SHOPPING_AUTO_SHOW_PRICE_HIST
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):16
                                                                  Entropy (8bit):3.2743974703476995
                                                                  Encrypted:false
                                                                  SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                  MD5:46295CAC801E5D4857D09837238A6394
                                                                  SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                  SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                  SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                  Malicious:false
                                                                  Preview:MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):311
                                                                  Entropy (8bit):5.108303332644964
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52UtUFD1N723oH+TcwtOEh1ZB2KLlL52U3t4q2PN723oH+TcwtOEh1tIFUv:NpaxaYebOEh1ZFL1p3uvVaYebOEh16F2
                                                                  MD5:48319A196E1D11D14871E351202EE9EE
                                                                  SHA1:15E67580F28D889EB9F9FFE5421B4CF6CD636A30
                                                                  SHA-256:313BE96587E1674F67BEF70E01DB1227EDE9B4CC50EEED1CD475FB0DF134E063
                                                                  SHA-512:58F6B322263D10C5FB00CB29FA81BA8E3D24938391D7B683E4FD6A525518F0D5B9BB03923B26D35603B23D13A34E2337FDB5F0F7E465B02AEC2017EAD8DDCE2E
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:15:01.092 1980 Creating DB C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Asset Store\assets.db since it was missing..2024/08/29-18:15:01.136 1980 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Asset Store\assets.db/MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:OpenPGP Secret Key
                                                                  Category:dropped
                                                                  Size (bytes):41
                                                                  Entropy (8bit):4.704993772857998
                                                                  Encrypted:false
                                                                  SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                                                                  MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                                                                  SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                                                                  SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                                                                  SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                                                                  Malicious:false
                                                                  Preview:.|.."....leveldb.BytewiseComparator......
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 1
                                                                  Category:dropped
                                                                  Size (bytes):12288
                                                                  Entropy (8bit):0.3202460253800455
                                                                  Encrypted:false
                                                                  SSDEEP:6:l9bNFlEuWk8TRH9MRumWEyE4gLueXdNOmWxFxCxmWxYgCxmW5y/mWz4ynLAtD/W4:TLiuWkMORuHEyESeXdwDQ3SOAtD/ie
                                                                  MD5:40B18EC43DB334E7B3F6295C7626F28D
                                                                  SHA1:0E46584B0E0A9703C6B2EC1D246F41E63AF2296F
                                                                  SHA-256:85E961767239E90A361FB6AA0A3FD9DAA57CAAF9E30599BB70124F1954B751C8
                                                                  SHA-512:8BDACDC4A9559E4273AD01407D5D411035EECD927385A51172F401558444AD29B5AD2DC5562D1101244665EBE86BBDDE072E75ECA050B051482005EB6A52CDBD
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):45056
                                                                  Entropy (8bit):0.044384588876862925
                                                                  Encrypted:false
                                                                  SSDEEP:6:/Fii2QXc8kM/lTVDMMmo1MtaDzvikllQTM/lG1:dsETZtmo1EkX/sES
                                                                  MD5:B4D5DA09E1C868B0FDBDEA3C69E2A5E0
                                                                  SHA1:1F7926B35D985FA3D233A068D410541A59AF07B7
                                                                  SHA-256:22CB5F310ABECC9D027E083A391628C65792AC5230EE67178A2F3D89D4C3E1AB
                                                                  SHA-512:F3CEE151975B456C48750EB451C49E82C0A776D46166E043F3199A848000E27177A63707969AF1043A6F5648D06D603E3A1E502188B124F4420CC987CBB98EF4
                                                                  Malicious:false
                                                                  Preview:............$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):270336
                                                                  Entropy (8bit):0.09572888451917717
                                                                  Encrypted:false
                                                                  SSDEEP:24:UrBV4XQ3eaPVH9/UQV4XeaPVHaUAPnQzLIoMmLQzRHVIRBNUeGrYhmgl0+K38EWy:QV4A3es9FV4XesrAmK6NUeGkh63lWp4
                                                                  MD5:DFD717A3240885950E524078DA023040
                                                                  SHA1:145D02551A711C40C8C9B1A079E43863DB8750B6
                                                                  SHA-256:C59C8E2A97839AEF58C2FE38ED52E5E04F606B7F6C9375A8B81020C3AE9CB0E5
                                                                  SHA-512:3A8987167C6C1D1192741442FEDA1B7E142A49478105285F1BBBF0FCD94F2BBCB1F30043F7049EA524AFFD5FE08D5457E2DC6212B7730447D7EA4A0F6CEEBC1B
                                                                  Malicious:false
                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):1056768
                                                                  Entropy (8bit):0.28336334284091835
                                                                  Encrypted:false
                                                                  SSDEEP:384:/vyJtMSvyJtMF8D4INJtbm/4INJtbxeCFIJty:/6Jtl6JtHJtCHJt9FIJt
                                                                  MD5:DA8D487B5A134CA3D91543142AF7CA02
                                                                  SHA1:FAC3B9D08FEDF7B7687628B8AC169378B353F4BD
                                                                  SHA-256:7899F5072F647020B98D7AB35402704C13BBBF3F87DED9DC4259663812FBEDF1
                                                                  SHA-512:CF69C46504ABD149A9062EC704D3F78194AAA768A390502EF37243EBA28027D34AA599F22EE360D886AB924CBBFCDFD3A6EFA9D9F2D752A7EA8CF6E4941252EF
                                                                  Malicious:false
                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):4202496
                                                                  Entropy (8bit):0.04312480187296375
                                                                  Encrypted:false
                                                                  SSDEEP:192:rH/WCxkD7MDPSYAxmemxb7mngJdv9TXJ4MQmLu5/4eeNd:rOKSXs/J7mGnQmLu5/5eNd
                                                                  MD5:4D3862637A3E49DEA6B0E914424F7F3E
                                                                  SHA1:2ADD705EDC5981DFA1DDA043EF8917DD416CA4B3
                                                                  SHA-256:081133A6F01292BF3CDF0BFBAE44EEE97EC2920D820294EA0447EE2D71249D58
                                                                  SHA-512:FA1B6C0C9D28F5686D65A17D43EC6473524C7D576CADA3BA68A94B85375C703E750F624CA82ED3A431DBF5A41203A974E041BFCC6681E04CFBE708B34A4AA861
                                                                  Malicious:false
                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:gzip compressed data, was "asset", last modified: Fri Aug 2 18:10:34 2024, max compression, original size modulo 2^32 374872
                                                                  Category:dropped
                                                                  Size (bytes):70207
                                                                  Entropy (8bit):7.995911906073242
                                                                  Encrypted:true
                                                                  SSDEEP:1536:VzseWV/dT2G9zm5w0vgxQUFm6SM6ZYRuB61K+aK+POIwPru:VoNQGIwvs6S9+I6RWPOIwTu
                                                                  MD5:9F5A7E038BF08B13BD15338EC7BD4E16
                                                                  SHA1:AB69D28EEA9AE289BB86159C341910538CDDE5B9
                                                                  SHA-256:BA0BCBBF170ADB0B5119D19D56C2D004579507DFC4A9215BCCC8663C8A486AF8
                                                                  SHA-512:48557ECD56DFD2157304FE752E15E44314667EFC79E6C21312723251E4E1F1BF5BE0A76F88F4B4D83FADB9D81BFB1835B1C0E5CFA7B07214A605F58064BB94B1
                                                                  Malicious:false
                                                                  Preview:.....!.f..asset.....6.0.W..3....[........9m;.....IH.E...j...}.....PR..w.gg.....@.P.*..?...x....?./.%..Q...x....}..9..e..f.8..Yb@g...i..$...I.......<....k...{..{.Qg..k..q.....i.Y}..._......\?....5 .5 .`..._i'@....H'.f!...x`...f......v.._1w.u.<.........5.:..^.Ua....H6...x....D:.R..L..2.,.s.f.......FE'..%{]-;+.`....N...=|.:q...9N.k..i.I.8E.i.I.s..Y...8..fe'...Xo...Xo...#.r$N.u2.o.]....^,.k....{E."......Q.N...AY..u.^o.............Z..ce.irN.{.O$.C.......HJ.HJ..J..hOgA.5.nW.\........}E.%-.A."a<..~.[O....~.......xX.G?Y.3O8d8I...&X....V4...0=.iS....].D.L@.YiS...<.W..W+..#mj...p..8^.\U;oV;W`..^..V...G..SC.9.....i%@g.iS=..`..#.H.p.q..E.q...)....).X..M.X.%.,i.%..V..6.nk.@1S@-..Y.6....K.n....:c.My.....h...9..q...f't.iS.v..6D7...d't.iS.v..F.....faG.t.f....lR.J@!l.0O..T.....T2...\.n..-....L..ES.9.:...B..P1@...P.l.fX.aV..Y6.B5......Mt..SS,l..+..J...).*i.6......8...:.Z...2.H.8..Z.>.5.Oi..N`:..6.i.n.h.l.e.h.T\.lr...TE+m.T..).D..F..+.6....J...x.`..`.m..H..i....p...v
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                                                                  Category:dropped
                                                                  Size (bytes):524656
                                                                  Entropy (8bit):5.027445846313988E-4
                                                                  Encrypted:false
                                                                  SSDEEP:3:LsulKz:Lsd
                                                                  MD5:E214FD7BAE7880306BBFD31B0BAA5264
                                                                  SHA1:19A17205B9B4CD8A2CED61DE66FC5DB101F56272
                                                                  SHA-256:F36398BAC2BB95DE665BD37E65A32B9D6E844270F488ADB1C46641A6DEDF1DEB
                                                                  SHA-512:0F8FF83FEA33132F65983B27B14841E7A8EC8EBA3E16694AB226A4FE40FB5DA72B1557399E80FC94C5122CC3A13738E58F2C92033F95BC5910C693165D704C3D
                                                                  Malicious:false
                                                                  Preview:.........................................k..p./.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):24
                                                                  Entropy (8bit):2.1431558784658327
                                                                  Encrypted:false
                                                                  SSDEEP:3:m+l:m
                                                                  MD5:54CB446F628B2EA4A5BCE5769910512E
                                                                  SHA1:C27CA848427FE87F5CF4D0E0E3CD57151B0D820D
                                                                  SHA-256:FBCFE23A2ECB82B7100C50811691DDE0A33AA3DA8D176BE9882A9DB485DC0F2D
                                                                  SHA-512:8F6ED2E91AED9BD415789B1DBE591E7EAB29F3F1B48FDFA5E864D7BF4AE554ACC5D82B4097A770DABC228523253623E4296C5023CF48252E1B94382C43123CB0
                                                                  Malicious:false
                                                                  Preview:0\r..m..................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):48
                                                                  Entropy (8bit):2.9972243200613975
                                                                  Encrypted:false
                                                                  SSDEEP:3:A0JE0Er7zVBln:A0GrlBl
                                                                  MD5:FF50693141AAC38F7D8313F8DB7B9D05
                                                                  SHA1:D94AB42FAEB7CC1A1EA7A73A365A4F81C945548D
                                                                  SHA-256:1E7A64E38F267973B9EA6828A4ABB6B914BA66F54EBABBDDC2E8077631FE6C07
                                                                  SHA-512:B04AFB08824B0BD1CA46245310C0DC0DCDAF41965C2F9A5011E5F51869BD54916E46BD0F2D4C466AEF7DDD566315B4FE701EDBC1357649EDF102F89273B2D075
                                                                  Malicious:false
                                                                  Preview:(.....8>oy retne........................7..p./.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):48
                                                                  Entropy (8bit):2.9972243200613975
                                                                  Encrypted:false
                                                                  SSDEEP:3:A0JE0Er7zVBln:A0GrlBl
                                                                  MD5:FF50693141AAC38F7D8313F8DB7B9D05
                                                                  SHA1:D94AB42FAEB7CC1A1EA7A73A365A4F81C945548D
                                                                  SHA-256:1E7A64E38F267973B9EA6828A4ABB6B914BA66F54EBABBDDC2E8077631FE6C07
                                                                  SHA-512:B04AFB08824B0BD1CA46245310C0DC0DCDAF41965C2F9A5011E5F51869BD54916E46BD0F2D4C466AEF7DDD566315B4FE701EDBC1357649EDF102F89273B2D075
                                                                  Malicious:false
                                                                  Preview:(.....8>oy retne........................7..p./.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):24
                                                                  Entropy (8bit):2.1431558784658327
                                                                  Encrypted:false
                                                                  SSDEEP:3:m+l:m
                                                                  MD5:54CB446F628B2EA4A5BCE5769910512E
                                                                  SHA1:C27CA848427FE87F5CF4D0E0E3CD57151B0D820D
                                                                  SHA-256:FBCFE23A2ECB82B7100C50811691DDE0A33AA3DA8D176BE9882A9DB485DC0F2D
                                                                  SHA-512:8F6ED2E91AED9BD415789B1DBE591E7EAB29F3F1B48FDFA5E864D7BF4AE554ACC5D82B4097A770DABC228523253623E4296C5023CF48252E1B94382C43123CB0
                                                                  Malicious:false
                                                                  Preview:0\r..m..................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):48
                                                                  Entropy (8bit):2.9972243200613975
                                                                  Encrypted:false
                                                                  SSDEEP:3:bChcAyEH8zwKl:mhcA9H8z/l
                                                                  MD5:9D86AA4A3DB878931991DCA3B2ED7F08
                                                                  SHA1:DE63830842F3FC641A2B66859044688466289B53
                                                                  SHA-256:B76135BC0EDB0842908A0F078D353599285808ACD06938132571C71DA657D9E6
                                                                  SHA-512:C726C154C6B8EA201F0CBC98F0AB8CC9383039F46AA2AE7FCE9886D74D8DA10472610FEE49F35E1CAEC090B8FD31469F58327AAA0EE36854D56751C035399F20
                                                                  Malicious:false
                                                                  Preview:(......coy retne........................[..p./.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):48
                                                                  Entropy (8bit):2.9972243200613975
                                                                  Encrypted:false
                                                                  SSDEEP:3:bChcAyEH8zwKl:mhcA9H8z/l
                                                                  MD5:9D86AA4A3DB878931991DCA3B2ED7F08
                                                                  SHA1:DE63830842F3FC641A2B66859044688466289B53
                                                                  SHA-256:B76135BC0EDB0842908A0F078D353599285808ACD06938132571C71DA657D9E6
                                                                  SHA-512:C726C154C6B8EA201F0CBC98F0AB8CC9383039F46AA2AE7FCE9886D74D8DA10472610FEE49F35E1CAEC090B8FD31469F58327AAA0EE36854D56751C035399F20
                                                                  Malicious:false
                                                                  Preview:(......coy retne........................[..p./.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
                                                                  Category:dropped
                                                                  Size (bytes):8192
                                                                  Entropy (8bit):0.01057775872642915
                                                                  Encrypted:false
                                                                  SSDEEP:3:MsFl:/F
                                                                  MD5:CF89D16BB9107C631DAABF0C0EE58EFB
                                                                  SHA1:3AE5D3A7CF1F94A56E42F9A58D90A0B9616AE74B
                                                                  SHA-256:D6A5FE39CD672781B256E0E3102F7022635F1D4BB7CFCC90A80FFFE4D0F3877E
                                                                  SHA-512:8CB5B059C8105EB91E74A7D5952437AAA1ADA89763C5843E7B0F1B93D9EBE15ED40F287C652229291FAC02D712CF7FF5ECECEF276BA0D7DDC35558A3EC3F77B0
                                                                  Malicious:false
                                                                  Preview:............$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):270336
                                                                  Entropy (8bit):0.0012471779557650352
                                                                  Encrypted:false
                                                                  SSDEEP:3:MsEllllkEthXllkl2zE:/M/xT02z
                                                                  MD5:F50F89A0A91564D0B8A211F8921AA7DE
                                                                  SHA1:112403A17DD69D5B9018B8CEDE023CB3B54EAB7D
                                                                  SHA-256:B1E963D702392FB7224786E7D56D43973E9B9EFD1B89C17814D7C558FFC0CDEC
                                                                  SHA-512:BF8CDA48CF1EC4E73F0DD1D4FA5562AF1836120214EDB74957430CD3E4A2783E801FA3F4ED2AFB375257CAEED4ABE958265237D6E0AACF35A9EDE7A2E8898D58
                                                                  Malicious:false
                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):8192
                                                                  Entropy (8bit):0.011852361981932763
                                                                  Encrypted:false
                                                                  SSDEEP:3:MsHlDll:/H
                                                                  MD5:0962291D6D367570BEE5454721C17E11
                                                                  SHA1:59D10A893EF321A706A9255176761366115BEDCB
                                                                  SHA-256:EC1702806F4CC7C42A82FC2B38E89835FDE7C64BB32060E0823C9077CA92EFB7
                                                                  SHA-512:F555E961B69E09628EAF9C61F465871E6984CD4D31014F954BB747351DAD9CEA6D17C1DB4BCA2C1EB7F187CB5F3C0518748C339C8B43BBD1DBD94AEAA16F58ED
                                                                  Malicious:false
                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):8192
                                                                  Entropy (8bit):0.012340643231932763
                                                                  Encrypted:false
                                                                  SSDEEP:3:MsGl3ll:/y
                                                                  MD5:41876349CB12D6DB992F1309F22DF3F0
                                                                  SHA1:5CF26B3420FC0302CD0A71E8D029739B8765BE27
                                                                  SHA-256:E09F42C398D688DCE168570291F1F92D079987DEDA3099A34ADB9E8C0522B30C
                                                                  SHA-512:E9A4FC1F7CB6AE2901F8E02354A92C4AAA7A53C640DCF692DB42A27A5ACC2A3BFB25A0DE0EB08AB53983132016E7D43132EA4292E439BB636AAFD53FB6EF907E
                                                                  Malicious:false
                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                                                                  Category:dropped
                                                                  Size (bytes):262512
                                                                  Entropy (8bit):9.553120663130604E-4
                                                                  Encrypted:false
                                                                  SSDEEP:3:LsNlKK:Ls3R
                                                                  MD5:298A497257A8AA6DCA3BD2EDE22247A3
                                                                  SHA1:A268E7DD599386E15C6F0B04C48DF687A7505128
                                                                  SHA-256:CF5852E10C9A377CA1F042BAA1F1B507E79611AEC51C7D1DA767C371F9ED1C62
                                                                  SHA-512:F12D29222EDB16E6E5BF1A033B2DBFDD1541F39D126369981374C92A09D11C90107D4FFDA768C060546C6F498DE2971D13B35722FBF65A6D95158534B13D2630
                                                                  Malicious:false
                                                                  Preview:.........................................Q..p./.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):16
                                                                  Entropy (8bit):3.2743974703476995
                                                                  Encrypted:false
                                                                  SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                  MD5:46295CAC801E5D4857D09837238A6394
                                                                  SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                  SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                  SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                  Malicious:false
                                                                  Preview:MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):33
                                                                  Entropy (8bit):3.5394429593752084
                                                                  Encrypted:false
                                                                  SSDEEP:3:iWstvhYNrkUn:iptAd
                                                                  MD5:F27314DD366903BBC6141EAE524B0FDE
                                                                  SHA1:4714D4A11C53CF4258C3A0246B98E5F5A01FBC12
                                                                  SHA-256:68C7AD234755B9EDB06832A084D092660970C89A7305E0C47D327B6AC50DD898
                                                                  SHA-512:07A0D529D9458DE5E46385F2A9D77E0987567BA908B53DDB1F83D40D99A72E6B2E3586B9F79C2264A83422C4E7FC6559CAC029A6F969F793F7407212BB3ECD51
                                                                  Malicious:false
                                                                  Preview:...m.................DB_VERSION.1
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):16
                                                                  Entropy (8bit):3.2743974703476995
                                                                  Encrypted:false
                                                                  SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                  MD5:46295CAC801E5D4857D09837238A6394
                                                                  SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                  SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                  SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                  Malicious:false
                                                                  Preview:MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:OpenPGP Secret Key
                                                                  Category:dropped
                                                                  Size (bytes):41
                                                                  Entropy (8bit):4.704993772857998
                                                                  Encrypted:false
                                                                  SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                                                                  MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                                                                  SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                                                                  SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                                                                  SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                                                                  Malicious:false
                                                                  Preview:.|.."....leveldb.BytewiseComparator......
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 14, database pages 8, cookie 0xe, schema 4, UTF-8, version-valid-for 14
                                                                  Category:dropped
                                                                  Size (bytes):32768
                                                                  Entropy (8bit):0.494709561094235
                                                                  Encrypted:false
                                                                  SSDEEP:24:TLEC30OIcqIn2o0FUFlA2cs0US5S693Xlej2:ThLaJUnAg0UB6I
                                                                  MD5:CF7760533536E2AF66EA68BC3561B74D
                                                                  SHA1:E991DE2EA8F42AE7E0A96A3B3B8AF87A689C8CCD
                                                                  SHA-256:E1F183FAE5652BA52F5363A7E28BF62B53E7781314C9AB76B5708AF9918BE066
                                                                  SHA-512:38B15FE7503F6DFF9D39BC74AA0150A7FF038029F973BE9A37456CDE6807BCBDEAB06E624331C8DFDABE95A5973B0EE26A391DB2587E614A37ADD50046470162
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ ..........................................................................j...i............t...c................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 5
                                                                  Category:dropped
                                                                  Size (bytes):20480
                                                                  Entropy (8bit):0.5094712832659277
                                                                  Encrypted:false
                                                                  SSDEEP:12:TLW4QpRSJDBJuqJSEDNvrWjJQ9Dl9np59yDLgHFUxOUDaaTXubHa7me5q4iZ7dV:TLqpR+DDNzWjJ0npnyXKUO8+j25XmL
                                                                  MD5:D4971855DD087E30FC14DF1535B556B9
                                                                  SHA1:9E00DEFC7E54C75163273184837B9D0263AA528C
                                                                  SHA-256:EC7414FF1DB052E8E0E359801F863969866F19228F3D5C64F632D991C923F0D2
                                                                  SHA-512:ACA411D7819B03EF9C9ACA292D91B1258238DF229B4E165A032DB645E66BFE1148FF3DCFDAC3126FCD34DBD0892F420148E280D9716C63AD9FCDD9E7CA58D71D
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ ..........................................................................j...%.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):16
                                                                  Entropy (8bit):3.2743974703476995
                                                                  Encrypted:false
                                                                  SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                  MD5:46295CAC801E5D4857D09837238A6394
                                                                  SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                  SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                  SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                  Malicious:false
                                                                  Preview:MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):375520
                                                                  Entropy (8bit):5.354154873594805
                                                                  Encrypted:false
                                                                  SSDEEP:6144:GA/imBpx6WdPSxKWcHu5MURacq49QxxPnyEndBuHltBfdK5WNbsVEziP/CfXtLPz:GFdMyq49tEndBuHltBfdK5WNbsVEziPU
                                                                  MD5:C88241F7150D510BEE2AC7EE7E07A9FF
                                                                  SHA1:9B50CDA9C10E139B29E2F353B4701BFC534C6863
                                                                  SHA-256:15DB4230CA46BAD8CF7AE782C67466165AF9FD7AF78B1F6FF9DEDE76453CFBC4
                                                                  SHA-512:7B02E3EAD43941306834CCFE5A4DF6FEADF5C626DA19E64F837B509381334CD14BC200C7A9DF1CCDB3ABA88F92CCF824566E784ECB55C876FF36C9A852D50A5F
                                                                  Malicious:false
                                                                  Preview:...m.................DB_VERSION.1...q...............&QUERY_TIMESTAMP:domains_config_gz2.*.*.13369443302544655..QUERY:domains_config_gz2.*.*..[{"name":"domains_config_gz","url":"https://edgeassetservice.azureedge.net/assets/domains_config_gz/2.8.76/asset?assetgroup=EntityExtractionDomainsConfig","version":{"major":2,"minor":8,"patch":76},"hash":"78Xsq/1H+MXv88uuTT1Rx79Nu2ryKVXh2J6ZzLZd38w=","size":374872}]..*.`~...............ASSET_VERSION:domains_config_gz.2.8.76..ASSET:domains_config_gz...{"config": {"token_limit": 1600, "page_cutoff": 4320, "default_locale_map": {"bg": "bg-bg", "bs": "bs-ba", "el": "el-gr", "en": "en-us", "es": "es-mx", "et": "et-ee", "cs": "cs-cz", "da": "da-dk", "de": "de-de", "fa": "fa-ir", "fi": "fi-fi", "fr": "fr-fr", "he": "he-il", "hr": "hr-hr", "hu": "hu-hu", "id": "id-id", "is": "is-is", "it": "it-it", "ja": "ja-jp", "ko": "ko-kr", "lv": "lv-lv", "lt": "lt-lt", "mk": "mk-mk", "nl": "nl-nl", "nb": "nb-no", "no": "no-no", "pl": "pl-pl", "pt": "pt-pt", "ro": "
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):16
                                                                  Entropy (8bit):3.2743974703476995
                                                                  Encrypted:false
                                                                  SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                  MD5:46295CAC801E5D4857D09837238A6394
                                                                  SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                  SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                  SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                  Malicious:false
                                                                  Preview:MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):327
                                                                  Entropy (8bit):5.168170366582438
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52UCAB1N723oH+Tcwtj2WwnvB2KLlL52UpSv4q2PN723oH+Tcwtj2WwnvIFUv:NpCABaYebjxwnvFL1pa4vVaYebjxwnQg
                                                                  MD5:719F86B4A89B23FCFB54490346A7DFFA
                                                                  SHA1:975DBE9F533FD93E2E62B64D667476F2F83A40B8
                                                                  SHA-256:A899512EEF0C85595AED9BD313D0DE6463ADFEF21D622FCD9B685671C1882C56
                                                                  SHA-512:CF56766CCA946037CC3D015EE69A9066B8A3DC39F6FF009DE74EA327819700844ED1B0AC531C0ABD73428541320276DB9B33CFDB33DB462716005C73A8B1CCB0
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:15:01.148 1b20 Creating DB C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\EntityExtractionAssetStore.db since it was missing..2024/08/29-18:15:01.413 1b20 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\EntityExtractionAssetStore.db/MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:OpenPGP Secret Key
                                                                  Category:dropped
                                                                  Size (bytes):41
                                                                  Entropy (8bit):4.704993772857998
                                                                  Encrypted:false
                                                                  SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                                                                  MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                                                                  SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                                                                  SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                                                                  SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                                                                  Malicious:false
                                                                  Preview:.|.."....leveldb.BytewiseComparator......
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:modified
                                                                  Size (bytes):358860
                                                                  Entropy (8bit):5.324613761449147
                                                                  Encrypted:false
                                                                  SSDEEP:6144:CgimBVvUrsc6rRA81b/18jyJNjfvrfM6Rr:C1gAg1zfvT
                                                                  MD5:5D65EF1D3146C96CCCF8EF16B968A3D3
                                                                  SHA1:EF033C2968EDA2911248AEBE6BA5ADB5DC65EE48
                                                                  SHA-256:BF9BBE4044464162206122B0A3D855C15645376744F31A8E67D079BAA654812F
                                                                  SHA-512:D95BA86E28F958B4769456A10E191747D36E87A7615A733F7D1F44D951E9F4E5F1338C43E7CA2A907804DF433BCCD40EECC4D8904506894DDF1BB04CA2DBA95A
                                                                  Malicious:false
                                                                  Preview:{"aee_config":{"ar":{"price_regex":{"ae":"(((ae|aed|\\x{062F}\\x{0660}\\x{0625}\\x{0660}|\\x{062F}\\.\\x{0625}|dhs|dh)\\s*\\d{1,3})|(\\d{1,3}\\s*(ae|aed|\\x{062F}\\x{0660}\\x{0625}\\x{0660}|\\x{062F}\\.\\x{0625}|dhs|dh)))","dz":"(((dzd|da|\\x{062F}\\x{062C})\\s*\\d{1,3})|(\\d{1,3}\\s*(dzd|da|\\x{062F}\\x{062C})))","eg":"(((e\\x{00a3}|egp)\\s*\\d{1,3})|(\\d{1,3}\\s*(e\\x{00a3}|egp)))","ma":"(((mad|dhs|dh)\\s*\\d{1,3})|(\\d{1,3}\\s*(mad|dhs|dh)))","sa":"((\\d{1,3}\\s*(sar\\s*\\x{fdfc}|sar|sr|\\x{fdfc}|\\.\\x{0631}\\.\\x{0633}))|((sar\\s*\\x{fdfc}|sar|sr|\\x{fdfc}|\\.\\x{0631}\\.\\x{0633})\\s*\\d{1,3}))"},"product_terms":"((\\x{0623}\\x{0636}\\x{0641}\\s*\\x{0625}\\x{0644}\\x{0649}\\s*\\x{0627}\\x{0644}\\x{0639}\\x{0631}\\x{0628}\\x{0629})|(\\x{0623}\\x{0636}\\x{0641}\\s*\\x{0625}\\x{0644}\\x{0649}\\s*\\x{0627}\\x{0644}\\x{062D}\\x{0642}\\x{064A}\\x{0628}\\x{0629})|(\\x{0627}\\x{0634}\\x{062A}\\x{0631}\\x{064A}\\s*\\x{0627}\\x{0644}\\x{0622}\\x{0646})|(\\x{062E}\\x{064A}\\x{0627}\\x{0631}
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):16
                                                                  Entropy (8bit):3.2743974703476995
                                                                  Encrypted:false
                                                                  SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                  MD5:46295CAC801E5D4857D09837238A6394
                                                                  SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                  SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                  SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                  Malicious:false
                                                                  Preview:MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):171
                                                                  Entropy (8bit):1.8784775129881184
                                                                  Encrypted:false
                                                                  SSDEEP:3:FQxlXNQxlXNQxlXNQxlXNQxlXNQxlXNQxlXNQxlXNQxlX:qTCTCTCTCTCTCTCTCT
                                                                  MD5:E952942B492DB39A75DD2669B98EBE74
                                                                  SHA1:F6C4DEF325DCA0DFEC01759D7D8610837A370176
                                                                  SHA-256:14F92B911F9FE774720461EEC5BB4761AE6BFC9445C67E30BF624A8694B4B1DA
                                                                  SHA-512:9193E7BBE7EB633367B39513B48EFED11FD457DCED070A8708F8572D0AB248CBFF37254599A6BFB469637E0DCCBCD986347C6B6075C06FAE2AF08387B560DEA0
                                                                  Malicious:false
                                                                  Preview:.f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5...............
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):16
                                                                  Entropy (8bit):3.2743974703476995
                                                                  Encrypted:false
                                                                  SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                  MD5:46295CAC801E5D4857D09837238A6394
                                                                  SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                  SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                  SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                  Malicious:false
                                                                  Preview:MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):299
                                                                  Entropy (8bit):5.226290885692062
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52Uap+M1N723oH+TcwttaVdg2KLlL52Uaqgjyq2PN723oH+TcwttaPrqIFUv:Npa0saYebDL1paRjyvVaYeb83FUv
                                                                  MD5:CCC150B6E62CEE8F4283F3E6CF23DC56
                                                                  SHA1:D5AF02E123610D8A49503BF78B4F66E963A9C1C7
                                                                  SHA-256:27F77C0DF285FDCB1DFAE9B2F9D992ABDF51C6A26EA4FED7F337DC405041E108
                                                                  SHA-512:5BEB83B6C5C4077AC3720D28FC6DC215673D703B1F165A86112DF54D10EFCF8F197418BD1459E0FB6255A94538817493B16C13C6CEBA95E11E7123F5CE1CFA76
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:14:56.576 1b94 Creating DB C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Extension Rules since it was missing..2024/08/29-18:14:56.589 1b94 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Extension Rules/MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:OpenPGP Secret Key
                                                                  Category:dropped
                                                                  Size (bytes):41
                                                                  Entropy (8bit):4.704993772857998
                                                                  Encrypted:false
                                                                  SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                                                                  MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                                                                  SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                                                                  SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                                                                  SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                                                                  Malicious:false
                                                                  Preview:.|.."....leveldb.BytewiseComparator......
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):16
                                                                  Entropy (8bit):3.2743974703476995
                                                                  Encrypted:false
                                                                  SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                  MD5:46295CAC801E5D4857D09837238A6394
                                                                  SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                  SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                  SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                  Malicious:false
                                                                  Preview:MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):171
                                                                  Entropy (8bit):1.8784775129881184
                                                                  Encrypted:false
                                                                  SSDEEP:3:FQxlXNQxlXNQxlXNQxlXNQxlXNQxlXNQxlXNQxlXNQxlX:qTCTCTCTCTCTCTCTCT
                                                                  MD5:E952942B492DB39A75DD2669B98EBE74
                                                                  SHA1:F6C4DEF325DCA0DFEC01759D7D8610837A370176
                                                                  SHA-256:14F92B911F9FE774720461EEC5BB4761AE6BFC9445C67E30BF624A8694B4B1DA
                                                                  SHA-512:9193E7BBE7EB633367B39513B48EFED11FD457DCED070A8708F8572D0AB248CBFF37254599A6BFB469637E0DCCBCD986347C6B6075C06FAE2AF08387B560DEA0
                                                                  Malicious:false
                                                                  Preview:.f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5...............
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):16
                                                                  Entropy (8bit):3.2743974703476995
                                                                  Encrypted:false
                                                                  SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                  MD5:46295CAC801E5D4857D09837238A6394
                                                                  SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                  SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                  SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                  Malicious:false
                                                                  Preview:MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):303
                                                                  Entropy (8bit):5.196463125597244
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52Ua0oM1N723oH+Tcwtt6FB2KLlL52UatI8yq2PN723oH+Tcwtt65IFUv:NpaHsaYeb8FFL1patDyvVaYeb8WFUv
                                                                  MD5:DA86DDF6343284130828BFFED2D1AC5E
                                                                  SHA1:C7B520681A1222C17C7CBB5ECA1B54DAA0928D5A
                                                                  SHA-256:5D0950FC3E8A39660795247C557C97F8BBEA14E7810807C541C6071C3DF20129
                                                                  SHA-512:7B2AC1C4BDEC1AD8F4E20B7411D7CB5F77A8020235A58A25F23D8BCC95AF356C6D4F827AD35746E92861F3A0C1F7E3A2CB52BC4DD81BD26378B464EAFC5D8759
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:14:56.591 1b94 Creating DB C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Extension Scripts since it was missing..2024/08/29-18:14:56.606 1b94 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Extension Scripts/MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:OpenPGP Secret Key
                                                                  Category:dropped
                                                                  Size (bytes):41
                                                                  Entropy (8bit):4.704993772857998
                                                                  Encrypted:false
                                                                  SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                                                                  MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                                                                  SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                                                                  SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                                                                  SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                                                                  Malicious:false
                                                                  Preview:.|.."....leveldb.BytewiseComparator......
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):16
                                                                  Entropy (8bit):3.2743974703476995
                                                                  Encrypted:false
                                                                  SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                  MD5:46295CAC801E5D4857D09837238A6394
                                                                  SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                  SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                  SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                  Malicious:false
                                                                  Preview:MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):513
                                                                  Entropy (8bit):1.8784775129881184
                                                                  Encrypted:false
                                                                  SSDEEP:6:qTCTCTCTCTCTCTCTCTCTCTCTCTCTCTCTCTCTCTCTCTCTCTCTCTCTCT:qWWWWWWWWWWWWWWWWWWWWWWWWWW
                                                                  MD5:C92EABB217D45C77F8D52725AD3758F0
                                                                  SHA1:43B422AC002BB445E2E9B2C27D74C27CD70C9975
                                                                  SHA-256:388C5C95F0F54F32B499C03A37AABFA5E0A31030EC70D0956A239942544B0EEA
                                                                  SHA-512:DFD5D1C614F0EBFF97F354DFC23266655C336B9B7112781D7579057814B4503D4B63AB1263258BDA3358E5EE9457429C1A2451B22261A1F1E2D8657F31240D3C
                                                                  Malicious:false
                                                                  Preview:.f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5...............
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):16
                                                                  Entropy (8bit):3.2743974703476995
                                                                  Encrypted:false
                                                                  SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                  MD5:46295CAC801E5D4857D09837238A6394
                                                                  SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                  SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                  SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                  Malicious:false
                                                                  Preview:MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):299
                                                                  Entropy (8bit):5.135917332650433
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52UYV6Ugdc81N723oH+TcwttYg2KLlL52UYVzU+q2PN723oH+TcwttNIFUv:NpRc8aYebJL1pOpvVaYeb0FUv
                                                                  MD5:0F262BB96A2B90D2897051A629562E02
                                                                  SHA1:6612D82C941FADBDBB4B69828339214EE1B0BAE1
                                                                  SHA-256:31AAD939C9A895C8A892FBCA61DA3BFEE071751F9DBF953185656661657CC8FB
                                                                  SHA-512:63653D644DA06399FE3675DF366C932926355BD41419EB4AADEF9EC3D5631A3D64287D83D51BCC12C0401E96DC463040618D35FA1E47CF8EC7C2C368A443727A
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:14:58.001 1be8 Creating DB C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Extension State since it was missing..2024/08/29-18:14:58.016 1be8 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Extension State/MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:OpenPGP Secret Key
                                                                  Category:dropped
                                                                  Size (bytes):41
                                                                  Entropy (8bit):4.704993772857998
                                                                  Encrypted:false
                                                                  SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                                                                  MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                                                                  SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                                                                  SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                                                                  SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                                                                  Malicious:false
                                                                  Preview:.|.."....leveldb.BytewiseComparator......
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 1, cookie 0x1, schema 4, UTF-8, version-valid-for 1
                                                                  Category:dropped
                                                                  Size (bytes):4096
                                                                  Entropy (8bit):0.3169096321222068
                                                                  Encrypted:false
                                                                  SSDEEP:3:lSWbNFl/sl+ltl4ltllOl83/XWEEabIDWzdWuAzTgdWj3FtFIU:l9bNFlEs1ok8fDEPDadUTgd81Z
                                                                  MD5:2554AD7847B0D04963FDAE908DB81074
                                                                  SHA1:F84ABD8D05D7B0DFB693485614ECF5204989B74A
                                                                  SHA-256:F6EF01E679B9096A7D8A0BD8151422543B51E65142119A9F3271F25F966E6C42
                                                                  SHA-512:13009172518387D77A67BBF86719527077BE9534D90CB06E7F34E1CCE7C40B49A185D892EE859A8BAFB69D5EBB6D667831A0FAFBA28AC1F44570C8B68F8C90A4
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 8, cookie 0x8, schema 4, UTF-8, version-valid-for 2
                                                                  Category:dropped
                                                                  Size (bytes):32768
                                                                  Entropy (8bit):0.40981274649195937
                                                                  Encrypted:false
                                                                  SSDEEP:24:TL1WK3iOvwxwwweePKmJIOAdQBVA/kjo/TJZwJ9OV3WOT/5eQQ:Tmm+/9ZW943WOT/
                                                                  MD5:1A7F642FD4F71A656BE75B26B2D9ED79
                                                                  SHA1:51BBF587FB0CCC2D726DDB95C96757CC2854CFAD
                                                                  SHA-256:B96B6DDC10C29496069E16089DB0AB6911D7C13B82791868D583897C6D317977
                                                                  SHA-512:FD14EADCF5F7AB271BE6D8EF682977D1A0B5199A142E4AB353614F2F96AE9B49A6F35A19CC237489F297141994A4A16B580F88FAC44486FCB22C05B2F1C3F7D1
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ ..........................................................................j............M.....8...b..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 10, cookie 0x8, schema 4, UTF-8, version-valid-for 1
                                                                  Category:dropped
                                                                  Size (bytes):20480
                                                                  Entropy (8bit):0.6975083372685086
                                                                  Encrypted:false
                                                                  SSDEEP:24:LLiZxh0GY/l1rWR1PmCx9fZjsBX+T6UwcE85fBmI:EBmw6fU1zBmI
                                                                  MD5:F5BBD8449A9C3AB28AC2DE45E9059B01
                                                                  SHA1:C569D730853C33234AF2402E69C19E0C057EC165
                                                                  SHA-256:825FF36C4431084C76F3D22CE0C75FA321EA680D1F8548706B43E60FCF5B566E
                                                                  SHA-512:96ACDED5A51236630A64FAE91B8FA9FAB43E22E0C1BCB80C2DD8D4829E03FBFA75AA6438053599A42EC4BBCF805BF0B1E6DFF9069B2BA182AD0BB30F2542FD3F
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g....._.c...~.2.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................s...;+...indexfavicon_bitmaps_icon_idfavico
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
                                                                  Category:dropped
                                                                  Size (bytes):8192
                                                                  Entropy (8bit):0.01057775872642915
                                                                  Encrypted:false
                                                                  SSDEEP:3:MsFl:/F
                                                                  MD5:CF89D16BB9107C631DAABF0C0EE58EFB
                                                                  SHA1:3AE5D3A7CF1F94A56E42F9A58D90A0B9616AE74B
                                                                  SHA-256:D6A5FE39CD672781B256E0E3102F7022635F1D4BB7CFCC90A80FFFE4D0F3877E
                                                                  SHA-512:8CB5B059C8105EB91E74A7D5952437AAA1ADA89763C5843E7B0F1B93D9EBE15ED40F287C652229291FAC02D712CF7FF5ECECEF276BA0D7DDC35558A3EC3F77B0
                                                                  Malicious:false
                                                                  Preview:............$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):270336
                                                                  Entropy (8bit):0.0012471779557650352
                                                                  Encrypted:false
                                                                  SSDEEP:3:MsEllllkEthXllkl2zE:/M/xT02z
                                                                  MD5:F50F89A0A91564D0B8A211F8921AA7DE
                                                                  SHA1:112403A17DD69D5B9018B8CEDE023CB3B54EAB7D
                                                                  SHA-256:B1E963D702392FB7224786E7D56D43973E9B9EFD1B89C17814D7C558FFC0CDEC
                                                                  SHA-512:BF8CDA48CF1EC4E73F0DD1D4FA5562AF1836120214EDB74957430CD3E4A2783E801FA3F4ED2AFB375257CAEED4ABE958265237D6E0AACF35A9EDE7A2E8898D58
                                                                  Malicious:false
                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):8192
                                                                  Entropy (8bit):0.011852361981932763
                                                                  Encrypted:false
                                                                  SSDEEP:3:MsHlDll:/H
                                                                  MD5:0962291D6D367570BEE5454721C17E11
                                                                  SHA1:59D10A893EF321A706A9255176761366115BEDCB
                                                                  SHA-256:EC1702806F4CC7C42A82FC2B38E89835FDE7C64BB32060E0823C9077CA92EFB7
                                                                  SHA-512:F555E961B69E09628EAF9C61F465871E6984CD4D31014F954BB747351DAD9CEA6D17C1DB4BCA2C1EB7F187CB5F3C0518748C339C8B43BBD1DBD94AEAA16F58ED
                                                                  Malicious:false
                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):8192
                                                                  Entropy (8bit):0.012340643231932763
                                                                  Encrypted:false
                                                                  SSDEEP:3:MsGl3ll:/y
                                                                  MD5:41876349CB12D6DB992F1309F22DF3F0
                                                                  SHA1:5CF26B3420FC0302CD0A71E8D029739B8765BE27
                                                                  SHA-256:E09F42C398D688DCE168570291F1F92D079987DEDA3099A34ADB9E8C0522B30C
                                                                  SHA-512:E9A4FC1F7CB6AE2901F8E02354A92C4AAA7A53C640DCF692DB42A27A5ACC2A3BFB25A0DE0EB08AB53983132016E7D43132EA4292E439BB636AAFD53FB6EF907E
                                                                  Malicious:false
                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                                                                  Category:dropped
                                                                  Size (bytes):262512
                                                                  Entropy (8bit):9.553120663130604E-4
                                                                  Encrypted:false
                                                                  SSDEEP:3:LsNlX:Ls3
                                                                  MD5:E811FACAA4A12A7389E792CA190BADAF
                                                                  SHA1:D7B57F26284B782D3201056343A8C4A27FE4D50B
                                                                  SHA-256:E2CC048552F53309A018FBCCEC7B5310817ACCE17B9A15415C9DD7F7C3961FE2
                                                                  SHA-512:2F801EC793C83048E7E448B8FBC6E5321AF9BF0116D7C44B5BCA6BDFF30776B01F8F6B119795C49AFC8570B487FA33387EA5E834F2796A947CF26AF45AFB0426
                                                                  Malicious:false
                                                                  Preview:........................................&...p./.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
                                                                  Category:dropped
                                                                  Size (bytes):155648
                                                                  Entropy (8bit):0.5407252242845243
                                                                  Encrypted:false
                                                                  SSDEEP:96:OgWyejzH+bDoYysX0IxQzZkHtpVJNlYDLjGQLBE3CeE0kE:OJhH+bDo3iN0Z2TVJkXBBE3yb
                                                                  MD5:7B955D976803304F2C0505431A0CF1CF
                                                                  SHA1:E29070081B18DA0EF9D98D4389091962E3D37216
                                                                  SHA-256:987FB9BFC2A84C4C605DCB339D4935B52A969B24E70D6DEAC8946BA9A2B432DC
                                                                  SHA-512:CE2F1709F39683BE4131125BED409103F5EDF1DED545649B186845817C0D69E3D0B832B236F7C4FC09AB7F7BB88E7C9F1E4F7047D1AF56D429752D4D8CBED47A
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ .......&..................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):8720
                                                                  Entropy (8bit):0.21861961848037048
                                                                  Encrypted:false
                                                                  SSDEEP:3:ZljtFlljq7A/mhWJFuQ3yy7IOWUNeA/4dweytllrE9SFcTp4AGbNCV9RUIZA:k75fOyAQd0Xi99pEYc
                                                                  MD5:1FAD8A81DBCD51DB7BE90C7325ADB014
                                                                  SHA1:90F09ECE28CD9EE44889B0D2770E17CBA27CDFD9
                                                                  SHA-256:070F14C724AF0ED1250E1C65B6FC1FB7123450C3FC071C9ED438D17F4CA0E199
                                                                  SHA-512:216C9F6737FC56241F11B0D14F8FE81CD8F2A8C20CF567E8F970FC4558352C341CB09F4481F427D9E2D44D32000DB5F8E6DB013735BDA6A1C06DCF353A1DC3AE
                                                                  Malicious:false
                                                                  Preview:............U.;....&....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 2
                                                                  Category:dropped
                                                                  Size (bytes):28672
                                                                  Entropy (8bit):0.33890226319329847
                                                                  Encrypted:false
                                                                  SSDEEP:12:TLMfly7aoxrRGcAkSQdC6ae1//fxEjkE/RFL2iFV1eHFxOUwa5qgufTsZ75fOSI:TLYcjr0+Pdajk+FZH1W6UwccI5fBI
                                                                  MD5:971F4C153D386AC7ED39363C31E854FC
                                                                  SHA1:339841CA0088C9EABDE4AACC8567D2289CCB9544
                                                                  SHA-256:B6468DA6EC0EAE580B251692CFE24620D39412954421BBFDECB13EF21BE7BC88
                                                                  SHA-512:1A4DD0C2BE163AAB3B81D63DEB4A7DB6421612A6CF1A5685951F86B7D5A40B67FC6585B7E52AA0CC20FF47349F15DFF0C9038086E3A7C78AE0FFBEE6D8AA7F7E
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...:.8....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):16
                                                                  Entropy (8bit):3.2743974703476995
                                                                  Encrypted:false
                                                                  SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                  MD5:46295CAC801E5D4857D09837238A6394
                                                                  SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                  SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                  SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                  Malicious:false
                                                                  Preview:MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):16
                                                                  Entropy (8bit):3.2743974703476995
                                                                  Encrypted:false
                                                                  SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                  MD5:46295CAC801E5D4857D09837238A6394
                                                                  SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                  SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                  SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                  Malicious:false
                                                                  Preview:MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):381
                                                                  Entropy (8bit):5.22558602487685
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52UDz81N723oH+TcwtRage8Y55HEZzXELIx2KLlL52UT+q2PN723oH+TcwtRagX:Np/8aYebRrcHEZrEkVL1pqvVaYebRrcU
                                                                  MD5:9805564C0B551CBE8C5A7DF5D1A4DFD7
                                                                  SHA1:FB552EEFE12F136FECF2DDB8D2270EC6E5AE118F
                                                                  SHA-256:890235E5AAF050B058025A7E6B8C0B7EF777C5555756026A40A76704B567FA16
                                                                  SHA-512:01472D65C5EE2736C665D011F91DD63A5C06731A4C83498F5B0A9BF64EC2FE56B18C750D432AA3E4F76269D758FEE1923A3397BA0F78050C631C076D652DE686
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:14:59.037 ab8 Creating DB C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold since it was missing..2024/08/29-18:14:59.049 ab8 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold/MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:OpenPGP Secret Key
                                                                  Category:dropped
                                                                  Size (bytes):41
                                                                  Entropy (8bit):4.704993772857998
                                                                  Encrypted:false
                                                                  SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                                                                  MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                                                                  SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                                                                  SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                                                                  SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                                                                  Malicious:false
                                                                  Preview:.|.."....leveldb.BytewiseComparator......
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):16
                                                                  Entropy (8bit):3.2743974703476995
                                                                  Encrypted:false
                                                                  SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                  MD5:46295CAC801E5D4857D09837238A6394
                                                                  SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                  SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                  SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                  Malicious:false
                                                                  Preview:MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):16
                                                                  Entropy (8bit):3.2743974703476995
                                                                  Encrypted:false
                                                                  SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                  MD5:46295CAC801E5D4857D09837238A6394
                                                                  SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                  SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                  SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                  Malicious:false
                                                                  Preview:MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):311
                                                                  Entropy (8bit):5.1804638178834574
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52UYVnJh1N723oH+TcwtRa2jM8B2KLlL52UYum34q2PN723oH+TcwtRa2jMGIF2:Np8JhaYebRjFL1pVPvVaYebREFUv
                                                                  MD5:B1FC46CA8B238FE2C76A514979C5D874
                                                                  SHA1:CC4D33F9ABC21046E98D32695B32BF6E419A080C
                                                                  SHA-256:26DAABBAE351260558A5A1C5073B4DA377377D9F576E518B39AEB941844796F5
                                                                  SHA-512:2D0E6D697B6ABB453994B10CA404F75B49FC7BC96DB8E06ED35A6F6C3D7B6D09B7DA6324446DB052CD451C0886AC512A2E15902474497103731CC169F1A4C0D0
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:14:58.071 1c80 Creating DB C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Local Storage\leveldb since it was missing..2024/08/29-18:14:58.787 1c80 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Local Storage\leveldb/MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:OpenPGP Secret Key
                                                                  Category:dropped
                                                                  Size (bytes):41
                                                                  Entropy (8bit):4.704993772857998
                                                                  Encrypted:false
                                                                  SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                                                                  MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                                                                  SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                                                                  SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                                                                  SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                                                                  Malicious:false
                                                                  Preview:.|.."....leveldb.BytewiseComparator......
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                  Category:dropped
                                                                  Size (bytes):51200
                                                                  Entropy (8bit):0.8745933985004888
                                                                  Encrypted:false
                                                                  SSDEEP:96:y8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:y8yLG7IwRWf4
                                                                  MD5:7A9BF0D6AB6967E057DB6BA4EE45243B
                                                                  SHA1:0C8775DE3A37242BA7CF2FAE40613E935970928F
                                                                  SHA-256:E3C8C78A681C3CB37BE10D4B3D9E97E05D438DCF71FBF9CE4F388A3F3218BE8F
                                                                  SHA-512:42BCF1D8588E89E9DE413A4AE5C973D5F149F09273CB293EDF53AB2EF94D493310F19F10CA06EBDF6893CB46AA234A5BAA1C4CD1D531F26C1B406B7AE459EEDA
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 11, cookie 0x6, schema 4, UTF-8, version-valid-for 3
                                                                  Category:dropped
                                                                  Size (bytes):45056
                                                                  Entropy (8bit):0.40293591932113104
                                                                  Encrypted:false
                                                                  SSDEEP:24:TLVgTjDk5Yk8k+/kCkzD3zzbLGfIzLihje90xq/WMFFfeFzfXVVlYWOT/CUFSe:Tmo9n+8dv/qALihje9kqL42WOT/9F
                                                                  MD5:ADC0CFB8A1A20DE2C4AB738B413CBEA4
                                                                  SHA1:238EF489E5FDC6EBB36F09D415FB353350E7097B
                                                                  SHA-256:7C071E36A64FB1881258712C9880F155D9CBAC693BADCC391A1CB110C257CC37
                                                                  SHA-512:38C8B7293B8F7BEF03299BAFB981EEEE309945B1BDE26ACDAD6FDD63247C21CA04D493A1DDAFC3B9A1904EFED998E9C7C0C8E98506FD4AC0AB252DFF34566B66
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ ..........................................................................j.......=......\.t.+.>...,...=........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):170
                                                                  Entropy (8bit):4.89042451592505
                                                                  Encrypted:false
                                                                  SSDEEP:3:YLb9N+eAXRfHDHERW6JfYoR6oJbTHJHcBYMKWKWMS7PMVKJq0nMb1KKtiVY:YHpo03h6ub74MS7PMVKJTnMRK3VY
                                                                  MD5:4117E5247EF55EA8839672284FF0AB95
                                                                  SHA1:90F5CE007ABA44EB8E4C32B4A738055DEDA39474
                                                                  SHA-256:C1C38C8620401B15F569897943EB1B7989BD9C159320721AF21120E510BFA46E
                                                                  SHA-512:CD95D7385B1B0921B3E4797D541C7ECC43957E3B6C7D04156B6B6B939B35806C6C539264340127266CAC1B363F34A432DA9B94ADAEA1B47BEBDA9CB1BB2328D2
                                                                  Malicious:false
                                                                  Preview:{"net":{"http_server_properties":{"servers":[],"supports_quic":{"address":"192.168.2.6","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):40
                                                                  Entropy (8bit):4.1275671571169275
                                                                  Encrypted:false
                                                                  SSDEEP:3:Y2ktGMxkAXWMSN:Y2xFMSN
                                                                  MD5:20D4B8FA017A12A108C87F540836E250
                                                                  SHA1:1AC617FAC131262B6D3CE1F52F5907E31D5F6F00
                                                                  SHA-256:6028BD681DBF11A0A58DDE8A0CD884115C04CAA59D080BA51BDE1B086CE0079D
                                                                  SHA-512:507B2B8A8A168FF8F2BDAFA5D9D341C44501A5F17D9F63F3D43BD586BC9E8AE33221887869FA86F845B7D067CB7D2A7009EFD71DDA36E03A40A74FEE04B86856
                                                                  Malicious:false
                                                                  Preview:{"SDCH":{"dictionaries":{},"version":2}}
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):170
                                                                  Entropy (8bit):4.89042451592505
                                                                  Encrypted:false
                                                                  SSDEEP:3:YLb9N+eAXRfHDHERW6JfYoR6oJbTHJHcBYMKWKWMS7PMVKJq0nMb1KKqk1Yn:YHpo03h6ub74MS7PMVKJTnMRKXk1Yn
                                                                  MD5:6DD915838CD3AE1E1523CCFE2DD88486
                                                                  SHA1:92DC2D1633DDF0E7C4ADF403F5FFA345BF07ADEB
                                                                  SHA-256:6A6CA963A04472654E06B09FC5333B2EA35AA7A37A73CA3E5059366D745D748D
                                                                  SHA-512:DA461C02132EEC128B15FA2A2B6E3442D34C9AA69E251C7C07FE1839AEC4F7618810C401357B589A990F85087746505A219742DA87BE9BAB304C97E2C1C41295
                                                                  Malicious:false
                                                                  Preview:{"net":{"http_server_properties":{"servers":[],"supports_quic":{"address":"192.168.2.6","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"3G"}}}
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):2
                                                                  Entropy (8bit):1.0
                                                                  Encrypted:false
                                                                  SSDEEP:3:H:H
                                                                  MD5:D751713988987E9331980363E24189CE
                                                                  SHA1:97D170E1550EEE4AFC0AF065B78CDA302A97674C
                                                                  SHA-256:4F53CDA18C2BAA0C0354BB5F9A3ECBE5ED12AB4D8E11BA873C2F11161202B945
                                                                  SHA-512:B25B294CB4DEB69EA00A4C3CF3113904801B6015E5956BD019A8570B1FE1D6040E944EF3CDEE16D0A46503CA6E659A25F21CF9CEDDC13F352A3C98138C15D6AF
                                                                  Malicious:false
                                                                  Preview:[]
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                                  Category:dropped
                                                                  Size (bytes):20480
                                                                  Entropy (8bit):0.6732424250451717
                                                                  Encrypted:false
                                                                  SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                                  MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                                  SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                                  SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                                  SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):59
                                                                  Entropy (8bit):4.619434150836742
                                                                  Encrypted:false
                                                                  SSDEEP:3:YLbkVKJq0nMb1KKtiVY:YHkVKJTnMRK3VY
                                                                  MD5:2800881C775077E1C4B6E06BF4676DE4
                                                                  SHA1:2873631068C8B3B9495638C865915BE822442C8B
                                                                  SHA-256:226EEC4486509917AA336AFEBD6FF65777B75B65F1FB06891D2A857A9421A974
                                                                  SHA-512:E342407AB65CC68F1B3FD706CD0A37680A0864FFD30A6539730180EDE2CDCD732CC97AE0B9EF7DB12DA5C0F83E429DF0840DBF7596ACA859A0301665E517377B
                                                                  Malicious:false
                                                                  Preview:{"net":{"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):59
                                                                  Entropy (8bit):4.619434150836742
                                                                  Encrypted:false
                                                                  SSDEEP:3:YLbkVKJq0nMb1KKtiVY:YHkVKJTnMRK3VY
                                                                  MD5:2800881C775077E1C4B6E06BF4676DE4
                                                                  SHA1:2873631068C8B3B9495638C865915BE822442C8B
                                                                  SHA-256:226EEC4486509917AA336AFEBD6FF65777B75B65F1FB06891D2A857A9421A974
                                                                  SHA-512:E342407AB65CC68F1B3FD706CD0A37680A0864FFD30A6539730180EDE2CDCD732CC97AE0B9EF7DB12DA5C0F83E429DF0840DBF7596ACA859A0301665E517377B
                                                                  Malicious:false
                                                                  Preview:{"net":{"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):59
                                                                  Entropy (8bit):4.619434150836742
                                                                  Encrypted:false
                                                                  SSDEEP:3:YLbkVKJq0nMb1KKtiVY:YHkVKJTnMRK3VY
                                                                  MD5:2800881C775077E1C4B6E06BF4676DE4
                                                                  SHA1:2873631068C8B3B9495638C865915BE822442C8B
                                                                  SHA-256:226EEC4486509917AA336AFEBD6FF65777B75B65F1FB06891D2A857A9421A974
                                                                  SHA-512:E342407AB65CC68F1B3FD706CD0A37680A0864FFD30A6539730180EDE2CDCD732CC97AE0B9EF7DB12DA5C0F83E429DF0840DBF7596ACA859A0301665E517377B
                                                                  Malicious:false
                                                                  Preview:{"net":{"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 9, cookie 0x4, schema 4, UTF-8, version-valid-for 6
                                                                  Category:dropped
                                                                  Size (bytes):36864
                                                                  Entropy (8bit):0.7606412643057525
                                                                  Encrypted:false
                                                                  SSDEEP:48:TaIopKWurJNVr1GJmA8pv82pfurJNVrdHXuccaurJN2VrJ1n4n1GmzNGU1cSBkqy:uIEumQv8m1ccnvS60
                                                                  MD5:55996589BACF2B557CF118876CC2AD00
                                                                  SHA1:98DE5543E267E235321523B804B40067E3CBFC44
                                                                  SHA-256:043B5E0E4ECCD05C8AFF6506A83B1FF938AA57C5AF026C424E76C8CB2AEAF6AC
                                                                  SHA-512:3343776F3803580ABB64F471BCF29279A0C52D8AC8F42A727C44A84E9A3F8D177EBA5FE8AB0D3CC4BD85EF986C321C9A60DB8AF7AA2EC596F12A7E344B2E90CB
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...D.........7............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):2
                                                                  Entropy (8bit):1.0
                                                                  Encrypted:false
                                                                  SSDEEP:3:H:H
                                                                  MD5:D751713988987E9331980363E24189CE
                                                                  SHA1:97D170E1550EEE4AFC0AF065B78CDA302A97674C
                                                                  SHA-256:4F53CDA18C2BAA0C0354BB5F9A3ECBE5ED12AB4D8E11BA873C2F11161202B945
                                                                  SHA-512:B25B294CB4DEB69EA00A4C3CF3113904801B6015E5956BD019A8570B1FE1D6040E944EF3CDEE16D0A46503CA6E659A25F21CF9CEDDC13F352A3C98138C15D6AF
                                                                  Malicious:false
                                                                  Preview:[]
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):2
                                                                  Entropy (8bit):1.0
                                                                  Encrypted:false
                                                                  SSDEEP:3:H:H
                                                                  MD5:D751713988987E9331980363E24189CE
                                                                  SHA1:97D170E1550EEE4AFC0AF065B78CDA302A97674C
                                                                  SHA-256:4F53CDA18C2BAA0C0354BB5F9A3ECBE5ED12AB4D8E11BA873C2F11161202B945
                                                                  SHA-512:B25B294CB4DEB69EA00A4C3CF3113904801B6015E5956BD019A8570B1FE1D6040E944EF3CDEE16D0A46503CA6E659A25F21CF9CEDDC13F352A3C98138C15D6AF
                                                                  Malicious:false
                                                                  Preview:[]
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):40
                                                                  Entropy (8bit):4.1275671571169275
                                                                  Encrypted:false
                                                                  SSDEEP:3:Y2ktGMxkAXWMSN:Y2xFMSN
                                                                  MD5:20D4B8FA017A12A108C87F540836E250
                                                                  SHA1:1AC617FAC131262B6D3CE1F52F5907E31D5F6F00
                                                                  SHA-256:6028BD681DBF11A0A58DDE8A0CD884115C04CAA59D080BA51BDE1B086CE0079D
                                                                  SHA-512:507B2B8A8A168FF8F2BDAFA5D9D341C44501A5F17D9F63F3D43BD586BC9E8AE33221887869FA86F845B7D067CB7D2A7009EFD71DDA36E03A40A74FEE04B86856
                                                                  Malicious:false
                                                                  Preview:{"SDCH":{"dictionaries":{},"version":2}}
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 3
                                                                  Category:dropped
                                                                  Size (bytes):36864
                                                                  Entropy (8bit):0.36515621748816035
                                                                  Encrypted:false
                                                                  SSDEEP:24:TLH3lIIAoDJ84l5lDlnDMlRlyKDtM6UwccWfp15fBIe:Tb31DtX5nDOvyKDhU1cSB
                                                                  MD5:25363ADC3C9D98BAD1A33D0792405CBF
                                                                  SHA1:D06E343087D86EF1A06F7479D81B26C90A60B5C3
                                                                  SHA-256:6E019B8B9E389216D5BDF1F2FE63F41EF98E71DA101F2A6BE04F41CC5954532D
                                                                  SHA-512:CF7EEE35D0E00945AF221BEC531E8BF06C08880DA00BD103FA561BC069D7C6F955CBA3C1C152A4884601E5A670B7487D39B4AE9A4D554ED8C14F129A74E555F7
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ ..........................................................................j.......X..g...}.....$.X..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):59
                                                                  Entropy (8bit):4.619434150836742
                                                                  Encrypted:false
                                                                  SSDEEP:3:YLbkVKJq0nMb1KKtiVY:YHkVKJTnMRK3VY
                                                                  MD5:2800881C775077E1C4B6E06BF4676DE4
                                                                  SHA1:2873631068C8B3B9495638C865915BE822442C8B
                                                                  SHA-256:226EEC4486509917AA336AFEBD6FF65777B75B65F1FB06891D2A857A9421A974
                                                                  SHA-512:E342407AB65CC68F1B3FD706CD0A37680A0864FFD30A6539730180EDE2CDCD732CC97AE0B9EF7DB12DA5C0F83E429DF0840DBF7596ACA859A0301665E517377B
                                                                  Malicious:false
                                                                  Preview:{"net":{"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):2
                                                                  Entropy (8bit):1.0
                                                                  Encrypted:false
                                                                  SSDEEP:3:H:H
                                                                  MD5:D751713988987E9331980363E24189CE
                                                                  SHA1:97D170E1550EEE4AFC0AF065B78CDA302A97674C
                                                                  SHA-256:4F53CDA18C2BAA0C0354BB5F9A3ECBE5ED12AB4D8E11BA873C2F11161202B945
                                                                  SHA-512:B25B294CB4DEB69EA00A4C3CF3113904801B6015E5956BD019A8570B1FE1D6040E944EF3CDEE16D0A46503CA6E659A25F21CF9CEDDC13F352A3C98138C15D6AF
                                                                  Malicious:false
                                                                  Preview:[]
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 2
                                                                  Category:dropped
                                                                  Size (bytes):20480
                                                                  Entropy (8bit):0.46731661083066856
                                                                  Encrypted:false
                                                                  SSDEEP:12:TL1QAFUxOUDaabZXiDiIF8izX4fhhdWeci2oesJaYi3is25q0S9K0xHZ75fOV:TLiOUOq0afDdWec9sJf5Q7J5fc
                                                                  MD5:E93ACF0820CA08E5A5D2D159729F70E3
                                                                  SHA1:2C1A4D4924B9AEC1A796F108607404B000877C5D
                                                                  SHA-256:F2267FDA7F45499F7A01186B75CEFB799F8D2BC97E2E9B5068952D477294302C
                                                                  SHA-512:3BF36C20E04DCF1C16DC794E272F82F68B0DE43F16B4A9746B63B6D6BBC953B00BD7111CDA7AFE85CEBB2C447145483A382B15E2B0A5B36026C3441635D4E50C
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):6296
                                                                  Entropy (8bit):4.975102812737503
                                                                  Encrypted:false
                                                                  SSDEEP:96:stHqfIis13b946bzq8zUs85eh6Cb7/x+6MhmuecmAeZNe2Mw/EJ:stHws/bzqkUs88bV+FiAdPwMJ
                                                                  MD5:4ACD0DBBB64BF8028AC6A24BCA545879
                                                                  SHA1:143E831FB13163E43F58797FBD971A3E0F1A0FCF
                                                                  SHA-256:35C572786A625BE44E78F69A1A84022FB53AEDC590B582116BFA218DC581906C
                                                                  SHA-512:D87B9806722E0418146BEFF2C16240EE9D6B47F913D50F7F361E672C7EA0B649DCC61B75956AA5D565ABE709B908CADD9F93B7B82F0EE973650E0F7CCF8EBF21
                                                                  Malicious:false
                                                                  Preview:{"aadc_info":{"age_group":0},"account_tracker_service_last_update":"13369443297741956","alternate_error_pages":{"backup":true},"apps":{"shortcuts_arch":"","shortcuts_version":0},"arbitration_using_experiment_config":false,"browser":{"available_dark_theme_options":"All","has_seen_welcome_page":false},"continuous_migration":{"ci_correction_for_holdout_treatment_state":1},"countryid_at_install":17224,"custom_links":{"list":[]},"domain_diversity":{"last_reporting_timestamp":"13369443297748189"},"download":{"default_directory":"C:\\Users\\user\\AppData\\Local\\Microsoft\\Edge\\KioskDownloads\\","directory_upgrade":true},"dual_user":{"consumer_mode":{"ie_user":false},"consumer_site_list_with_ie_entries":false,"consumer_sitelist_location":"","consumer_sitelist_version":"","external_consumer_shared_cookie_data":{},"shared_cookie_data":{},"sitelist_data_2":{},"sitelist_has_consumer_data":false,"sitelist_has_enterprise_data":false,"sitelist_location":"","sitelist_source":0,"sitelist_versio
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):6296
                                                                  Entropy (8bit):4.975102812737503
                                                                  Encrypted:false
                                                                  SSDEEP:96:stHqfIis13b946bzq8zUs85eh6Cb7/x+6MhmuecmAeZNe2Mw/EJ:stHws/bzqkUs88bV+FiAdPwMJ
                                                                  MD5:4ACD0DBBB64BF8028AC6A24BCA545879
                                                                  SHA1:143E831FB13163E43F58797FBD971A3E0F1A0FCF
                                                                  SHA-256:35C572786A625BE44E78F69A1A84022FB53AEDC590B582116BFA218DC581906C
                                                                  SHA-512:D87B9806722E0418146BEFF2C16240EE9D6B47F913D50F7F361E672C7EA0B649DCC61B75956AA5D565ABE709B908CADD9F93B7B82F0EE973650E0F7CCF8EBF21
                                                                  Malicious:false
                                                                  Preview:{"aadc_info":{"age_group":0},"account_tracker_service_last_update":"13369443297741956","alternate_error_pages":{"backup":true},"apps":{"shortcuts_arch":"","shortcuts_version":0},"arbitration_using_experiment_config":false,"browser":{"available_dark_theme_options":"All","has_seen_welcome_page":false},"continuous_migration":{"ci_correction_for_holdout_treatment_state":1},"countryid_at_install":17224,"custom_links":{"list":[]},"domain_diversity":{"last_reporting_timestamp":"13369443297748189"},"download":{"default_directory":"C:\\Users\\user\\AppData\\Local\\Microsoft\\Edge\\KioskDownloads\\","directory_upgrade":true},"dual_user":{"consumer_mode":{"ie_user":false},"consumer_site_list_with_ie_entries":false,"consumer_sitelist_location":"","consumer_sitelist_version":"","external_consumer_shared_cookie_data":{},"shared_cookie_data":{},"sitelist_data_2":{},"sitelist_has_consumer_data":false,"sitelist_has_enterprise_data":false,"sitelist_location":"","sitelist_source":0,"sitelist_versio
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):6296
                                                                  Entropy (8bit):4.975102812737503
                                                                  Encrypted:false
                                                                  SSDEEP:96:stHqfIis13b946bzq8zUs85eh6Cb7/x+6MhmuecmAeZNe2Mw/EJ:stHws/bzqkUs88bV+FiAdPwMJ
                                                                  MD5:4ACD0DBBB64BF8028AC6A24BCA545879
                                                                  SHA1:143E831FB13163E43F58797FBD971A3E0F1A0FCF
                                                                  SHA-256:35C572786A625BE44E78F69A1A84022FB53AEDC590B582116BFA218DC581906C
                                                                  SHA-512:D87B9806722E0418146BEFF2C16240EE9D6B47F913D50F7F361E672C7EA0B649DCC61B75956AA5D565ABE709B908CADD9F93B7B82F0EE973650E0F7CCF8EBF21
                                                                  Malicious:false
                                                                  Preview:{"aadc_info":{"age_group":0},"account_tracker_service_last_update":"13369443297741956","alternate_error_pages":{"backup":true},"apps":{"shortcuts_arch":"","shortcuts_version":0},"arbitration_using_experiment_config":false,"browser":{"available_dark_theme_options":"All","has_seen_welcome_page":false},"continuous_migration":{"ci_correction_for_holdout_treatment_state":1},"countryid_at_install":17224,"custom_links":{"list":[]},"domain_diversity":{"last_reporting_timestamp":"13369443297748189"},"download":{"default_directory":"C:\\Users\\user\\AppData\\Local\\Microsoft\\Edge\\KioskDownloads\\","directory_upgrade":true},"dual_user":{"consumer_mode":{"ie_user":false},"consumer_site_list_with_ie_entries":false,"consumer_sitelist_location":"","consumer_sitelist_version":"","external_consumer_shared_cookie_data":{},"shared_cookie_data":{},"sitelist_data_2":{},"sitelist_has_consumer_data":false,"sitelist_has_enterprise_data":false,"sitelist_location":"","sitelist_source":0,"sitelist_versio
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):33
                                                                  Entropy (8bit):4.051821770808046
                                                                  Encrypted:false
                                                                  SSDEEP:3:YVXADAEvTLSJ:Y9AcEvHSJ
                                                                  MD5:2B432FEF211C69C745ACA86DE4F8E4AB
                                                                  SHA1:4B92DA8D4C0188CF2409500ADCD2200444A82FCC
                                                                  SHA-256:42B55D126D1E640B1ED7A6BDCB9A46C81DF461FA7E131F4F8C7108C2C61C14DE
                                                                  SHA-512:948502DE4DC89A7E9D2E1660451FCD0F44FD3816072924A44F145D821D0363233CC92A377DBA3A0A9F849E3C17B1893070025C369C8120083A622D025FE1EACF
                                                                  Malicious:false
                                                                  Preview:{"preferred_apps":[],"version":1}
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):182
                                                                  Entropy (8bit):4.2629097520179995
                                                                  Encrypted:false
                                                                  SSDEEP:3:RGXKRjg0QwVIWRKXECSAV6jDyhjgHGAW+LB2Z4MKLFE1SwhiFAfXQmWyKBPMwRgK:z3frsUpAQQgHGwB26MK8Sw06fXQmWtRT
                                                                  MD5:643E00B0186AA80523F8A6BED550A925
                                                                  SHA1:EC4056125D6F1A8890FFE01BFFC973C2F6ABD115
                                                                  SHA-256:A0C9ABAE18599F0A65FC654AD36251F6330794BEA66B718A09D8B297F3E38E87
                                                                  SHA-512:D91A934EAF7D9D669B8AD4452234DE6B23D15237CB4D251F2C78C8339CEE7B4F9BA6B8597E35FE8C81B3D6F64AE707C68FF492903C0EDC3E4BAF2C6B747E247D
                                                                  Malicious:false
                                                                  Preview:Microsoft Edge settings and storage represent user-selected preferences and information and MUST not be extracted, overwritten or modified except through Microsoft Edge defined APIs.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):24799
                                                                  Entropy (8bit):5.56568303943327
                                                                  Encrypted:false
                                                                  SSDEEP:768:eSPnYzWBYW5wqof4ra8F1+UoAYDCx9Tuqh0VfUC9xbog/OVPccIIFNnrwXmpGtu8:e+YzqYWaqofaau1jaFO70zt7
                                                                  MD5:5812BF2E4A6F364BADB4E48CE566C71F
                                                                  SHA1:3FF14DB27680284BE49D542D968F66B7DBA99466
                                                                  SHA-256:4F4F7640E973F76FAE9BE8369D9BB79C057F178967EACEB59B43D109A6D158E0
                                                                  SHA-512:C9795E16AD9E27B96993CD68D6BD1ED7DCCDA5A1CB0C5CE3BF7132991706895079431CE472C8EC774BE9B91F27193A84EF0BBCFFBBA637DC31725B6B92610339
                                                                  Malicious:false
                                                                  Preview:{"edge_fundamentals_appdefaults":{"ess_lightweight_version":101},"ess_kv_states":{"restore_on_startup":{"closed_notification":false,"decrypt_success":true,"key":"restore_on_startup","notification_popup_count":0},"startup_urls":{"closed_notification":false,"decrypt_success":true,"key":"startup_urls","notification_popup_count":0},"template_url_data":{"closed_notification":false,"decrypt_success":true,"key":"template_url_data","notification_popup_count":0}},"extensions":{"settings":{"ahfgeienlihckogmohjhadlkjgocpleb":{"active_permissions":{"api":["management","system.display","system.storage","webstorePrivate","system.cpu","system.memory","system.network"],"explicit_host":[],"manifest_permissions":[],"scriptable_host":[]},"app_launcher_ordinal":"t","commands":{},"content_settings":[],"creation_flags":1,"events":[],"first_install_time":"13369443296462281","from_webstore":false,"incognito_content_settings":[],"incognito_preferences":{},"last_update_time":"13369443296462281","location":5,"ma
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):24799
                                                                  Entropy (8bit):5.56568303943327
                                                                  Encrypted:false
                                                                  SSDEEP:768:eSPnYzWBYW5wqof4ra8F1+UoAYDCx9Tuqh0VfUC9xbog/OVPccIIFNnrwXmpGtu8:e+YzqYWaqofaau1jaFO70zt7
                                                                  MD5:5812BF2E4A6F364BADB4E48CE566C71F
                                                                  SHA1:3FF14DB27680284BE49D542D968F66B7DBA99466
                                                                  SHA-256:4F4F7640E973F76FAE9BE8369D9BB79C057F178967EACEB59B43D109A6D158E0
                                                                  SHA-512:C9795E16AD9E27B96993CD68D6BD1ED7DCCDA5A1CB0C5CE3BF7132991706895079431CE472C8EC774BE9B91F27193A84EF0BBCFFBBA637DC31725B6B92610339
                                                                  Malicious:false
                                                                  Preview:{"edge_fundamentals_appdefaults":{"ess_lightweight_version":101},"ess_kv_states":{"restore_on_startup":{"closed_notification":false,"decrypt_success":true,"key":"restore_on_startup","notification_popup_count":0},"startup_urls":{"closed_notification":false,"decrypt_success":true,"key":"startup_urls","notification_popup_count":0},"template_url_data":{"closed_notification":false,"decrypt_success":true,"key":"template_url_data","notification_popup_count":0}},"extensions":{"settings":{"ahfgeienlihckogmohjhadlkjgocpleb":{"active_permissions":{"api":["management","system.display","system.storage","webstorePrivate","system.cpu","system.memory","system.network"],"explicit_host":[],"manifest_permissions":[],"scriptable_host":[]},"app_launcher_ordinal":"t","commands":{},"content_settings":[],"creation_flags":1,"events":[],"first_install_time":"13369443296462281","from_webstore":false,"incognito_content_settings":[],"incognito_preferences":{},"last_update_time":"13369443296462281","location":5,"ma
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):16
                                                                  Entropy (8bit):3.2743974703476995
                                                                  Encrypted:false
                                                                  SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                  MD5:46295CAC801E5D4857D09837238A6394
                                                                  SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                  SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                  SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                  Malicious:false
                                                                  Preview:MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):118
                                                                  Entropy (8bit):3.160877598186631
                                                                  Encrypted:false
                                                                  SSDEEP:3:S8ltHlS+QUl1ASEGhTFljljljl:S85aEFljljljl
                                                                  MD5:7733303DBE19B64C38F3DE4FE224BE9A
                                                                  SHA1:8CA37B38028A2DB895A4570E0536859B3CC5C279
                                                                  SHA-256:B10C1BA416A632CD57232C81A5C2E8EE76A716E0737D10EABE1D430BEC50739D
                                                                  SHA-512:E8CD965BCA0480DB9808CB1B461AC5BF5935C3CBF31C10FDF090D406F4BC4F3187D717199DCF94197B8DF24C1D6E4FF07241D8CFFFD9AEE06CCE9674F0220E29
                                                                  Malicious:false
                                                                  Preview:*...#................version.1..namespace-..&f.................&f.................&f.................&f...............
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):16
                                                                  Entropy (8bit):3.2743974703476995
                                                                  Encrypted:false
                                                                  SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                  MD5:46295CAC801E5D4857D09837238A6394
                                                                  SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                  SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                  SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                  Malicious:false
                                                                  Preview:MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):299
                                                                  Entropy (8bit):5.092826521003467
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52U/1N723oH+TcwtSQM72KLlL52UQ34q2PN723oH+TcwtSQMxIFUv:NpfaYeb0L1pBvVaYebrFUv
                                                                  MD5:C3EEA306CACA70FD184219B5DE34D406
                                                                  SHA1:C0C0399235BAE63C425795B4F5E268E5ED0E6CE9
                                                                  SHA-256:1FFCB4D0D5BECB4AC613E9B2648483B69845DBB2BF5030CD628A8CAB972A4EB6
                                                                  SHA-512:80EE50635791845019A8D7D1A391E42FD9F22392395AD8B5C7C18E8FA725CC4DB82100DB98543B4E544C03C705CCF6D4AAA8E6080382C51A96FD0B845C82228C
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:15:14.101 1c80 Creating DB C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Session Storage since it was missing..2024/08/29-18:15:14.155 1c80 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Session Storage/MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:OpenPGP Secret Key
                                                                  Category:dropped
                                                                  Size (bytes):41
                                                                  Entropy (8bit):4.704993772857998
                                                                  Encrypted:false
                                                                  SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                                                                  MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                                                                  SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                                                                  SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                                                                  SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                                                                  Malicious:false
                                                                  Preview:.|.."....leveldb.BytewiseComparator......
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 1
                                                                  Category:dropped
                                                                  Size (bytes):20480
                                                                  Entropy (8bit):0.44194574462308833
                                                                  Encrypted:false
                                                                  SSDEEP:12:TLiNCcUMskMVcIWGhWxBzEXx7AAQlvsdFxOUwa5qgufTJpbZ75fOS:TLisVMnYPhIY5Qlvsd6UwccNp15fB
                                                                  MD5:B35F740AA7FFEA282E525838EABFE0A6
                                                                  SHA1:A67822C17670CCE0BA72D3E9C8DA0CE755A3421A
                                                                  SHA-256:5D599596D116802BAD422497CF68BE59EEB7A9135E3ED1C6BEACC48F73827161
                                                                  SHA-512:05C0D33516B2C1AB6928FB34957AD3E03CB0A8B7EEC0FD627DD263589655A16DEA79100B6CC29095C3660C95FD2AFB2E4DD023F0597BD586DD664769CABB67F8
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g....."....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):16
                                                                  Entropy (8bit):3.2743974703476995
                                                                  Encrypted:false
                                                                  SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                  MD5:46295CAC801E5D4857D09837238A6394
                                                                  SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                  SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                  SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                  Malicious:false
                                                                  Preview:MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):40
                                                                  Entropy (8bit):3.473726825238924
                                                                  Encrypted:false
                                                                  SSDEEP:3:41tt0diERGn:et084G
                                                                  MD5:148079685E25097536785F4536AF014B
                                                                  SHA1:C5FF5B1B69487A9DD4D244D11BBAFA91708C1A41
                                                                  SHA-256:F096BC366A931FBA656BDCD77B24AF15A5F29FC53281A727C79F82C608ECFAB8
                                                                  SHA-512:C2556034EA51ABFBC172EB62FF11F5AC45C317F84F39D4B9E3DDBD0190DA6EF7FA03FE63631B97AB806430442974A07F8E81B5F7DC52D9F2FCDC669ADCA8D91F
                                                                  Malicious:false
                                                                  Preview:.On.!................database_metadata.1
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):16
                                                                  Entropy (8bit):3.2743974703476995
                                                                  Encrypted:false
                                                                  SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                  MD5:46295CAC801E5D4857D09837238A6394
                                                                  SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                  SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                  SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                  Malicious:false
                                                                  Preview:MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):325
                                                                  Entropy (8bit):5.113554476580494
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52Ua/h1N723oH+TcwtgUh2gr52KLlL52Uapq2PN723oH+TcwtgUh2ghZIFUv:NpapaYeb3hHJL1papvVaYeb3hHh2FUv
                                                                  MD5:D7A489219593743F52000E7B64D9128E
                                                                  SHA1:047B324AA510C224BB395BF7D3546E4725F0B136
                                                                  SHA-256:624507749A53970F248232DFA514E3E066DB0B3446CCEF7CA65E84A70C4A70A2
                                                                  SHA-512:2793290CF5424CC88B7E4275C13F1E6AD6CCF3445F98A13CBBC69B36D8B861AC8CC5AC11428262B18BE297A9285A96EEF4C30EA01F608B34001D21A731CA21B4
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:14:56.491 7e0 Creating DB C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Site Characteristics Database since it was missing..2024/08/29-18:14:56.665 7e0 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Site Characteristics Database/MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:OpenPGP Secret Key
                                                                  Category:dropped
                                                                  Size (bytes):41
                                                                  Entropy (8bit):4.704993772857998
                                                                  Encrypted:false
                                                                  SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                                                                  MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                                                                  SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                                                                  SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                                                                  SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                                                                  Malicious:false
                                                                  Preview:.|.."....leveldb.BytewiseComparator......
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
                                                                  Category:dropped
                                                                  Size (bytes):8192
                                                                  Entropy (8bit):0.01057775872642915
                                                                  Encrypted:false
                                                                  SSDEEP:3:MsFl:/F
                                                                  MD5:CF89D16BB9107C631DAABF0C0EE58EFB
                                                                  SHA1:3AE5D3A7CF1F94A56E42F9A58D90A0B9616AE74B
                                                                  SHA-256:D6A5FE39CD672781B256E0E3102F7022635F1D4BB7CFCC90A80FFFE4D0F3877E
                                                                  SHA-512:8CB5B059C8105EB91E74A7D5952437AAA1ADA89763C5843E7B0F1B93D9EBE15ED40F287C652229291FAC02D712CF7FF5ECECEF276BA0D7DDC35558A3EC3F77B0
                                                                  Malicious:false
                                                                  Preview:............$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):270336
                                                                  Entropy (8bit):8.280239615765425E-4
                                                                  Encrypted:false
                                                                  SSDEEP:3:MsEllllkEthXllkl2:/M/xT02
                                                                  MD5:D0D388F3865D0523E451D6BA0BE34CC4
                                                                  SHA1:8571C6A52AACC2747C048E3419E5657B74612995
                                                                  SHA-256:902F30C1FB0597D0734BC34B979EC5D131F8F39A4B71B338083821216EC8D61B
                                                                  SHA-512:376011D00DE659EB6082A74E862CFAC97A9BB508E0B740761505142E2D24EC1C30AA61EFBC1C0DD08FF0F34734444DE7F77DD90A6CA42B48A4C7FAD5F0BDDD17
                                                                  Malicious:false
                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):8192
                                                                  Entropy (8bit):0.011852361981932763
                                                                  Encrypted:false
                                                                  SSDEEP:3:MsHlDll:/H
                                                                  MD5:0962291D6D367570BEE5454721C17E11
                                                                  SHA1:59D10A893EF321A706A9255176761366115BEDCB
                                                                  SHA-256:EC1702806F4CC7C42A82FC2B38E89835FDE7C64BB32060E0823C9077CA92EFB7
                                                                  SHA-512:F555E961B69E09628EAF9C61F465871E6984CD4D31014F954BB747351DAD9CEA6D17C1DB4BCA2C1EB7F187CB5F3C0518748C339C8B43BBD1DBD94AEAA16F58ED
                                                                  Malicious:false
                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):8192
                                                                  Entropy (8bit):0.012340643231932763
                                                                  Encrypted:false
                                                                  SSDEEP:3:MsGl3ll:/y
                                                                  MD5:41876349CB12D6DB992F1309F22DF3F0
                                                                  SHA1:5CF26B3420FC0302CD0A71E8D029739B8765BE27
                                                                  SHA-256:E09F42C398D688DCE168570291F1F92D079987DEDA3099A34ADB9E8C0522B30C
                                                                  SHA-512:E9A4FC1F7CB6AE2901F8E02354A92C4AAA7A53C640DCF692DB42A27A5ACC2A3BFB25A0DE0EB08AB53983132016E7D43132EA4292E439BB636AAFD53FB6EF907E
                                                                  Malicious:false
                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                                                                  Category:dropped
                                                                  Size (bytes):524656
                                                                  Entropy (8bit):5.027445846313988E-4
                                                                  Encrypted:false
                                                                  SSDEEP:3:LsulsZ:LsPZ
                                                                  MD5:681C1FC02BB986F756FA6E10EAC71BF4
                                                                  SHA1:302793C8AA3CD2D01D9898579709018BA7CE27BE
                                                                  SHA-256:63DE09F34363304B2B56E9779EB70489B2F01752A3F6E05F932FEA5AADF67D3A
                                                                  SHA-512:750ACE2F0587459925BB7766B8F796FC93246BE92A754640073F4297270FAB1E8C5EB5B3B1FCDEFA9B0C83BE0E0654458B848CD4776BB2E5C2B85A953C9C0843
                                                                  Malicious:false
                                                                  Preview:...........................................p./.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):24
                                                                  Entropy (8bit):2.1431558784658327
                                                                  Encrypted:false
                                                                  SSDEEP:3:m+l:m
                                                                  MD5:54CB446F628B2EA4A5BCE5769910512E
                                                                  SHA1:C27CA848427FE87F5CF4D0E0E3CD57151B0D820D
                                                                  SHA-256:FBCFE23A2ECB82B7100C50811691DDE0A33AA3DA8D176BE9882A9DB485DC0F2D
                                                                  SHA-512:8F6ED2E91AED9BD415789B1DBE591E7EAB29F3F1B48FDFA5E864D7BF4AE554ACC5D82B4097A770DABC228523253623E4296C5023CF48252E1B94382C43123CB0
                                                                  Malicious:false
                                                                  Preview:0\r..m..................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):48
                                                                  Entropy (8bit):2.9972243200613975
                                                                  Encrypted:false
                                                                  SSDEEP:3:X7yEhh/l:Rhht
                                                                  MD5:3476357C35A02213A7C29B32F1DE05C8
                                                                  SHA1:3C894EF867B92B4D577CE8DF1FF0CB88747F7FFF
                                                                  SHA-256:83BD2CE7F1B56FFAF42A495B60143A4DECD53A19FBFF41275432B880A66C4A3E
                                                                  SHA-512:685F9A97C0A03FFCC6EC9100B2E0FEFB483FAF3A329534F515AB3D9498E2F120E0E4C8C377425DEFD9AF4DCB3DBC81A00AF5B1DB85A1C1605A41EA7D35DBA04C
                                                                  Malicious:false
                                                                  Preview:(....[..oy retne........................=d..p./.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):48
                                                                  Entropy (8bit):2.9972243200613975
                                                                  Encrypted:false
                                                                  SSDEEP:3:X7yEhh/l:Rhht
                                                                  MD5:3476357C35A02213A7C29B32F1DE05C8
                                                                  SHA1:3C894EF867B92B4D577CE8DF1FF0CB88747F7FFF
                                                                  SHA-256:83BD2CE7F1B56FFAF42A495B60143A4DECD53A19FBFF41275432B880A66C4A3E
                                                                  SHA-512:685F9A97C0A03FFCC6EC9100B2E0FEFB483FAF3A329534F515AB3D9498E2F120E0E4C8C377425DEFD9AF4DCB3DBC81A00AF5B1DB85A1C1605A41EA7D35DBA04C
                                                                  Malicious:false
                                                                  Preview:(....[..oy retne........................=d..p./.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):24
                                                                  Entropy (8bit):2.1431558784658327
                                                                  Encrypted:false
                                                                  SSDEEP:3:m+l:m
                                                                  MD5:54CB446F628B2EA4A5BCE5769910512E
                                                                  SHA1:C27CA848427FE87F5CF4D0E0E3CD57151B0D820D
                                                                  SHA-256:FBCFE23A2ECB82B7100C50811691DDE0A33AA3DA8D176BE9882A9DB485DC0F2D
                                                                  SHA-512:8F6ED2E91AED9BD415789B1DBE591E7EAB29F3F1B48FDFA5E864D7BF4AE554ACC5D82B4097A770DABC228523253623E4296C5023CF48252E1B94382C43123CB0
                                                                  Malicious:false
                                                                  Preview:0\r..m..................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):48
                                                                  Entropy (8bit):2.9972243200613975
                                                                  Encrypted:false
                                                                  SSDEEP:3:X7yEhh/l:Rhht
                                                                  MD5:3476357C35A02213A7C29B32F1DE05C8
                                                                  SHA1:3C894EF867B92B4D577CE8DF1FF0CB88747F7FFF
                                                                  SHA-256:83BD2CE7F1B56FFAF42A495B60143A4DECD53A19FBFF41275432B880A66C4A3E
                                                                  SHA-512:685F9A97C0A03FFCC6EC9100B2E0FEFB483FAF3A329534F515AB3D9498E2F120E0E4C8C377425DEFD9AF4DCB3DBC81A00AF5B1DB85A1C1605A41EA7D35DBA04C
                                                                  Malicious:false
                                                                  Preview:(....[..oy retne........................=d..p./.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):48
                                                                  Entropy (8bit):2.9972243200613975
                                                                  Encrypted:false
                                                                  SSDEEP:3:X7yEhh/l:Rhht
                                                                  MD5:3476357C35A02213A7C29B32F1DE05C8
                                                                  SHA1:3C894EF867B92B4D577CE8DF1FF0CB88747F7FFF
                                                                  SHA-256:83BD2CE7F1B56FFAF42A495B60143A4DECD53A19FBFF41275432B880A66C4A3E
                                                                  SHA-512:685F9A97C0A03FFCC6EC9100B2E0FEFB483FAF3A329534F515AB3D9498E2F120E0E4C8C377425DEFD9AF4DCB3DBC81A00AF5B1DB85A1C1605A41EA7D35DBA04C
                                                                  Malicious:false
                                                                  Preview:(....[..oy retne........................=d..p./.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
                                                                  Category:dropped
                                                                  Size (bytes):8192
                                                                  Entropy (8bit):0.01057775872642915
                                                                  Encrypted:false
                                                                  SSDEEP:3:MsFl:/F
                                                                  MD5:CF89D16BB9107C631DAABF0C0EE58EFB
                                                                  SHA1:3AE5D3A7CF1F94A56E42F9A58D90A0B9616AE74B
                                                                  SHA-256:D6A5FE39CD672781B256E0E3102F7022635F1D4BB7CFCC90A80FFFE4D0F3877E
                                                                  SHA-512:8CB5B059C8105EB91E74A7D5952437AAA1ADA89763C5843E7B0F1B93D9EBE15ED40F287C652229291FAC02D712CF7FF5ECECEF276BA0D7DDC35558A3EC3F77B0
                                                                  Malicious:false
                                                                  Preview:............$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):270336
                                                                  Entropy (8bit):0.0012471779557650352
                                                                  Encrypted:false
                                                                  SSDEEP:3:MsEllllkEthXllkl2zE:/M/xT02z
                                                                  MD5:F50F89A0A91564D0B8A211F8921AA7DE
                                                                  SHA1:112403A17DD69D5B9018B8CEDE023CB3B54EAB7D
                                                                  SHA-256:B1E963D702392FB7224786E7D56D43973E9B9EFD1B89C17814D7C558FFC0CDEC
                                                                  SHA-512:BF8CDA48CF1EC4E73F0DD1D4FA5562AF1836120214EDB74957430CD3E4A2783E801FA3F4ED2AFB375257CAEED4ABE958265237D6E0AACF35A9EDE7A2E8898D58
                                                                  Malicious:false
                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):8192
                                                                  Entropy (8bit):0.011852361981932763
                                                                  Encrypted:false
                                                                  SSDEEP:3:MsHlDll:/H
                                                                  MD5:0962291D6D367570BEE5454721C17E11
                                                                  SHA1:59D10A893EF321A706A9255176761366115BEDCB
                                                                  SHA-256:EC1702806F4CC7C42A82FC2B38E89835FDE7C64BB32060E0823C9077CA92EFB7
                                                                  SHA-512:F555E961B69E09628EAF9C61F465871E6984CD4D31014F954BB747351DAD9CEA6D17C1DB4BCA2C1EB7F187CB5F3C0518748C339C8B43BBD1DBD94AEAA16F58ED
                                                                  Malicious:false
                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):8192
                                                                  Entropy (8bit):0.012340643231932763
                                                                  Encrypted:false
                                                                  SSDEEP:3:MsGl3ll:/y
                                                                  MD5:41876349CB12D6DB992F1309F22DF3F0
                                                                  SHA1:5CF26B3420FC0302CD0A71E8D029739B8765BE27
                                                                  SHA-256:E09F42C398D688DCE168570291F1F92D079987DEDA3099A34ADB9E8C0522B30C
                                                                  SHA-512:E9A4FC1F7CB6AE2901F8E02354A92C4AAA7A53C640DCF692DB42A27A5ACC2A3BFB25A0DE0EB08AB53983132016E7D43132EA4292E439BB636AAFD53FB6EF907E
                                                                  Malicious:false
                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                                                                  Category:dropped
                                                                  Size (bytes):262512
                                                                  Entropy (8bit):9.553120663130604E-4
                                                                  Encrypted:false
                                                                  SSDEEP:3:LsNlTvVTl:Ls3LVTl
                                                                  MD5:90E79F6EC5C5561B37DA82F4B3A3C1BA
                                                                  SHA1:30C534AAE48B6F736E8965F82FC850F85E7FD50B
                                                                  SHA-256:7EF0D402ECD7744A1FD386CA639659E458E652968511CE53B5EB2F9985ACAB14
                                                                  SHA-512:A1343584E514069F4DD25676B2BDA080EA3532A99B719D7F56F5A18320FC842B926DCA81B28E748C4117A33D8B017523F214EA2D9C065DCC9C5C39D74D625ABE
                                                                  Malicious:false
                                                                  Preview:............................................p./.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
                                                                  Category:dropped
                                                                  Size (bytes):8192
                                                                  Entropy (8bit):0.01057775872642915
                                                                  Encrypted:false
                                                                  SSDEEP:3:MsFl:/F
                                                                  MD5:CF89D16BB9107C631DAABF0C0EE58EFB
                                                                  SHA1:3AE5D3A7CF1F94A56E42F9A58D90A0B9616AE74B
                                                                  SHA-256:D6A5FE39CD672781B256E0E3102F7022635F1D4BB7CFCC90A80FFFE4D0F3877E
                                                                  SHA-512:8CB5B059C8105EB91E74A7D5952437AAA1ADA89763C5843E7B0F1B93D9EBE15ED40F287C652229291FAC02D712CF7FF5ECECEF276BA0D7DDC35558A3EC3F77B0
                                                                  Malicious:false
                                                                  Preview:............$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):270336
                                                                  Entropy (8bit):0.0012471779557650352
                                                                  Encrypted:false
                                                                  SSDEEP:3:MsEllllkEthXllkl2zE:/M/xT02z
                                                                  MD5:F50F89A0A91564D0B8A211F8921AA7DE
                                                                  SHA1:112403A17DD69D5B9018B8CEDE023CB3B54EAB7D
                                                                  SHA-256:B1E963D702392FB7224786E7D56D43973E9B9EFD1B89C17814D7C558FFC0CDEC
                                                                  SHA-512:BF8CDA48CF1EC4E73F0DD1D4FA5562AF1836120214EDB74957430CD3E4A2783E801FA3F4ED2AFB375257CAEED4ABE958265237D6E0AACF35A9EDE7A2E8898D58
                                                                  Malicious:false
                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):8192
                                                                  Entropy (8bit):0.011852361981932763
                                                                  Encrypted:false
                                                                  SSDEEP:3:MsHlDll:/H
                                                                  MD5:0962291D6D367570BEE5454721C17E11
                                                                  SHA1:59D10A893EF321A706A9255176761366115BEDCB
                                                                  SHA-256:EC1702806F4CC7C42A82FC2B38E89835FDE7C64BB32060E0823C9077CA92EFB7
                                                                  SHA-512:F555E961B69E09628EAF9C61F465871E6984CD4D31014F954BB747351DAD9CEA6D17C1DB4BCA2C1EB7F187CB5F3C0518748C339C8B43BBD1DBD94AEAA16F58ED
                                                                  Malicious:false
                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):8192
                                                                  Entropy (8bit):0.012340643231932763
                                                                  Encrypted:false
                                                                  SSDEEP:3:MsGl3ll:/y
                                                                  MD5:41876349CB12D6DB992F1309F22DF3F0
                                                                  SHA1:5CF26B3420FC0302CD0A71E8D029739B8765BE27
                                                                  SHA-256:E09F42C398D688DCE168570291F1F92D079987DEDA3099A34ADB9E8C0522B30C
                                                                  SHA-512:E9A4FC1F7CB6AE2901F8E02354A92C4AAA7A53C640DCF692DB42A27A5ACC2A3BFB25A0DE0EB08AB53983132016E7D43132EA4292E439BB636AAFD53FB6EF907E
                                                                  Malicious:false
                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                                                                  Category:dropped
                                                                  Size (bytes):262512
                                                                  Entropy (8bit):9.553120663130604E-4
                                                                  Encrypted:false
                                                                  SSDEEP:3:LsNlMVB/:Ls3UB/
                                                                  MD5:3AD1EA1CF1D01788987B18704D3603DE
                                                                  SHA1:D1ABEE27252E55B12BF2800B71DD240856D59736
                                                                  SHA-256:260CAB00FC1C31B3E9A8F3E74E727EC219CBCE466D8FC8F2D089BBBA76D98E1F
                                                                  SHA-512:5D00E5D13D43A744D6A645AB60D1D203CB7DF8AB6785281D353E46D6360EDDE3222C0F9C36A3271DF5C0BFF6CF0A2DA7D77A199CF50AF90DBA37EEE2B25B98F3
                                                                  Malicious:false
                                                                  Preview:........................................[..p./.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):16
                                                                  Entropy (8bit):3.2743974703476995
                                                                  Encrypted:false
                                                                  SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                  MD5:46295CAC801E5D4857D09837238A6394
                                                                  SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                  SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                  SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                  Malicious:false
                                                                  Preview:MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):16
                                                                  Entropy (8bit):3.2743974703476995
                                                                  Encrypted:false
                                                                  SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                  MD5:46295CAC801E5D4857D09837238A6394
                                                                  SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                  SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                  SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                  Malicious:false
                                                                  Preview:MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):409
                                                                  Entropy (8bit):5.2159687130848
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52UYXND1N723oH+Tcwt0jqEKj3K/2jM8B2KLlL52UY23+q2PN723oH+Tcwt0jqr:Np6ZaYebqqBvFL1px3+vVaYebqqBQFUv
                                                                  MD5:5EB3E5236566369C256413AD7C144471
                                                                  SHA1:E56A4C04003743EE277603CF34E44D101A87C568
                                                                  SHA-256:49552C3D68CE416805D57E2B0D671A55005ADF55200D6912AEE67F3B4DDA66C8
                                                                  SHA-512:F059D0DBE61FE68FE9823F647992E106FEFFE0376FDF43730650531F9B2037F631310D694BC00CDEEA05A61A065349FD0688FB520C5D145066855EBDA16DAADD
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:14:58.283 1d5c Creating DB C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb since it was missing..2024/08/29-18:14:58.316 1d5c Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb/MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:OpenPGP Secret Key
                                                                  Category:dropped
                                                                  Size (bytes):41
                                                                  Entropy (8bit):4.704993772857998
                                                                  Encrypted:false
                                                                  SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                                                                  MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                                                                  SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                                                                  SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                                                                  SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                                                                  Malicious:false
                                                                  Preview:.|.."....leveldb.BytewiseComparator......
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):40
                                                                  Entropy (8bit):4.1275671571169275
                                                                  Encrypted:false
                                                                  SSDEEP:3:Y2ktGMxkAXWMSN:Y2xFMSN
                                                                  MD5:20D4B8FA017A12A108C87F540836E250
                                                                  SHA1:1AC617FAC131262B6D3CE1F52F5907E31D5F6F00
                                                                  SHA-256:6028BD681DBF11A0A58DDE8A0CD884115C04CAA59D080BA51BDE1B086CE0079D
                                                                  SHA-512:507B2B8A8A168FF8F2BDAFA5D9D341C44501A5F17D9F63F3D43BD586BC9E8AE33221887869FA86F845B7D067CB7D2A7009EFD71DDA36E03A40A74FEE04B86856
                                                                  Malicious:false
                                                                  Preview:{"SDCH":{"dictionaries":{},"version":2}}
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):59
                                                                  Entropy (8bit):4.619434150836742
                                                                  Encrypted:false
                                                                  SSDEEP:3:YLbkVKJq0nMb1KKtiVY:YHkVKJTnMRK3VY
                                                                  MD5:2800881C775077E1C4B6E06BF4676DE4
                                                                  SHA1:2873631068C8B3B9495638C865915BE822442C8B
                                                                  SHA-256:226EEC4486509917AA336AFEBD6FF65777B75B65F1FB06891D2A857A9421A974
                                                                  SHA-512:E342407AB65CC68F1B3FD706CD0A37680A0864FFD30A6539730180EDE2CDCD732CC97AE0B9EF7DB12DA5C0F83E429DF0840DBF7596ACA859A0301665E517377B
                                                                  Malicious:false
                                                                  Preview:{"net":{"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):111
                                                                  Entropy (8bit):4.718418993774295
                                                                  Encrypted:false
                                                                  SSDEEP:3:YLb9N+eAXRfHDH2LS7PMVKJq0nMb1KKqk1Yn:YHpoeS7PMVKJTnMRKXk1Yn
                                                                  MD5:807419CA9A4734FEAF8D8563A003B048
                                                                  SHA1:A723C7D60A65886FFA068711F1E900CCC85922A6
                                                                  SHA-256:AA10BF07B0D265BED28F2A475F3564D8DDB5E4D4FFEE0AB6F3A0CC564907B631
                                                                  SHA-512:F10D496AE75DB5BA412BD9F17BF0C7DA7632DB92A3FABF7F24071E40F5759C6A875AD8F3A72BAD149DA58B3DA3B816077DF125D0D9F3544ADBA68C66353D206C
                                                                  Malicious:false
                                                                  Preview:{"net":{"http_server_properties":{"servers":[],"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"3G"}}}
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):111
                                                                  Entropy (8bit):4.718418993774295
                                                                  Encrypted:false
                                                                  SSDEEP:3:YLb9N+eAXRfHDH2LS7PMVKJq0nMb1KKtiVY:YHpoeS7PMVKJTnMRK3VY
                                                                  MD5:285252A2F6327D41EAB203DC2F402C67
                                                                  SHA1:ACEDB7BA5FBC3CE914A8BF386A6F72CA7BAA33C6
                                                                  SHA-256:5DFC321417FC31359F23320EA68014EBFD793C5BBED55F77DAB4180BBD4A2026
                                                                  SHA-512:11CE7CB484FEE66894E63C31DB0D6B7EF66AD0327D4E7E2EB85F3BCC2E836A3A522C68D681E84542E471E54F765E091EFE1EE4065641B0299B15613EB32DCC0D
                                                                  Malicious:false
                                                                  Preview:{"net":{"http_server_properties":{"servers":[],"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):2
                                                                  Entropy (8bit):1.0
                                                                  Encrypted:false
                                                                  SSDEEP:3:H:H
                                                                  MD5:D751713988987E9331980363E24189CE
                                                                  SHA1:97D170E1550EEE4AFC0AF065B78CDA302A97674C
                                                                  SHA-256:4F53CDA18C2BAA0C0354BB5F9A3ECBE5ED12AB4D8E11BA873C2F11161202B945
                                                                  SHA-512:B25B294CB4DEB69EA00A4C3CF3113904801B6015E5956BD019A8570B1FE1D6040E944EF3CDEE16D0A46503CA6E659A25F21CF9CEDDC13F352A3C98138C15D6AF
                                                                  Malicious:false
                                                                  Preview:[]
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):59
                                                                  Entropy (8bit):4.619434150836742
                                                                  Encrypted:false
                                                                  SSDEEP:3:YLbkVKJq0nMb1KKtiVY:YHkVKJTnMRK3VY
                                                                  MD5:2800881C775077E1C4B6E06BF4676DE4
                                                                  SHA1:2873631068C8B3B9495638C865915BE822442C8B
                                                                  SHA-256:226EEC4486509917AA336AFEBD6FF65777B75B65F1FB06891D2A857A9421A974
                                                                  SHA-512:E342407AB65CC68F1B3FD706CD0A37680A0864FFD30A6539730180EDE2CDCD732CC97AE0B9EF7DB12DA5C0F83E429DF0840DBF7596ACA859A0301665E517377B
                                                                  Malicious:false
                                                                  Preview:{"net":{"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):59
                                                                  Entropy (8bit):4.619434150836742
                                                                  Encrypted:false
                                                                  SSDEEP:3:YLbkVKJq0nMb1KKtiVY:YHkVKJTnMRK3VY
                                                                  MD5:2800881C775077E1C4B6E06BF4676DE4
                                                                  SHA1:2873631068C8B3B9495638C865915BE822442C8B
                                                                  SHA-256:226EEC4486509917AA336AFEBD6FF65777B75B65F1FB06891D2A857A9421A974
                                                                  SHA-512:E342407AB65CC68F1B3FD706CD0A37680A0864FFD30A6539730180EDE2CDCD732CC97AE0B9EF7DB12DA5C0F83E429DF0840DBF7596ACA859A0301665E517377B
                                                                  Malicious:false
                                                                  Preview:{"net":{"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):59
                                                                  Entropy (8bit):4.619434150836742
                                                                  Encrypted:false
                                                                  SSDEEP:3:YLbkVKJq0nMb1KKtiVY:YHkVKJTnMRK3VY
                                                                  MD5:2800881C775077E1C4B6E06BF4676DE4
                                                                  SHA1:2873631068C8B3B9495638C865915BE822442C8B
                                                                  SHA-256:226EEC4486509917AA336AFEBD6FF65777B75B65F1FB06891D2A857A9421A974
                                                                  SHA-512:E342407AB65CC68F1B3FD706CD0A37680A0864FFD30A6539730180EDE2CDCD732CC97AE0B9EF7DB12DA5C0F83E429DF0840DBF7596ACA859A0301665E517377B
                                                                  Malicious:false
                                                                  Preview:{"net":{"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 9, cookie 0x4, schema 4, UTF-8, version-valid-for 4
                                                                  Category:dropped
                                                                  Size (bytes):36864
                                                                  Entropy (8bit):0.5559635235158827
                                                                  Encrypted:false
                                                                  SSDEEP:48:T6IopKWurJNVr1GJmA8pv82pfurJNVrdHXuccaurJN2VrJ1n4n1GmzNGU1cSB:OIEumQv8m1ccnvS6
                                                                  MD5:9AAAE8C040B616D1378F3E0E17689A29
                                                                  SHA1:F91E7DE07F1DA14D15D067E1F50C3B84A328DBB7
                                                                  SHA-256:5B94D63C31AE795661F69B9D10E8BFD115584CD6FEF5FBB7AA483FDC6A66945B
                                                                  SHA-512:436202AB8B6BB0318A30946108E6722DFF781F462EE05980C14F57F347EDDCF8119E236C3290B580CEF6902E1B59FB4F546D6BD69F62479805B39AB0F3308EC1
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g...D.........7............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):2
                                                                  Entropy (8bit):1.0
                                                                  Encrypted:false
                                                                  SSDEEP:3:H:H
                                                                  MD5:D751713988987E9331980363E24189CE
                                                                  SHA1:97D170E1550EEE4AFC0AF065B78CDA302A97674C
                                                                  SHA-256:4F53CDA18C2BAA0C0354BB5F9A3ECBE5ED12AB4D8E11BA873C2F11161202B945
                                                                  SHA-512:B25B294CB4DEB69EA00A4C3CF3113904801B6015E5956BD019A8570B1FE1D6040E944EF3CDEE16D0A46503CA6E659A25F21CF9CEDDC13F352A3C98138C15D6AF
                                                                  Malicious:false
                                                                  Preview:[]
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):40
                                                                  Entropy (8bit):4.1275671571169275
                                                                  Encrypted:false
                                                                  SSDEEP:3:Y2ktGMxkAXWMSN:Y2xFMSN
                                                                  MD5:20D4B8FA017A12A108C87F540836E250
                                                                  SHA1:1AC617FAC131262B6D3CE1F52F5907E31D5F6F00
                                                                  SHA-256:6028BD681DBF11A0A58DDE8A0CD884115C04CAA59D080BA51BDE1B086CE0079D
                                                                  SHA-512:507B2B8A8A168FF8F2BDAFA5D9D341C44501A5F17D9F63F3D43BD586BC9E8AE33221887869FA86F845B7D067CB7D2A7009EFD71DDA36E03A40A74FEE04B86856
                                                                  Malicious:false
                                                                  Preview:{"SDCH":{"dictionaries":{},"version":2}}
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 3
                                                                  Category:dropped
                                                                  Size (bytes):36864
                                                                  Entropy (8bit):0.36515621748816035
                                                                  Encrypted:false
                                                                  SSDEEP:24:TLH3lIIAoDJ84l5lDlnDMlRlyKDtM6UwccWfp15fBIe:Tb31DtX5nDOvyKDhU1cSB
                                                                  MD5:25363ADC3C9D98BAD1A33D0792405CBF
                                                                  SHA1:D06E343087D86EF1A06F7479D81B26C90A60B5C3
                                                                  SHA-256:6E019B8B9E389216D5BDF1F2FE63F41EF98E71DA101F2A6BE04F41CC5954532D
                                                                  SHA-512:CF7EEE35D0E00945AF221BEC531E8BF06C08880DA00BD103FA561BC069D7C6F955CBA3C1C152A4884601E5A670B7487D39B4AE9A4D554ED8C14F129A74E555F7
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ ..........................................................................j.......X..g...}.....$.X..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):16
                                                                  Entropy (8bit):3.2743974703476995
                                                                  Encrypted:false
                                                                  SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                  MD5:46295CAC801E5D4857D09837238A6394
                                                                  SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                  SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                  SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                  Malicious:false
                                                                  Preview:MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):61
                                                                  Entropy (8bit):3.7273991737283296
                                                                  Encrypted:false
                                                                  SSDEEP:3:S8ltHlS+QUl1ASEGhTFl:S85aEFl
                                                                  MD5:9F7EADC15E13D0608B4E4D590499AE2E
                                                                  SHA1:AFB27F5C20B117031328E12DD3111A7681FF8DB5
                                                                  SHA-256:5C3A5B578AB9FE853EAD7040BC161929EA4F6902073BA2B8BB84487622B98923
                                                                  SHA-512:88455784C705F565C70FA0A549C54E2492976E14643E9DD0A8E58C560D003914313DF483F096BD33EC718AEEC7667B8DE063A73627AA3436BA6E7E562E565B3F
                                                                  Malicious:false
                                                                  Preview:*...#................version.1..namespace-..&f...............
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):16
                                                                  Entropy (8bit):3.2743974703476995
                                                                  Encrypted:false
                                                                  SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                  MD5:46295CAC801E5D4857D09837238A6394
                                                                  SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                  SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                  SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                  Malicious:false
                                                                  Preview:MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):397
                                                                  Entropy (8bit):5.192336767466848
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52UG4M1N723oH+Tcwt0jqEKj0QM72KLlL52UCRN4q2PN723oH+Tcwt0jqEKj0Qe:NpG4saYebqqB6L1pQ4vVaYebqqBZFUv
                                                                  MD5:E43D1F3D718843082C8DA66268EE287D
                                                                  SHA1:DF85BA4650A1AA2B9DC86D9B2716C5A9B8AA200B
                                                                  SHA-256:8FB012726C1802523E0FDD144FB9F72E9A5F7F4A703E70CE7AD7E8CC631EE2AE
                                                                  SHA-512:E38E9C4B4B78143954000F7A2EBCB1D988EFC4DF4246087F73387542ACD8D31AB60D59EEFF62B823D9E6036D81C99F78C82C3FD5ACC4AB7449CDB209A961D007
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:15:14.165 1d64 Creating DB C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage since it was missing..2024/08/29-18:15:14.198 1d64 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage/MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:OpenPGP Secret Key
                                                                  Category:dropped
                                                                  Size (bytes):41
                                                                  Entropy (8bit):4.704993772857998
                                                                  Encrypted:false
                                                                  SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                                                                  MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                                                                  SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                                                                  SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                                                                  SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                                                                  Malicious:false
                                                                  Preview:.|.."....leveldb.BytewiseComparator......
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):16
                                                                  Entropy (8bit):3.2743974703476995
                                                                  Encrypted:false
                                                                  SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                  MD5:46295CAC801E5D4857D09837238A6394
                                                                  SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                  SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                  SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                  Malicious:false
                                                                  Preview:MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):46
                                                                  Entropy (8bit):4.019797536844534
                                                                  Encrypted:false
                                                                  SSDEEP:3:sLollttz6sjlGXU2tkn:qolXtWswXU2tkn
                                                                  MD5:90881C9C26F29FCA29815A08BA858544
                                                                  SHA1:06FEE974987B91D82C2839A4BB12991FA99E1BDD
                                                                  SHA-256:A2CA52E34B6138624AC2DD20349CDE28482143B837DB40A7F0FBDA023077C26A
                                                                  SHA-512:15F7F8197B4FC46C4C5C2570FB1F6DD73CB125F9EE53DFA67F5A0D944543C5347BDAB5CCE95E91DD6C948C9023E23C7F9D76CFF990E623178C92F8D49150A625
                                                                  Malicious:false
                                                                  Preview:...n'................_mts_schema_descriptor...
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):16
                                                                  Entropy (8bit):3.2743974703476995
                                                                  Encrypted:false
                                                                  SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                  MD5:46295CAC801E5D4857D09837238A6394
                                                                  SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                  SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                  SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                  Malicious:false
                                                                  Preview:MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):303
                                                                  Entropy (8bit):5.265411030251199
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52UaSRoM1N723oH+Tcwtkx2KLlL52UaMyq2PN723oH+TcwtCIFUv:NpaiosaYebkVL1paMyvVaYebLFUv
                                                                  MD5:5DEAAC994448333282466C5650698488
                                                                  SHA1:657595FFBCE77C5FCAE99258D9DA597107A1DFCD
                                                                  SHA-256:61D3F3D51ED9B3C2F6AC8E7293C40D0F96A0419F0084D13005E07C8BC89709E4
                                                                  SHA-512:44ABC2A42CA27FECEB659444A5DE40DD57B073F228674014643666ABA645E3A90C06B28C4AFA79264405E308C4D032372E6CB7D2A760C8244449629EECF895B7
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:14:56.489 1b94 Creating DB C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Sync Data\LevelDB since it was missing..2024/08/29-18:14:56.573 1b94 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Sync Data\LevelDB/MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:OpenPGP Secret Key
                                                                  Category:dropped
                                                                  Size (bytes):41
                                                                  Entropy (8bit):4.704993772857998
                                                                  Encrypted:false
                                                                  SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                                                                  MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                                                                  SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                                                                  SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                                                                  SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                                                                  Malicious:false
                                                                  Preview:.|.."....leveldb.BytewiseComparator......
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 1
                                                                  Category:dropped
                                                                  Size (bytes):20480
                                                                  Entropy (8bit):0.3528485475628876
                                                                  Encrypted:false
                                                                  SSDEEP:12:TLiN6CZhDu6MvDOF5yEHFxOUwa5qguYZ75fOSiPe2d:TLiwCZwE8I6Uwcco5fBtC
                                                                  MD5:F2B4FB2D384AA4E4D6F4AEB0BBA217DC
                                                                  SHA1:2CD70CFB3CE72D9B079170C360C1F563B6BF150E
                                                                  SHA-256:1ECC07CD1D383472DAD33D2A5766625009EA5EACBAEDE2417ADA1842654CBBC8
                                                                  SHA-512:48D03991660FA1598B3E002F5BC5F0F05E9696BCB2289240FA8CCBB2C030CDD23245D4ECC0C64DA1E7C54B092C3E60AE0427358F63087018BF0E6CEDC471DD34
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ ..........................................................................j..........g.....4....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):131072
                                                                  Entropy (8bit):0.002095330713584969
                                                                  Encrypted:false
                                                                  SSDEEP:3:ImtVAI9tllll:IiVAA9
                                                                  MD5:F662FF816132EE3D5234FAD1382B1947
                                                                  SHA1:6FBD80B890B0236C87AE90E5DB25DC17F4216D68
                                                                  SHA-256:2E71E14C7350397794621121E13ED2A349C50AEB6128EEB4A18D73C435CE17DA
                                                                  SHA-512:47A24FB94AF840FA0275B16899A39EEEA2BFB22D9BB252A783DD15029DE0274ACC4F119B89D265A115F30C1FD1A2E2508772278025DEA656FFD2CFD96416F3BD
                                                                  Malicious:false
                                                                  Preview:VLnk.....?...........%.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 4, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 4
                                                                  Category:dropped
                                                                  Size (bytes):182272
                                                                  Entropy (8bit):1.0802597647963552
                                                                  Encrypted:false
                                                                  SSDEEP:192:hrb2qAdB9TbTbuDDsnxCkO4SAzWn0lKOMq+JLVumYren66:h/2qOB1nxCkO4SACnqKOMq+pVumlp
                                                                  MD5:1C6BC31D2B872C02F3C6C14A6F2F2A64
                                                                  SHA1:AFEA5AAAC481A5666B068EA4F7D1D93897E8E6C3
                                                                  SHA-256:040C63363FBBFEB88D9F4E84BB338187EAE29C81D7E7D1FE7069301B510DFB77
                                                                  SHA-512:222731FFBEC87B92C758BE8FA1CBDDC9C0D657885AD5C62293376E1542444C352AC4CAF6138C07AC6B3B30A8E01ABDEA3A8E3CE233183DDC5083F2AD5675AAE3
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 7, cookie 0xb, schema 4, UTF-8, version-valid-for 10
                                                                  Category:dropped
                                                                  Size (bytes):14336
                                                                  Entropy (8bit):0.7836182415564406
                                                                  Encrypted:false
                                                                  SSDEEP:24:LLqlCouxhK3thdkSdj5QjUsEGcGBXp22iSBgm+xjgm:uOK3tjkSdj5IUltGhp22iSBgm+xj/
                                                                  MD5:AA9965434F66985F0979719F3035C6E1
                                                                  SHA1:39FC31CBB2BB4F8FA8FB6C34154FB48FBCBAEEF4
                                                                  SHA-256:F42877E694E9AFC76E1BBA279F6EC259E28A7E7C574EFDCC15D58EFAE06ECA09
                                                                  SHA-512:201667EAA3DF7DBCCF296DE6FCF4E79897C1BB744E29EF37235C44821A18EAD78697DFEB9253AA01C0DC28E5758E2AF50852685CDC9ECA1010DBAEE642590CEA
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ ..........................................................................j..................n..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text, with very long lines (3951), with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):11755
                                                                  Entropy (8bit):5.190465908239046
                                                                  Encrypted:false
                                                                  SSDEEP:192:hH4vrmqRBB4W4PoiUDNaxvR5FCHFcoaSbqGEDI:hH4vrmUB6W4jR3GaSbqGEDI
                                                                  MD5:07301A857C41B5854E6F84CA00B81EA0
                                                                  SHA1:7441FC1018508FF4F3DBAA139A21634C08ED979C
                                                                  SHA-256:2343C541E095E1D5F202E8D2A0807113E69E1969AF8E15E3644C51DB0BF33FBF
                                                                  SHA-512:00ADE38E9D2F07C64648202F1D5F18A2DFB2781C0517EAEBCD567D8A77DBB7CB40A58B7C7D4EC03336A63A20D2E11DD64448F020C6FF72F06CA870AA2B4765E0
                                                                  Malicious:false
                                                                  Preview:{.. "DefaultCohort": {.. "21f3388b-c2a5-4791-8f6e-a4cad6d17f4f.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.BingHomePage.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.Covid.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.Finance.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.Jobs.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.KnowledgeCard.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.Local.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.NTP3PCLICK.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.NotifySearchPage.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.Recipe.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.SearchPage.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.Sports.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.Travel.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.Weather.Bubble": 1,.. "2cb2db96-3bd0-403e-abe2-9269b3761041.Bubble": 1,.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):6296
                                                                  Entropy (8bit):4.975102812737503
                                                                  Encrypted:false
                                                                  SSDEEP:96:stHqfIis13b946bzq8zUs85eh6Cb7/x+6MhmuecmAeZNe2Mw/EJ:stHws/bzqkUs88bV+FiAdPwMJ
                                                                  MD5:4ACD0DBBB64BF8028AC6A24BCA545879
                                                                  SHA1:143E831FB13163E43F58797FBD971A3E0F1A0FCF
                                                                  SHA-256:35C572786A625BE44E78F69A1A84022FB53AEDC590B582116BFA218DC581906C
                                                                  SHA-512:D87B9806722E0418146BEFF2C16240EE9D6B47F913D50F7F361E672C7EA0B649DCC61B75956AA5D565ABE709B908CADD9F93B7B82F0EE973650E0F7CCF8EBF21
                                                                  Malicious:false
                                                                  Preview:{"aadc_info":{"age_group":0},"account_tracker_service_last_update":"13369443297741956","alternate_error_pages":{"backup":true},"apps":{"shortcuts_arch":"","shortcuts_version":0},"arbitration_using_experiment_config":false,"browser":{"available_dark_theme_options":"All","has_seen_welcome_page":false},"continuous_migration":{"ci_correction_for_holdout_treatment_state":1},"countryid_at_install":17224,"custom_links":{"list":[]},"domain_diversity":{"last_reporting_timestamp":"13369443297748189"},"download":{"default_directory":"C:\\Users\\user\\AppData\\Local\\Microsoft\\Edge\\KioskDownloads\\","directory_upgrade":true},"dual_user":{"consumer_mode":{"ie_user":false},"consumer_site_list_with_ie_entries":false,"consumer_sitelist_location":"","consumer_sitelist_version":"","external_consumer_shared_cookie_data":{},"shared_cookie_data":{},"sitelist_data_2":{},"sitelist_has_consumer_data":false,"sitelist_has_enterprise_data":false,"sitelist_location":"","sitelist_source":0,"sitelist_versio
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 4, cookie 0x2, schema 4, UTF-8, version-valid-for 2
                                                                  Category:dropped
                                                                  Size (bytes):16384
                                                                  Entropy (8bit):0.35226517389931394
                                                                  Encrypted:false
                                                                  SSDEEP:12:TLC+waBg9LBgVDBgQjiZBgKuFtuQkMbmgcVAzO5kMCgGUg5OR:TLPdBgtBgJBgQjiZS53uQFE27MCgGZsR
                                                                  MD5:D2CCDC36225684AAE8FA563AFEDB14E7
                                                                  SHA1:3759649035F23004A4C30A14C5F0B54191BEBF80
                                                                  SHA-256:080AEE864047C67CB1586A5BA5EDA007AFD18ECC2B702638287E386F159D7AEE
                                                                  SHA-512:1A915AF643D688CA68AEDC1FF26C407D960D18DFDE838B417C437D7ADAC7B91C906E782DCC414784E64287915BD1DE5BB6A282E59AA9FEB8C384B4D4BC5F70EC
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ ..........................................................................j.......Q......Q......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, writer version 2, read version 2, file counter 1, database pages 1, cookie 0, schema 0, unknown 0 encoding, version-valid-for 1
                                                                  Category:dropped
                                                                  Size (bytes):4096
                                                                  Entropy (8bit):0.0905602561507182
                                                                  Encrypted:false
                                                                  SSDEEP:3:lSWFN3sl+ltlMWll:l9Fys1M
                                                                  MD5:A8E75ACC11904CB877E15A0D0DE03941
                                                                  SHA1:FBEE05EA246A7F08F7390237EA8B7E49204EF0E0
                                                                  SHA-256:D78C40FEBE1BA7EC83660B78E3F6AB7BC45AB822B8F21B03B16B9CB4F3B3A259
                                                                  SHA-512:A7B52B0575D451466A47AFFE3DCC0BC7FC9A6F8AB8194DA1F046AADA0EDDCCA76B4326AA9F19732BA50359B51EC72896BB8FA2FC23BAA6847C33AB51218511A4
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:SQLite Rollback Journal
                                                                  Category:dropped
                                                                  Size (bytes):512
                                                                  Entropy (8bit):0.28499812076190567
                                                                  Encrypted:false
                                                                  SSDEEP:3:7FEG2l/QW8/lFll:7+/l/
                                                                  MD5:47BCA5DDFB27D36EF22C786E41DA22E4
                                                                  SHA1:F9AFD460961B6ED23A4D049D2DE9034659A38C9A
                                                                  SHA-256:C93F671BC5DD0407F5B38EF1B840A121290016A0091D352D99A9FE5758780218
                                                                  SHA-512:F4B99A1B9F687AE0747CBACC0843990E587ABAF2FC056C843213BC478B301CC3185744110719CF6FB0B3E8D8E585CEC9BFE197A668EFA9819E124A22DD0281A7
                                                                  Malicious:false
                                                                  Preview:.... .c.....5..Z................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):32768
                                                                  Entropy (8bit):0.05001386543317267
                                                                  Encrypted:false
                                                                  SSDEEP:6:GLW0yeAh9YTW0yeAhnkL9X8hslotGLNl0ml/XoQDeX:ayfAyfhAGEjVl/XoQ
                                                                  MD5:50927CCCA9F590773213E328784CA9D6
                                                                  SHA1:A314DF96009D38220DB521A47D9CED0ED3EA8575
                                                                  SHA-256:581A25E9E49777208821734FDA542F1DA1F1510F30F949913CB80425FC7156AD
                                                                  SHA-512:25BA58822E45A29EF0DA7B4EC436EDBDD60B7C1C3D89B45139696407782BBCF93E86ED7C1E4E460349A748996EFB35F28E7ACA6B22407426DC285D90C8AD85E4
                                                                  Malicious:false
                                                                  Preview:..-......................w3.....d.+C.|]%....R~N..-......................w3.....d.+C.|]%....R~N........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:SQLite Write-Ahead Log, version 3007000
                                                                  Category:dropped
                                                                  Size (bytes):70072
                                                                  Entropy (8bit):0.9956235768434372
                                                                  Encrypted:false
                                                                  SSDEEP:48:RCzxtlO+jicbX+un9VAKAFXX+v2VAKAFXX+jhxOqVAKAFXX+nnUYVAKAFXX+UIc:RSxhjcXNstNsjnO5NsWNsUX
                                                                  MD5:E7D2172EDE99F6DB4071DCCA5B33D6F2
                                                                  SHA1:7BCED91650D9B7C5786A50545B580F060BB793FA
                                                                  SHA-256:29CA8DB7955992EADF2651860D4E3CA9C53F53C2E7F52E4F30A9EDA9C1D87AAD
                                                                  SHA-512:BBE31E857CD19AA6D7C0A7CBF1896341A44D3EAC24CF290934B4C76FA48C4E3D807342800C2D8A7812557990DF08811B781E0C8E335E54694F6FF6AB2840A029
                                                                  Malicious:false
                                                                  Preview:7....-..........d.+C.|]...w.._........d.+C.|].].....ESQLite format 3......@ ..........................................................................j.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):16
                                                                  Entropy (8bit):3.2743974703476995
                                                                  Encrypted:false
                                                                  SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                  MD5:46295CAC801E5D4857D09837238A6394
                                                                  SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                  SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                  SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                  Malicious:false
                                                                  Preview:MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:modified
                                                                  Size (bytes):1566
                                                                  Entropy (8bit):5.488675825806152
                                                                  Encrypted:false
                                                                  SSDEEP:48:gk8wSBSoQmPJHRHlxTIYjIYVzVqkEMYjMYzyGAlkfAlkq3:q0oQAIYjIYVzVbEMYjMYzYcYH3
                                                                  MD5:E34AC8080C50D262C042018E523D5481
                                                                  SHA1:ED8D09C919B3E4B4534C79440400B05A072ED83C
                                                                  SHA-256:2A59ECE52ECDE1A66C2A023B68E6B244AA9BA0BD653BD9FB437DA3C7BD40FF54
                                                                  SHA-512:3CB282916DCD14A0D5E817E4D37AC3BFB27AB540D4EA3DDEEAEF7714DC53B7BA0A4B81E9AE84DDB2581306F3934A13F2D086167704A231C1FF3A097DA3593684
                                                                  Malicious:false
                                                                  Preview:A..r.................20_1_1...1.,U.................20_1_1...1..&f...................................4_IPH_CompanionSidePanel...IPH_CompanionSidePanel.....$4_IPH_CompanionSidePanelRegionSearch(."IPH_CompanionSidePanelRegionSearch......4_IPH_DownloadToolbarButton...IPH_DownloadToolbarButton.....&4_IPH_FocusHelpBubbleScreenReaderPromo*.$IPH_FocusHelpBubbleScreenReaderPromo......4_IPH_GMCCastStartStop...IPH_GMCCastStartStop......4_IPH_HighEfficiencyMode...IPH_HighEfficiencyMode......4_IPH_LiveCaption...IPH_LiveCaption......4_IPH_PasswordsAccountStorage!..IPH_PasswordsAccountStorage....."4_IPH_PasswordsWebAppProfileSwitch&. IPH_PasswordsWebAppProfileSwitch.....-4_IPH_PriceInsightsPageActionIconLabelFeature1.+IPH_PriceInsightsPageActionIconLabelFeature......4_IPH_PriceTrackingChipFeature"..IPH_PriceTrackingChipFeature.....&4_IPH_PriceTrackingEmailConsentFeature*.$IPH_PriceTrackingEmailConsentFeature.....-4_IPH_PriceTrackingPageActionIconLabelFeature1.+IPH_PriceTrackingPageActionIconLabelFe
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):16
                                                                  Entropy (8bit):3.2743974703476995
                                                                  Encrypted:false
                                                                  SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                  MD5:46295CAC801E5D4857D09837238A6394
                                                                  SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                  SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                  SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                  Malicious:false
                                                                  Preview:MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):299
                                                                  Entropy (8bit):5.258023681858436
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52UVqR1N723oH+Tcwt0rl2KLlL52UY8+q2PN723oH+Tcwt0rK+IFUv:NpVqxaYebeL1pOvVaYeb13FUv
                                                                  MD5:D4068A6D8093F887CA136350FC3327D6
                                                                  SHA1:84E276A8E7E8F995E8498ADA649A87073A08479D
                                                                  SHA-256:D3FE785C44F2A4B640174C0A8CC350FFCA726509109959CA3FD0CBD39792BFB5
                                                                  SHA-512:C7F058B79B642C4B2A009CFA0D9BC1D85286294F9EC2A57FEAD565AB4C95BB52559F5B867F7CB26A439B74C077DA5352942D26580CF10F2BA6002FE59584D24B
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:14:57.941 1778 Creating DB C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\shared_proto_db since it was missing..2024/08/29-18:14:58.132 1778 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\shared_proto_db/MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:OpenPGP Secret Key
                                                                  Category:dropped
                                                                  Size (bytes):41
                                                                  Entropy (8bit):4.704993772857998
                                                                  Encrypted:false
                                                                  SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                                                                  MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                                                                  SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                                                                  SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                                                                  SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                                                                  Malicious:false
                                                                  Preview:.|.."....leveldb.BytewiseComparator......
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):16
                                                                  Entropy (8bit):3.2743974703476995
                                                                  Encrypted:false
                                                                  SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                  MD5:46295CAC801E5D4857D09837238A6394
                                                                  SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                  SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                  SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                  Malicious:false
                                                                  Preview:MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):729
                                                                  Entropy (8bit):3.9559872543691803
                                                                  Encrypted:false
                                                                  SSDEEP:12:G0nYUteza//z3p/Wui+it/4JbZfPStub/RG0lbANqa:G0nYUtezaD3RXi6FZfc25m
                                                                  MD5:218C93CDE07C1848D731CF3A6DA2C778
                                                                  SHA1:994EF76CA5497132AB9DD3CC831C629753A029AE
                                                                  SHA-256:96C1678803131E47BB2A53D52735F7BC293A5923E433BCF97B19CA6863D9B23C
                                                                  SHA-512:29BDDC0BB4703250F65D0ABDA02D9DA4BE43252664746F85BFDE36E06847D1078A3AA43CA2D3BC40C9BECD854B319685F1DE533F2196248FFB6577B2932FAF61
                                                                  Malicious:false
                                                                  Preview:.h.6.................__global... .t...................__global... .9..b.................33_..........................21_.....n[.=.................33_.....vuNX.................21_.....<...................20_.....,.1..................19_.....QL.s.................18_.....!....................3_.....n.b..................4_.........................37_.......`.................38_.....].$&.................39_.....4.9..................20_......R...................20_.......1..................19_......(...................18_.....:.=..................3_......W2..................4_.....)..>.................37_..........................38_.....h.#..................39_.....P"...................9_.........................9_.....
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):16
                                                                  Entropy (8bit):3.2743974703476995
                                                                  Encrypted:false
                                                                  SSDEEP:3:1sjgWIV//Uv:1qIFUv
                                                                  MD5:46295CAC801E5D4857D09837238A6394
                                                                  SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                                                                  SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                                                                  SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                                                                  Malicious:false
                                                                  Preview:MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):317
                                                                  Entropy (8bit):5.22217893018256
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52UzpN1N723oH+Tcwt0rzs52KLlL52UbSKN+q2PN723oH+Tcwt0rzAdIFUv:NpzptaYeb99L1pbSbvVaYebyFUv
                                                                  MD5:D392255D33DAC1F393110DD6432CF11A
                                                                  SHA1:F81129E94C15BCAF99E9571B2B8DA1C7AF89BDEE
                                                                  SHA-256:9ADED0D37611D156FDBFA4B05CE6871BF450C1AFBDE1C90D2F1C2AD80DA557A5
                                                                  SHA-512:09D5209D7F9C5288FBD1CD162A648B2BA5CD2889CAA4FD3A8296ECC6C3C336E37104E3517B0B4BDF5BB7B3BD2F6E55242B7537633F248C35CEEB1960DAA8C530
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:14:57.807 1778 Creating DB C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\shared_proto_db\metadata since it was missing..2024/08/29-18:14:57.926 1778 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\shared_proto_db\metadata/MANIFEST-000001.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:OpenPGP Secret Key
                                                                  Category:dropped
                                                                  Size (bytes):41
                                                                  Entropy (8bit):4.704993772857998
                                                                  Encrypted:false
                                                                  SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                                                                  MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                                                                  SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                                                                  SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                                                                  SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                                                                  Malicious:false
                                                                  Preview:.|.."....leveldb.BytewiseComparator......
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
                                                                  Category:dropped
                                                                  Size (bytes):8192
                                                                  Entropy (8bit):0.01057775872642915
                                                                  Encrypted:false
                                                                  SSDEEP:3:MsFl:/F
                                                                  MD5:CF89D16BB9107C631DAABF0C0EE58EFB
                                                                  SHA1:3AE5D3A7CF1F94A56E42F9A58D90A0B9616AE74B
                                                                  SHA-256:D6A5FE39CD672781B256E0E3102F7022635F1D4BB7CFCC90A80FFFE4D0F3877E
                                                                  SHA-512:8CB5B059C8105EB91E74A7D5952437AAA1ADA89763C5843E7B0F1B93D9EBE15ED40F287C652229291FAC02D712CF7FF5ECECEF276BA0D7DDC35558A3EC3F77B0
                                                                  Malicious:false
                                                                  Preview:............$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):270336
                                                                  Entropy (8bit):8.280239615765425E-4
                                                                  Encrypted:false
                                                                  SSDEEP:3:MsEllllkEthXllkl2:/M/xT02
                                                                  MD5:D0D388F3865D0523E451D6BA0BE34CC4
                                                                  SHA1:8571C6A52AACC2747C048E3419E5657B74612995
                                                                  SHA-256:902F30C1FB0597D0734BC34B979EC5D131F8F39A4B71B338083821216EC8D61B
                                                                  SHA-512:376011D00DE659EB6082A74E862CFAC97A9BB508E0B740761505142E2D24EC1C30AA61EFBC1C0DD08FF0F34734444DE7F77DD90A6CA42B48A4C7FAD5F0BDDD17
                                                                  Malicious:false
                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):8192
                                                                  Entropy (8bit):0.011852361981932763
                                                                  Encrypted:false
                                                                  SSDEEP:3:MsHlDll:/H
                                                                  MD5:0962291D6D367570BEE5454721C17E11
                                                                  SHA1:59D10A893EF321A706A9255176761366115BEDCB
                                                                  SHA-256:EC1702806F4CC7C42A82FC2B38E89835FDE7C64BB32060E0823C9077CA92EFB7
                                                                  SHA-512:F555E961B69E09628EAF9C61F465871E6984CD4D31014F954BB747351DAD9CEA6D17C1DB4BCA2C1EB7F187CB5F3C0518748C339C8B43BBD1DBD94AEAA16F58ED
                                                                  Malicious:false
                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):8192
                                                                  Entropy (8bit):0.012340643231932763
                                                                  Encrypted:false
                                                                  SSDEEP:3:MsGl3ll:/y
                                                                  MD5:41876349CB12D6DB992F1309F22DF3F0
                                                                  SHA1:5CF26B3420FC0302CD0A71E8D029739B8765BE27
                                                                  SHA-256:E09F42C398D688DCE168570291F1F92D079987DEDA3099A34ADB9E8C0522B30C
                                                                  SHA-512:E9A4FC1F7CB6AE2901F8E02354A92C4AAA7A53C640DCF692DB42A27A5ACC2A3BFB25A0DE0EB08AB53983132016E7D43132EA4292E439BB636AAFD53FB6EF907E
                                                                  Malicious:false
                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                                                                  Category:dropped
                                                                  Size (bytes):262512
                                                                  Entropy (8bit):9.553120663130604E-4
                                                                  Encrypted:false
                                                                  SSDEEP:3:LsNl1B/:Ls31B/
                                                                  MD5:7261674AC60E06C44D27B2F449D6516A
                                                                  SHA1:C7F0EF6B5D472A35AAE902D3984548919A65102B
                                                                  SHA-256:8B9E101511FCDDDD4129A6CA673757F6415951F9A38338147353C053A20BB282
                                                                  SHA-512:E31307631F12064C0A4843FC290E85AC263B13837D01325CA21B6D4560B943BDED2F2F152E03311C0C531CE10013CB5DB45766F3DE1F2384F2CCBA59C196205D
                                                                  Malicious:false
                                                                  Preview:............................................p./.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
                                                                  Category:dropped
                                                                  Size (bytes):8192
                                                                  Entropy (8bit):0.01057775872642915
                                                                  Encrypted:false
                                                                  SSDEEP:3:MsFl:/F
                                                                  MD5:CF89D16BB9107C631DAABF0C0EE58EFB
                                                                  SHA1:3AE5D3A7CF1F94A56E42F9A58D90A0B9616AE74B
                                                                  SHA-256:D6A5FE39CD672781B256E0E3102F7022635F1D4BB7CFCC90A80FFFE4D0F3877E
                                                                  SHA-512:8CB5B059C8105EB91E74A7D5952437AAA1ADA89763C5843E7B0F1B93D9EBE15ED40F287C652229291FAC02D712CF7FF5ECECEF276BA0D7DDC35558A3EC3F77B0
                                                                  Malicious:false
                                                                  Preview:............$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):270336
                                                                  Entropy (8bit):8.280239615765425E-4
                                                                  Encrypted:false
                                                                  SSDEEP:3:MsEllllkEthXllkl2:/M/xT02
                                                                  MD5:D0D388F3865D0523E451D6BA0BE34CC4
                                                                  SHA1:8571C6A52AACC2747C048E3419E5657B74612995
                                                                  SHA-256:902F30C1FB0597D0734BC34B979EC5D131F8F39A4B71B338083821216EC8D61B
                                                                  SHA-512:376011D00DE659EB6082A74E862CFAC97A9BB508E0B740761505142E2D24EC1C30AA61EFBC1C0DD08FF0F34734444DE7F77DD90A6CA42B48A4C7FAD5F0BDDD17
                                                                  Malicious:false
                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):8192
                                                                  Entropy (8bit):0.011852361981932763
                                                                  Encrypted:false
                                                                  SSDEEP:3:MsHlDll:/H
                                                                  MD5:0962291D6D367570BEE5454721C17E11
                                                                  SHA1:59D10A893EF321A706A9255176761366115BEDCB
                                                                  SHA-256:EC1702806F4CC7C42A82FC2B38E89835FDE7C64BB32060E0823C9077CA92EFB7
                                                                  SHA-512:F555E961B69E09628EAF9C61F465871E6984CD4D31014F954BB747351DAD9CEA6D17C1DB4BCA2C1EB7F187CB5F3C0518748C339C8B43BBD1DBD94AEAA16F58ED
                                                                  Malicious:false
                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):8192
                                                                  Entropy (8bit):0.012340643231932763
                                                                  Encrypted:false
                                                                  SSDEEP:3:MsGl3ll:/y
                                                                  MD5:41876349CB12D6DB992F1309F22DF3F0
                                                                  SHA1:5CF26B3420FC0302CD0A71E8D029739B8765BE27
                                                                  SHA-256:E09F42C398D688DCE168570291F1F92D079987DEDA3099A34ADB9E8C0522B30C
                                                                  SHA-512:E9A4FC1F7CB6AE2901F8E02354A92C4AAA7A53C640DCF692DB42A27A5ACC2A3BFB25A0DE0EB08AB53983132016E7D43132EA4292E439BB636AAFD53FB6EF907E
                                                                  Malicious:false
                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                                                                  Category:dropped
                                                                  Size (bytes):262512
                                                                  Entropy (8bit):9.553120663130604E-4
                                                                  Encrypted:false
                                                                  SSDEEP:3:LsNllht:Ls3jt
                                                                  MD5:D2633A5EC7758DD6A1A4F1832BABCF2D
                                                                  SHA1:6F46D283B250CE88FAD4D8D15EE704F489C67A89
                                                                  SHA-256:151F74E890259721BB05DD50273161E07EF15B5646C9629DE0CA7C2C81A54786
                                                                  SHA-512:2458428AF4CCD19AEF9A771EA77FA6B05C76A1915992515D8C4E7AA0B6FEECA409E542384E659E04EEEE9E0BB8F3AAA7A3B04FFCB82EA4C0A902D78E4C12883F
                                                                  Malicious:false
                                                                  Preview:.........................................;..p./.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):120
                                                                  Entropy (8bit):3.32524464792714
                                                                  Encrypted:false
                                                                  SSDEEP:3:tbloIlrJFlXnpQoWcNylRjlgbYnPdJiG6R7lZAUAl:tbdlrYoWcV0n1IGi7kBl
                                                                  MD5:A397E5983D4A1619E36143B4D804B870
                                                                  SHA1:AA135A8CC2469CFD1EF2D7955F027D95BE5DFBD4
                                                                  SHA-256:9C70F766D3B84FC2BB298EFA37CC9191F28BEC336329CC11468CFADBC3B137F4
                                                                  SHA-512:4159EA654152D2810C95648694DD71957C84EA825FCCA87B36F7E3282A72B30EF741805C610C5FA847CA186E34BDE9C289AAA7B6931C5B257F1D11255CD2A816
                                                                  Malicious:false
                                                                  Preview:C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.M.i.c.r.o.s.o.f.t.\.E.d.g.e.\.A.p.p.l.i.c.a.t.i.o.n.\.m.s.e.d.g.e...e.x.e.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):13
                                                                  Entropy (8bit):2.6612262562697895
                                                                  Encrypted:false
                                                                  SSDEEP:3:NYLFRQZ:ap2Z
                                                                  MD5:B64BD80D877645C2DD14265B1A856F8A
                                                                  SHA1:F7379E1A6F8CE062E891C56736C789C7EA77CD6A
                                                                  SHA-256:83476CEEEB7682F41030664B4E17305986878D14E82D0C277FB99EC546B44569
                                                                  SHA-512:734A7316A269C76DD052D980CC0D5209C0BFEDFFC55B11C58FA25C433CE8A42536827298C3E58CACD68CC01593C23D39350E956E8DE2268D8D29918E1F0667F2
                                                                  Malicious:false
                                                                  Preview:117.0.2045.55
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):1370
                                                                  Entropy (8bit):5.505924086554277
                                                                  Encrypted:false
                                                                  SSDEEP:24:YpQBqDPak7u5rrtyV4J4jDHqJ63BTN/HyikzJdXBuBuwBkaL8Nh1VX9QoTEtCY/g:YuBqDPaf4V4OjDK+3rmgBzBkoG1ViRE5
                                                                  MD5:D4359FB7B1FD641BA56A668393D45121
                                                                  SHA1:6FF02DDD0C541D5C398C5B55EEC84FED4DFA35D8
                                                                  SHA-256:2A7E40DDFF9FC599A0AA06CF5D0ED617CE9EAC22FDF3CE6193430945B31F9A47
                                                                  SHA-512:EC36244DB2119081E0A43C07FD3B6FDF1E0249FB4F55F132CBC1F1EAC263BBFCE97D2051C036A6DA695422B05C7776C404A42B05DBFF6A5954473FA1FD1014E0
                                                                  Malicious:false
                                                                  Preview:{"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false}},"legacy":{"profile":{"name":{"migrated":true}}},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAACil8ci2iRiRbc/M6tnn7Y/EAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAABGd/X1X+IFVGYzzRRY1edL4H9bG+nyLnECwMmdCzgtdgAAAAAOgAAAAAIAACAAAAClBbgibr9cptpL1vmpa1Q8rCjIEnM5NvEjhoWQicFzODAAAABGWrmYfaH1aGfTR/5m8YaNIaNuTIcY+e2mHFUDKbPg85zCIsvRrEhMW/nTOk+/9xRAAAAAmXLbfixgDAKcs4en34Xgn/dqHCR87fpe4wcmeVl01V7s+/EGFfVOE6S2xOU8mcmP4d9gt/wWm9UMIoztIn70HA=="},"profile":{"info_cache":{},"profile_counts_reported":"13369443295778944","profiles_order":[]},"smartscreen":{"enabled":true,"pua_protection_enabled":true},"telemetry_client":{"install_source_name":"windows","os_integration_level":5,"updater_version":"1.3.177.11","windows_update_applied":false},"uninstall_metrics":{"installation_date2":"1724969695"},"user_experienc
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):1370
                                                                  Entropy (8bit):5.505924086554277
                                                                  Encrypted:false
                                                                  SSDEEP:24:YpQBqDPak7u5rrtyV4J4jDHqJ63BTN/HyikzJdXBuBuwBkaL8Nh1VX9QoTEtCY/g:YuBqDPaf4V4OjDK+3rmgBzBkoG1ViRE5
                                                                  MD5:D4359FB7B1FD641BA56A668393D45121
                                                                  SHA1:6FF02DDD0C541D5C398C5B55EEC84FED4DFA35D8
                                                                  SHA-256:2A7E40DDFF9FC599A0AA06CF5D0ED617CE9EAC22FDF3CE6193430945B31F9A47
                                                                  SHA-512:EC36244DB2119081E0A43C07FD3B6FDF1E0249FB4F55F132CBC1F1EAC263BBFCE97D2051C036A6DA695422B05C7776C404A42B05DBFF6A5954473FA1FD1014E0
                                                                  Malicious:false
                                                                  Preview:{"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false}},"legacy":{"profile":{"name":{"migrated":true}}},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAACil8ci2iRiRbc/M6tnn7Y/EAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAABGd/X1X+IFVGYzzRRY1edL4H9bG+nyLnECwMmdCzgtdgAAAAAOgAAAAAIAACAAAAClBbgibr9cptpL1vmpa1Q8rCjIEnM5NvEjhoWQicFzODAAAABGWrmYfaH1aGfTR/5m8YaNIaNuTIcY+e2mHFUDKbPg85zCIsvRrEhMW/nTOk+/9xRAAAAAmXLbfixgDAKcs4en34Xgn/dqHCR87fpe4wcmeVl01V7s+/EGFfVOE6S2xOU8mcmP4d9gt/wWm9UMIoztIn70HA=="},"profile":{"info_cache":{},"profile_counts_reported":"13369443295778944","profiles_order":[]},"smartscreen":{"enabled":true,"pua_protection_enabled":true},"telemetry_client":{"install_source_name":"windows","os_integration_level":5,"updater_version":"1.3.177.11","windows_update_applied":false},"uninstall_metrics":{"installation_date2":"1724969695"},"user_experienc
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):1370
                                                                  Entropy (8bit):5.505924086554277
                                                                  Encrypted:false
                                                                  SSDEEP:24:YpQBqDPak7u5rrtyV4J4jDHqJ63BTN/HyikzJdXBuBuwBkaL8Nh1VX9QoTEtCY/g:YuBqDPaf4V4OjDK+3rmgBzBkoG1ViRE5
                                                                  MD5:D4359FB7B1FD641BA56A668393D45121
                                                                  SHA1:6FF02DDD0C541D5C398C5B55EEC84FED4DFA35D8
                                                                  SHA-256:2A7E40DDFF9FC599A0AA06CF5D0ED617CE9EAC22FDF3CE6193430945B31F9A47
                                                                  SHA-512:EC36244DB2119081E0A43C07FD3B6FDF1E0249FB4F55F132CBC1F1EAC263BBFCE97D2051C036A6DA695422B05C7776C404A42B05DBFF6A5954473FA1FD1014E0
                                                                  Malicious:false
                                                                  Preview:{"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false}},"legacy":{"profile":{"name":{"migrated":true}}},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAACil8ci2iRiRbc/M6tnn7Y/EAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAABGd/X1X+IFVGYzzRRY1edL4H9bG+nyLnECwMmdCzgtdgAAAAAOgAAAAAIAACAAAAClBbgibr9cptpL1vmpa1Q8rCjIEnM5NvEjhoWQicFzODAAAABGWrmYfaH1aGfTR/5m8YaNIaNuTIcY+e2mHFUDKbPg85zCIsvRrEhMW/nTOk+/9xRAAAAAmXLbfixgDAKcs4en34Xgn/dqHCR87fpe4wcmeVl01V7s+/EGFfVOE6S2xOU8mcmP4d9gt/wWm9UMIoztIn70HA=="},"profile":{"info_cache":{},"profile_counts_reported":"13369443295778944","profiles_order":[]},"smartscreen":{"enabled":true,"pua_protection_enabled":true},"telemetry_client":{"install_source_name":"windows","os_integration_level":5,"updater_version":"1.3.177.11","windows_update_applied":false},"uninstall_metrics":{"installation_date2":"1724969695"},"user_experienc
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):1370
                                                                  Entropy (8bit):5.505924086554277
                                                                  Encrypted:false
                                                                  SSDEEP:24:YpQBqDPak7u5rrtyV4J4jDHqJ63BTN/HyikzJdXBuBuwBkaL8Nh1VX9QoTEtCY/g:YuBqDPaf4V4OjDK+3rmgBzBkoG1ViRE5
                                                                  MD5:D4359FB7B1FD641BA56A668393D45121
                                                                  SHA1:6FF02DDD0C541D5C398C5B55EEC84FED4DFA35D8
                                                                  SHA-256:2A7E40DDFF9FC599A0AA06CF5D0ED617CE9EAC22FDF3CE6193430945B31F9A47
                                                                  SHA-512:EC36244DB2119081E0A43C07FD3B6FDF1E0249FB4F55F132CBC1F1EAC263BBFCE97D2051C036A6DA695422B05C7776C404A42B05DBFF6A5954473FA1FD1014E0
                                                                  Malicious:false
                                                                  Preview:{"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false}},"legacy":{"profile":{"name":{"migrated":true}}},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAACil8ci2iRiRbc/M6tnn7Y/EAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAABGd/X1X+IFVGYzzRRY1edL4H9bG+nyLnECwMmdCzgtdgAAAAAOgAAAAAIAACAAAAClBbgibr9cptpL1vmpa1Q8rCjIEnM5NvEjhoWQicFzODAAAABGWrmYfaH1aGfTR/5m8YaNIaNuTIcY+e2mHFUDKbPg85zCIsvRrEhMW/nTOk+/9xRAAAAAmXLbfixgDAKcs4en34Xgn/dqHCR87fpe4wcmeVl01V7s+/EGFfVOE6S2xOU8mcmP4d9gt/wWm9UMIoztIn70HA=="},"profile":{"info_cache":{},"profile_counts_reported":"13369443295778944","profiles_order":[]},"smartscreen":{"enabled":true,"pua_protection_enabled":true},"telemetry_client":{"install_source_name":"windows","os_integration_level":5,"updater_version":"1.3.177.11","windows_update_applied":false},"uninstall_metrics":{"installation_date2":"1724969695"},"user_experienc
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):1370
                                                                  Entropy (8bit):5.505924086554277
                                                                  Encrypted:false
                                                                  SSDEEP:24:YpQBqDPak7u5rrtyV4J4jDHqJ63BTN/HyikzJdXBuBuwBkaL8Nh1VX9QoTEtCY/g:YuBqDPaf4V4OjDK+3rmgBzBkoG1ViRE5
                                                                  MD5:D4359FB7B1FD641BA56A668393D45121
                                                                  SHA1:6FF02DDD0C541D5C398C5B55EEC84FED4DFA35D8
                                                                  SHA-256:2A7E40DDFF9FC599A0AA06CF5D0ED617CE9EAC22FDF3CE6193430945B31F9A47
                                                                  SHA-512:EC36244DB2119081E0A43C07FD3B6FDF1E0249FB4F55F132CBC1F1EAC263BBFCE97D2051C036A6DA695422B05C7776C404A42B05DBFF6A5954473FA1FD1014E0
                                                                  Malicious:false
                                                                  Preview:{"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false}},"legacy":{"profile":{"name":{"migrated":true}}},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAACil8ci2iRiRbc/M6tnn7Y/EAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAABGd/X1X+IFVGYzzRRY1edL4H9bG+nyLnECwMmdCzgtdgAAAAAOgAAAAAIAACAAAAClBbgibr9cptpL1vmpa1Q8rCjIEnM5NvEjhoWQicFzODAAAABGWrmYfaH1aGfTR/5m8YaNIaNuTIcY+e2mHFUDKbPg85zCIsvRrEhMW/nTOk+/9xRAAAAAmXLbfixgDAKcs4en34Xgn/dqHCR87fpe4wcmeVl01V7s+/EGFfVOE6S2xOU8mcmP4d9gt/wWm9UMIoztIn70HA=="},"profile":{"info_cache":{},"profile_counts_reported":"13369443295778944","profiles_order":[]},"smartscreen":{"enabled":true,"pua_protection_enabled":true},"telemetry_client":{"install_source_name":"windows","os_integration_level":5,"updater_version":"1.3.177.11","windows_update_applied":false},"uninstall_metrics":{"installation_date2":"1724969695"},"user_experienc
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):1370
                                                                  Entropy (8bit):5.505924086554277
                                                                  Encrypted:false
                                                                  SSDEEP:24:YpQBqDPak7u5rrtyV4J4jDHqJ63BTN/HyikzJdXBuBuwBkaL8Nh1VX9QoTEtCY/g:YuBqDPaf4V4OjDK+3rmgBzBkoG1ViRE5
                                                                  MD5:D4359FB7B1FD641BA56A668393D45121
                                                                  SHA1:6FF02DDD0C541D5C398C5B55EEC84FED4DFA35D8
                                                                  SHA-256:2A7E40DDFF9FC599A0AA06CF5D0ED617CE9EAC22FDF3CE6193430945B31F9A47
                                                                  SHA-512:EC36244DB2119081E0A43C07FD3B6FDF1E0249FB4F55F132CBC1F1EAC263BBFCE97D2051C036A6DA695422B05C7776C404A42B05DBFF6A5954473FA1FD1014E0
                                                                  Malicious:false
                                                                  Preview:{"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false}},"legacy":{"profile":{"name":{"migrated":true}}},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAACil8ci2iRiRbc/M6tnn7Y/EAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAABGd/X1X+IFVGYzzRRY1edL4H9bG+nyLnECwMmdCzgtdgAAAAAOgAAAAAIAACAAAAClBbgibr9cptpL1vmpa1Q8rCjIEnM5NvEjhoWQicFzODAAAABGWrmYfaH1aGfTR/5m8YaNIaNuTIcY+e2mHFUDKbPg85zCIsvRrEhMW/nTOk+/9xRAAAAAmXLbfixgDAKcs4en34Xgn/dqHCR87fpe4wcmeVl01V7s+/EGFfVOE6S2xOU8mcmP4d9gt/wWm9UMIoztIn70HA=="},"profile":{"info_cache":{},"profile_counts_reported":"13369443295778944","profiles_order":[]},"smartscreen":{"enabled":true,"pua_protection_enabled":true},"telemetry_client":{"install_source_name":"windows","os_integration_level":5,"updater_version":"1.3.177.11","windows_update_applied":false},"uninstall_metrics":{"installation_date2":"1724969695"},"user_experienc
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):1370
                                                                  Entropy (8bit):5.505924086554277
                                                                  Encrypted:false
                                                                  SSDEEP:24:YpQBqDPak7u5rrtyV4J4jDHqJ63BTN/HyikzJdXBuBuwBkaL8Nh1VX9QoTEtCY/g:YuBqDPaf4V4OjDK+3rmgBzBkoG1ViRE5
                                                                  MD5:D4359FB7B1FD641BA56A668393D45121
                                                                  SHA1:6FF02DDD0C541D5C398C5B55EEC84FED4DFA35D8
                                                                  SHA-256:2A7E40DDFF9FC599A0AA06CF5D0ED617CE9EAC22FDF3CE6193430945B31F9A47
                                                                  SHA-512:EC36244DB2119081E0A43C07FD3B6FDF1E0249FB4F55F132CBC1F1EAC263BBFCE97D2051C036A6DA695422B05C7776C404A42B05DBFF6A5954473FA1FD1014E0
                                                                  Malicious:false
                                                                  Preview:{"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false}},"legacy":{"profile":{"name":{"migrated":true}}},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAACil8ci2iRiRbc/M6tnn7Y/EAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAABGd/X1X+IFVGYzzRRY1edL4H9bG+nyLnECwMmdCzgtdgAAAAAOgAAAAAIAACAAAAClBbgibr9cptpL1vmpa1Q8rCjIEnM5NvEjhoWQicFzODAAAABGWrmYfaH1aGfTR/5m8YaNIaNuTIcY+e2mHFUDKbPg85zCIsvRrEhMW/nTOk+/9xRAAAAAmXLbfixgDAKcs4en34Xgn/dqHCR87fpe4wcmeVl01V7s+/EGFfVOE6S2xOU8mcmP4d9gt/wWm9UMIoztIn70HA=="},"profile":{"info_cache":{},"profile_counts_reported":"13369443295778944","profiles_order":[]},"smartscreen":{"enabled":true,"pua_protection_enabled":true},"telemetry_client":{"install_source_name":"windows","os_integration_level":5,"updater_version":"1.3.177.11","windows_update_applied":false},"uninstall_metrics":{"installation_date2":"1724969695"},"user_experienc
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):1370
                                                                  Entropy (8bit):5.505924086554277
                                                                  Encrypted:false
                                                                  SSDEEP:24:YpQBqDPak7u5rrtyV4J4jDHqJ63BTN/HyikzJdXBuBuwBkaL8Nh1VX9QoTEtCY/g:YuBqDPaf4V4OjDK+3rmgBzBkoG1ViRE5
                                                                  MD5:D4359FB7B1FD641BA56A668393D45121
                                                                  SHA1:6FF02DDD0C541D5C398C5B55EEC84FED4DFA35D8
                                                                  SHA-256:2A7E40DDFF9FC599A0AA06CF5D0ED617CE9EAC22FDF3CE6193430945B31F9A47
                                                                  SHA-512:EC36244DB2119081E0A43C07FD3B6FDF1E0249FB4F55F132CBC1F1EAC263BBFCE97D2051C036A6DA695422B05C7776C404A42B05DBFF6A5954473FA1FD1014E0
                                                                  Malicious:false
                                                                  Preview:{"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false}},"legacy":{"profile":{"name":{"migrated":true}}},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAACil8ci2iRiRbc/M6tnn7Y/EAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAABGd/X1X+IFVGYzzRRY1edL4H9bG+nyLnECwMmdCzgtdgAAAAAOgAAAAAIAACAAAAClBbgibr9cptpL1vmpa1Q8rCjIEnM5NvEjhoWQicFzODAAAABGWrmYfaH1aGfTR/5m8YaNIaNuTIcY+e2mHFUDKbPg85zCIsvRrEhMW/nTOk+/9xRAAAAAmXLbfixgDAKcs4en34Xgn/dqHCR87fpe4wcmeVl01V7s+/EGFfVOE6S2xOU8mcmP4d9gt/wWm9UMIoztIn70HA=="},"profile":{"info_cache":{},"profile_counts_reported":"13369443295778944","profiles_order":[]},"smartscreen":{"enabled":true,"pua_protection_enabled":true},"telemetry_client":{"install_source_name":"windows","os_integration_level":5,"updater_version":"1.3.177.11","windows_update_applied":false},"uninstall_metrics":{"installation_date2":"1724969695"},"user_experienc
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):1370
                                                                  Entropy (8bit):5.505924086554277
                                                                  Encrypted:false
                                                                  SSDEEP:24:YpQBqDPak7u5rrtyV4J4jDHqJ63BTN/HyikzJdXBuBuwBkaL8Nh1VX9QoTEtCY/g:YuBqDPaf4V4OjDK+3rmgBzBkoG1ViRE5
                                                                  MD5:D4359FB7B1FD641BA56A668393D45121
                                                                  SHA1:6FF02DDD0C541D5C398C5B55EEC84FED4DFA35D8
                                                                  SHA-256:2A7E40DDFF9FC599A0AA06CF5D0ED617CE9EAC22FDF3CE6193430945B31F9A47
                                                                  SHA-512:EC36244DB2119081E0A43C07FD3B6FDF1E0249FB4F55F132CBC1F1EAC263BBFCE97D2051C036A6DA695422B05C7776C404A42B05DBFF6A5954473FA1FD1014E0
                                                                  Malicious:false
                                                                  Preview:{"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false}},"legacy":{"profile":{"name":{"migrated":true}}},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAACil8ci2iRiRbc/M6tnn7Y/EAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAABGd/X1X+IFVGYzzRRY1edL4H9bG+nyLnECwMmdCzgtdgAAAAAOgAAAAAIAACAAAAClBbgibr9cptpL1vmpa1Q8rCjIEnM5NvEjhoWQicFzODAAAABGWrmYfaH1aGfTR/5m8YaNIaNuTIcY+e2mHFUDKbPg85zCIsvRrEhMW/nTOk+/9xRAAAAAmXLbfixgDAKcs4en34Xgn/dqHCR87fpe4wcmeVl01V7s+/EGFfVOE6S2xOU8mcmP4d9gt/wWm9UMIoztIn70HA=="},"profile":{"info_cache":{},"profile_counts_reported":"13369443295778944","profiles_order":[]},"smartscreen":{"enabled":true,"pua_protection_enabled":true},"telemetry_client":{"install_source_name":"windows","os_integration_level":5,"updater_version":"1.3.177.11","windows_update_applied":false},"uninstall_metrics":{"installation_date2":"1724969695"},"user_experienc
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):1370
                                                                  Entropy (8bit):5.505924086554277
                                                                  Encrypted:false
                                                                  SSDEEP:24:YpQBqDPak7u5rrtyV4J4jDHqJ63BTN/HyikzJdXBuBuwBkaL8Nh1VX9QoTEtCY/g:YuBqDPaf4V4OjDK+3rmgBzBkoG1ViRE5
                                                                  MD5:D4359FB7B1FD641BA56A668393D45121
                                                                  SHA1:6FF02DDD0C541D5C398C5B55EEC84FED4DFA35D8
                                                                  SHA-256:2A7E40DDFF9FC599A0AA06CF5D0ED617CE9EAC22FDF3CE6193430945B31F9A47
                                                                  SHA-512:EC36244DB2119081E0A43C07FD3B6FDF1E0249FB4F55F132CBC1F1EAC263BBFCE97D2051C036A6DA695422B05C7776C404A42B05DBFF6A5954473FA1FD1014E0
                                                                  Malicious:false
                                                                  Preview:{"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false}},"legacy":{"profile":{"name":{"migrated":true}}},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAACil8ci2iRiRbc/M6tnn7Y/EAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAABGd/X1X+IFVGYzzRRY1edL4H9bG+nyLnECwMmdCzgtdgAAAAAOgAAAAAIAACAAAAClBbgibr9cptpL1vmpa1Q8rCjIEnM5NvEjhoWQicFzODAAAABGWrmYfaH1aGfTR/5m8YaNIaNuTIcY+e2mHFUDKbPg85zCIsvRrEhMW/nTOk+/9xRAAAAAmXLbfixgDAKcs4en34Xgn/dqHCR87fpe4wcmeVl01V7s+/EGFfVOE6S2xOU8mcmP4d9gt/wWm9UMIoztIn70HA=="},"profile":{"info_cache":{},"profile_counts_reported":"13369443295778944","profiles_order":[]},"smartscreen":{"enabled":true,"pua_protection_enabled":true},"telemetry_client":{"install_source_name":"windows","os_integration_level":5,"updater_version":"1.3.177.11","windows_update_applied":false},"uninstall_metrics":{"installation_date2":"1724969695"},"user_experienc
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 2
                                                                  Category:dropped
                                                                  Size (bytes):20480
                                                                  Entropy (8bit):0.46731661083066856
                                                                  Encrypted:false
                                                                  SSDEEP:12:TL1QAFUxOUDaabZXiDiIF8izX4fhhdWeci2oesJaYi3is25q0S9K0xHZ75fOV:TLiOUOq0afDdWec9sJf5Q7J5fc
                                                                  MD5:E93ACF0820CA08E5A5D2D159729F70E3
                                                                  SHA1:2C1A4D4924B9AEC1A796F108607404B000877C5D
                                                                  SHA-256:F2267FDA7F45499F7A01186B75CEFB799F8D2BC97E2E9B5068952D477294302C
                                                                  SHA-512:3BF36C20E04DCF1C16DC794E272F82F68B0DE43F16B4A9746B63B6D6BBC953B00BD7111CDA7AFE85CEBB2C447145483A382B15E2B0A5B36026C3441635D4E50C
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
                                                                  Category:dropped
                                                                  Size (bytes):8192
                                                                  Entropy (8bit):0.01057775872642915
                                                                  Encrypted:false
                                                                  SSDEEP:3:MsFl:/F
                                                                  MD5:CF89D16BB9107C631DAABF0C0EE58EFB
                                                                  SHA1:3AE5D3A7CF1F94A56E42F9A58D90A0B9616AE74B
                                                                  SHA-256:D6A5FE39CD672781B256E0E3102F7022635F1D4BB7CFCC90A80FFFE4D0F3877E
                                                                  SHA-512:8CB5B059C8105EB91E74A7D5952437AAA1ADA89763C5843E7B0F1B93D9EBE15ED40F287C652229291FAC02D712CF7FF5ECECEF276BA0D7DDC35558A3EC3F77B0
                                                                  Malicious:false
                                                                  Preview:............$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):270336
                                                                  Entropy (8bit):8.280239615765425E-4
                                                                  Encrypted:false
                                                                  SSDEEP:3:MsEllllkEthXllkl2:/M/xT02
                                                                  MD5:D0D388F3865D0523E451D6BA0BE34CC4
                                                                  SHA1:8571C6A52AACC2747C048E3419E5657B74612995
                                                                  SHA-256:902F30C1FB0597D0734BC34B979EC5D131F8F39A4B71B338083821216EC8D61B
                                                                  SHA-512:376011D00DE659EB6082A74E862CFAC97A9BB508E0B740761505142E2D24EC1C30AA61EFBC1C0DD08FF0F34734444DE7F77DD90A6CA42B48A4C7FAD5F0BDDD17
                                                                  Malicious:false
                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):8192
                                                                  Entropy (8bit):0.011852361981932763
                                                                  Encrypted:false
                                                                  SSDEEP:3:MsHlDll:/H
                                                                  MD5:0962291D6D367570BEE5454721C17E11
                                                                  SHA1:59D10A893EF321A706A9255176761366115BEDCB
                                                                  SHA-256:EC1702806F4CC7C42A82FC2B38E89835FDE7C64BB32060E0823C9077CA92EFB7
                                                                  SHA-512:F555E961B69E09628EAF9C61F465871E6984CD4D31014F954BB747351DAD9CEA6D17C1DB4BCA2C1EB7F187CB5F3C0518748C339C8B43BBD1DBD94AEAA16F58ED
                                                                  Malicious:false
                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):8192
                                                                  Entropy (8bit):0.012340643231932763
                                                                  Encrypted:false
                                                                  SSDEEP:3:MsGl3ll:/y
                                                                  MD5:41876349CB12D6DB992F1309F22DF3F0
                                                                  SHA1:5CF26B3420FC0302CD0A71E8D029739B8765BE27
                                                                  SHA-256:E09F42C398D688DCE168570291F1F92D079987DEDA3099A34ADB9E8C0522B30C
                                                                  SHA-512:E9A4FC1F7CB6AE2901F8E02354A92C4AAA7A53C640DCF692DB42A27A5ACC2A3BFB25A0DE0EB08AB53983132016E7D43132EA4292E439BB636AAFD53FB6EF907E
                                                                  Malicious:false
                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                                                                  Category:dropped
                                                                  Size (bytes):262512
                                                                  Entropy (8bit):9.553120663130604E-4
                                                                  Encrypted:false
                                                                  SSDEEP:3:LsNlibj:Ls3i
                                                                  MD5:A5DE8FD30B114113FB3E66C8EDCA955E
                                                                  SHA1:2450E429DF2BFEA1B22A29A3333AEA87D87AD151
                                                                  SHA-256:416537CB298DFBF8D97A277D1D5AF0E5A665A94887DC0FCF5AC63815BA68E439
                                                                  SHA-512:A395710DDE043DBB3D58538E9E6A2BF095B897E8175D8A5EB610C24050207BCC6A4CCE176D648B7E61D8B19FE6297848873B54E04B430B2871537B7B5C7189D1
                                                                  Malicious:false
                                                                  Preview:.........................................0~.p./.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):47
                                                                  Entropy (8bit):4.3818353308528755
                                                                  Encrypted:false
                                                                  SSDEEP:3:2jRo6jhM6ceYcUtS2djIn:5I2uxUt5Mn
                                                                  MD5:48324111147DECC23AC222A361873FC5
                                                                  SHA1:0DF8B2267ABBDBD11C422D23338262E3131A4223
                                                                  SHA-256:D8D672F953E823063955BD9981532FC3453800C2E74C0CC3653D091088ABD3B3
                                                                  SHA-512:E3B5DB7BA5E4E3DE3741F53D91B6B61D6EB9ECC8F4C07B6AE1C2293517F331B716114BAB41D7935888A266F7EBDA6FABA90023EFFEC850A929986053853F1E02
                                                                  Malicious:false
                                                                  Preview:customSettings_F95BA787499AB4FA9EFFF472CE383A14
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):35
                                                                  Entropy (8bit):4.014438730983427
                                                                  Encrypted:false
                                                                  SSDEEP:3:YDMGA2ADH/AYKEqsYq:YQXT/bKE1F
                                                                  MD5:BB57A76019EADEDC27F04EB2FB1F1841
                                                                  SHA1:8B41A1B995D45B7A74A365B6B1F1F21F72F86760
                                                                  SHA-256:2BAE8302F9BD2D87AE26ACF692663DF1639B8E2068157451DA4773BD8BD30A2B
                                                                  SHA-512:A455D7F8E0BE9A27CFB7BE8FE0B0E722B35B4C8F206CAD99064473F15700023D5995CC2C4FAFDB8FBB50F0BAB3EC8B241E9A512C0766AAAE1A86C3472C589FFD
                                                                  Malicious:false
                                                                  Preview:{"forceServiceDetermination":false}
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):29
                                                                  Entropy (8bit):3.922828737239167
                                                                  Encrypted:false
                                                                  SSDEEP:3:2NGw+K+:fwZ+
                                                                  MD5:7BAAFE811F480ACFCCCEE0D744355C79
                                                                  SHA1:24B89AE82313084BB8BBEB9AD98A550F41DF7B27
                                                                  SHA-256:D5743766AF0312C7B7728219FC24A03A4FB1C2A54A506F337953FBC2C1B847C7
                                                                  SHA-512:70FE1C197AF507CC0D65E99807D245C896A40A4271BA1121F9B621980877B43019E584C48780951FC1AD2A5D7D146FC6EA4678139A5B38F9B6F7A5F1E2E86BA3
                                                                  Malicious:false
                                                                  Preview:customSynchronousLookupUris_0
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):35302
                                                                  Entropy (8bit):7.99333285466604
                                                                  Encrypted:true
                                                                  SSDEEP:768:rRhaFePY38QBsj61g3g01LXoDGPpgb8KbMcnjrQCckBuJyqk3x8cBBT:rLP+TBK6ZQLXSsaMcnHQQcox80
                                                                  MD5:0E06E28C3536360DE3486B1A9E5195E8
                                                                  SHA1:EB768267F34EC16A6CCD1966DCA4C3C2870268AB
                                                                  SHA-256:F2658B1C913A96E75B45E6ADB464C8D796B34AC43BAF1635AA32E16D1752971C
                                                                  SHA-512:45F1E909599E2F63372867BC359CF72FD846619DFEB5359E52D5700E0B1BCFFE5FF07606511A3BFFDDD933A0507195439457E4E29A49EB6451F26186B7240041
                                                                  Malicious:false
                                                                  Preview:.......murmur3.....IN...9.......0..X..#l....C....]......pv..E..........,..?.N?....V..B-.*.F.1....g|..._.>'.-(V... .=.7P.m....#}.r.....>.LE...G.A.h5........J..=..L^-.Zl++,..h..o.y..~j.]u...W...&s.........M..........h3b..[.5.]..V^w.........a.*...6g3..%.gy../{|Z.B..X.}5.]..t.1.H&B.[.).$Y......2....L.t...{...[WE.yy.]..e.v0..\.J3..T.`1Lnh.../..-=w...W.&N7.nz.P...z......'i..R6....../....t.[..&-.....T&l..e....$.8.."....Iq....J.v..|.6.M...zE...a9uw..'.$6.L..m$......NB).JL.G.7}8(`....J.)b.E.m...c.0I.V...|$....;.k.......*8v..l.:..@.F.........K..2...%(...kA......LJd~._A.N.....$3...5....Z"...X=.....%.........6.k.....F..1..l,ia..i.i....y.M..Cl.....*...}.I..r..-+=b.6....%...#...W..K.....=.F....~.....[.......-...../;....~.09..d.....GR..H.lR...m.Huh9.:..A H./)..D.F..Y.n7.....7D.O.a;>Z.K....w...sq..qo3N...8@.zpD.Ku......+.Z=.zNFgP._@.z.ic.......3.....+..j...an%...X..7.q..A.l.7.S2..+....1.s.b..z...@v..!.y...N.C.XQ.p.\..x8(.<.....cq.(
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):18
                                                                  Entropy (8bit):3.5724312513221195
                                                                  Encrypted:false
                                                                  SSDEEP:3:kDnaV6bVon:kDYa2
                                                                  MD5:5692162977B015E31D5F35F50EFAB9CF
                                                                  SHA1:705DC80E8B32AC8B68F7E13CF8A75DCCB251ED7D
                                                                  SHA-256:42CCB5159B168DBE5D5DDF026E5F7ED3DBF50873CFE47C7C3EF0677BB07B90D4
                                                                  SHA-512:32905A4CC5BCE0FE8502DDD32096F40106625218BEDC4E218A344225D6DF2595A7B70EEB3695DCEFDD894ECB2B66BED479654E8E07F02526648E07ACFE47838C
                                                                  Malicious:false
                                                                  Preview:edgeSettings_2.0-0
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):3581
                                                                  Entropy (8bit):4.459693941095613
                                                                  Encrypted:false
                                                                  SSDEEP:96:JTMhnytNaSA4BOsNQNhnUZTFGKDIWHCgL5tfHaaJzRHF+P1sYmnfHUdT+GWBH7Y/:KyMot7vjFU
                                                                  MD5:BDE38FAE28EC415384B8CFE052306D6C
                                                                  SHA1:3019740AF622B58D573C00BF5C98DD77F3FBB5CD
                                                                  SHA-256:1F4542614473AE103A5EE3DEEEC61D033A40271CFF891AAA6797534E4DBB4D20
                                                                  SHA-512:9C369D69298EBF087412EDA782EE72AFE5448FD0D69EA5141C2744EA5F6C36CDF70A51845CDC174838BAC0ADABDFA70DF6AEDBF6E7867578AE7C4B7805A8B55E
                                                                  Malicious:false
                                                                  Preview:{"models":[],"geoidMaps":{"gw_my":"https://malaysia.smartscreen.microsoft.com/","gw_tw":"https://taiwan.smartscreen.microsoft.com/","gw_at":"https://austria.smartscreen.microsoft.com/","gw_es":"https://spain.smartscreen.microsoft.com/","gw_pl":"https://poland.smartscreen.microsoft.com/","gw_se":"https://sweden.smartscreen.microsoft.com/","gw_kr":"https://southkorea.smartscreen.microsoft.com/","gw_br":"https://brazil.smartscreen.microsoft.com/","au":"https://australia.smartscreen.microsoft.com/","dk":"https://denmark.smartscreen.microsoft.com/","gw_sg":"https://singapore.smartscreen.microsoft.com/","gw_fr":"https://france.smartscreen.microsoft.com/","gw_ca":"https://canada.smartscreen.microsoft.com/","test":"https://eu-9.smartscreen.microsoft.com/","gw_il":"https://israel.smartscreen.microsoft.com/","gw_au":"https://australia.smartscreen.microsoft.com/","gw_ffl4mod":"https://unitedstates4.ss.wd.microsoft.us/","gw_ffl4":"https://unitedstates1.ss.wd.microsoft.us/","gw_eu":"https://europe.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):47
                                                                  Entropy (8bit):4.493433469104717
                                                                  Encrypted:false
                                                                  SSDEEP:3:kfKbQSQSuLA5:kyUc5
                                                                  MD5:3F90757B200B52DCF5FDAC696EFD3D60
                                                                  SHA1:569A2E1BED9ECCDF7CD03E270AEF2BD7FF9B0E77
                                                                  SHA-256:1EE63F0A3502CFB7DF195FABBA41A7805008AB2CCCDAEB9AF990409D163D60C8
                                                                  SHA-512:39252BBAA33130DF50F36178A8EAB1D09165666D8A229FBB3495DD01CBE964F87CD2E6FCD479DFCA36BE06309EF18FEDA7F14722C57545203BBA24972D4835C8
                                                                  Malicious:false
                                                                  Preview:synchronousLookupUris_636976985063396749.rel.v2
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):35302
                                                                  Entropy (8bit):7.99333285466604
                                                                  Encrypted:true
                                                                  SSDEEP:768:rRhaFePY38QBsj61g3g01LXoDGPpgb8KbMcnjrQCckBuJyqk3x8cBBT:rLP+TBK6ZQLXSsaMcnHQQcox80
                                                                  MD5:0E06E28C3536360DE3486B1A9E5195E8
                                                                  SHA1:EB768267F34EC16A6CCD1966DCA4C3C2870268AB
                                                                  SHA-256:F2658B1C913A96E75B45E6ADB464C8D796B34AC43BAF1635AA32E16D1752971C
                                                                  SHA-512:45F1E909599E2F63372867BC359CF72FD846619DFEB5359E52D5700E0B1BCFFE5FF07606511A3BFFDDD933A0507195439457E4E29A49EB6451F26186B7240041
                                                                  Malicious:false
                                                                  Preview:.......murmur3.....IN...9.......0..X..#l....C....]......pv..E..........,..?.N?....V..B-.*.F.1....g|..._.>'.-(V... .=.7P.m....#}.r.....>.LE...G.A.h5........J..=..L^-.Zl++,..h..o.y..~j.]u...W...&s.........M..........h3b..[.5.]..V^w.........a.*...6g3..%.gy../{|Z.B..X.}5.]..t.1.H&B.[.).$Y......2....L.t...{...[WE.yy.]..e.v0..\.J3..T.`1Lnh.../..-=w...W.&N7.nz.P...z......'i..R6....../....t.[..&-.....T&l..e....$.8.."....Iq....J.v..|.6.M...zE...a9uw..'.$6.L..m$......NB).JL.G.7}8(`....J.)b.E.m...c.0I.V...|$....;.k.......*8v..l.:..@.F.........K..2...%(...kA......LJd~._A.N.....$3...5....Z"...X=.....%.........6.k.....F..1..l,ia..i.i....y.M..Cl.....*...}.I..r..-+=b.6....%...#...W..K.....=.F....~.....[.......-...../;....~.09..d.....GR..H.lR...m.Huh9.:..A H./)..D.F..Y.n7.....7D.O.a;>Z.K....w...sq..qo3N...8@.zpD.Ku......+.Z=.zNFgP._@.z.ic.......3.....+..j...an%...X..7.q..A.l.7.S2..+....1.s.b..z...@v..!.y...N.C.XQ.p.\..x8(.<.....cq.(
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):50
                                                                  Entropy (8bit):3.9904355005135823
                                                                  Encrypted:false
                                                                  SSDEEP:3:0xXF/XctY5GUf+:0RFeUf+
                                                                  MD5:E144AFBFB9EE10479AE2A9437D3FC9CA
                                                                  SHA1:5AAAC173107C688C06944D746394C21535B0514B
                                                                  SHA-256:EB28E8ED7C014F211BD81308853F407DF86AEBB5F80F8E4640C608CD772544C2
                                                                  SHA-512:837D15B3477C95D2D71391D677463A497D8D9FFBD7EB42E412DA262C9B5C82F22CE4338A0BEAA22C81A06ECA2DF7A9A98B7D61ECACE5F087912FD9BA7914AF3F
                                                                  Malicious:false
                                                                  Preview:topTraffic_170540185939602997400506234197983529371
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):575056
                                                                  Entropy (8bit):7.999649474060713
                                                                  Encrypted:true
                                                                  SSDEEP:12288:fXdhUG0PlM/EXEBQlbk19RrH76Im4u8C1jJodha:Ji80e9Rb7Tm4u8CnR
                                                                  MD5:BE5D1A12C1644421F877787F8E76642D
                                                                  SHA1:06C46A95B4BD5E145E015FA7E358A2D1AC52C809
                                                                  SHA-256:C1CE928FBEF4EF5A4207ABAFD9AB6382CC29D11DDECC215314B0522749EF6A5A
                                                                  SHA-512:FD5B100E2F192164B77F4140ADF6DE0322F34D7B6F0CF14AED91BACAB18BB8F195F161F7CF8FB10651122A598CE474AC4DC39EDF47B6A85C90C854C2A3170960
                                                                  Malicious:false
                                                                  Preview:...._+jE.`..}....S..1....G}s..E....y".Wh.^.W.H...-...#.A...KR...9b........>k......bU.IVo...D......Y..[l.yx.......'c=..I0.....E.d...-...1 ....m../C...OQ.........qW..<:N.....38.u..X-..s....<..U.,Mi..._.......`.Y/.........^..,.E..........j@..G8..N.... ..Ea...4.+.79k.!T.-5W..!..@+..!.P..LDG.....V."....L.... .(#..$..&......C.....%A.T}....K_.S..'Q.".d....s....(j.D!......Ov..)*d0)."(..%..-..G..L.}....i.....m9;.....t.w..0....f?..-..M.c.3.....N7K.T..D>.3.x...z..u$5!..4..T.....U.O^L{.5..=E..'..;.}(|.6.:..f!.>...?M.8......P.D.J.I4.<...*.y.E....>....i%.6..Y.@..n.....M..r..C.f.;..<..0.H...F....h.......HB1]1....u..:...H..k....B.Q..J...@}j~.#...'Y.J~....I...ub.&..L[z..1.W/.Ck....M.......[.......N.F..z*.{nZ~d.V.4.u.K.V.......X.<p..cz..>*....X...W..da3(..g..Z$.L4.j=~.p.l.\.[e.&&.Y ...U)..._.^r0.,.{_......`S..[....(.\..p.bt.g..%.$+....f.....d....Im..f...W ......G..i_8a..ae..7....pS.....z-H..A.s.4.3..O.r.....u.S......a.}..v.-/..... ...a.x#./:...sS&U.().xL...pg
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):86
                                                                  Entropy (8bit):4.3751917412896075
                                                                  Encrypted:false
                                                                  SSDEEP:3:YQ3JYq9xSs0dMEJAELJ2rjozQan:YQ3Kq9X0dMgAEwjM
                                                                  MD5:961E3604F228B0D10541EBF921500C86
                                                                  SHA1:6E00570D9F78D9CFEBE67D4DA5EFE546543949A7
                                                                  SHA-256:F7B24F2EB3D5EB0550527490395D2F61C3D2FE74BB9CB345197DAD81B58B5FED
                                                                  SHA-512:535F930AFD2EF50282715C7E48859CC2D7B354FF4E6C156B94D5A2815F589B33189FFEDFCAF4456525283E993087F9F560D84CFCF497D189AB8101510A09C472
                                                                  Malicious:false
                                                                  Preview:{"user_experience_metrics.stability.exited_cleanly":false,"variations_crash_streak":0}
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):1370
                                                                  Entropy (8bit):5.505924086554277
                                                                  Encrypted:false
                                                                  SSDEEP:24:YpQBqDPak7u5rrtyV4J4jDHqJ63BTN/HyikzJdXBuBuwBkaL8Nh1VX9QoTEtCY/g:YuBqDPaf4V4OjDK+3rmgBzBkoG1ViRE5
                                                                  MD5:D4359FB7B1FD641BA56A668393D45121
                                                                  SHA1:6FF02DDD0C541D5C398C5B55EEC84FED4DFA35D8
                                                                  SHA-256:2A7E40DDFF9FC599A0AA06CF5D0ED617CE9EAC22FDF3CE6193430945B31F9A47
                                                                  SHA-512:EC36244DB2119081E0A43C07FD3B6FDF1E0249FB4F55F132CBC1F1EAC263BBFCE97D2051C036A6DA695422B05C7776C404A42B05DBFF6A5954473FA1FD1014E0
                                                                  Malicious:false
                                                                  Preview:{"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false}},"legacy":{"profile":{"name":{"migrated":true}}},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAACil8ci2iRiRbc/M6tnn7Y/EAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAABGd/X1X+IFVGYzzRRY1edL4H9bG+nyLnECwMmdCzgtdgAAAAAOgAAAAAIAACAAAAClBbgibr9cptpL1vmpa1Q8rCjIEnM5NvEjhoWQicFzODAAAABGWrmYfaH1aGfTR/5m8YaNIaNuTIcY+e2mHFUDKbPg85zCIsvRrEhMW/nTOk+/9xRAAAAAmXLbfixgDAKcs4en34Xgn/dqHCR87fpe4wcmeVl01V7s+/EGFfVOE6S2xOU8mcmP4d9gt/wWm9UMIoztIn70HA=="},"profile":{"info_cache":{},"profile_counts_reported":"13369443295778944","profiles_order":[]},"smartscreen":{"enabled":true,"pua_protection_enabled":true},"telemetry_client":{"install_source_name":"windows","os_integration_level":5,"updater_version":"1.3.177.11","windows_update_applied":false},"uninstall_metrics":{"installation_date2":"1724969695"},"user_experienc
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):70695
                                                                  Entropy (8bit):6.073175014159445
                                                                  Encrypted:false
                                                                  SSDEEP:1536:wMGQ5XMBGYA3HQkj4D0vS+2MVIW8c1cWbx:wMrJM8/3H2D0vS+2MVITc1cWbx
                                                                  MD5:5CE6529B3F3BB4BB89E19F10225C4569
                                                                  SHA1:1F2249294483EAD68321C6ACFA3B3D2B9AD6BF85
                                                                  SHA-256:E642655DAD0FCD6C3AA026A6598E74EEA0FD7DC456CBBDC2956C44DC990AFD37
                                                                  SHA-512:D2F23662B8E32B25B75B2A5EF905D754AC2FE746DF53B27ED3E98AB959DA0F08D1A2E851C2AD4575D858A9904632B2967733E86418A7DC9B1DB0E2F55B4ECD9C
                                                                  Malicious:false
                                                                  Preview:{"abusive_adblocker_etag":"\"5E25271B8190D943537AD3FDB50874FC133E8B4A00380E2A6A888D63386F728B\"","apps_count_check_time":"13369443297876732","domain_actions_config":"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
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):70656
                                                                  Entropy (8bit):6.073107081801113
                                                                  Encrypted:false
                                                                  SSDEEP:1536:wMGQ5XMBGLA3HQkj4D0vS+2MVIW8c1cWbx:wMrJM803H2D0vS+2MVITc1cWbx
                                                                  MD5:FEDB4E61E69DE8FCD20B0E46D17DF266
                                                                  SHA1:36B4DCF49D2BEFCD8538D154D1D3C73640C55D41
                                                                  SHA-256:50837986F732C7DC11E871614FB2AC3E2EDB4733FE096F4DD45B828059BB7425
                                                                  SHA-512:84D08B3B5F9CD832F9E3304E269EE0A4E57035C0544476BEBE88F9E7D0C8EF135F600CE809E060F5A3AE16E53DB7329AA150E7534819417743EAD34C53FDDC79
                                                                  Malicious:false
                                                                  Preview:{"abusive_adblocker_etag":"\"5E25271B8190D943537AD3FDB50874FC133E8B4A00380E2A6A888D63386F728B\"","apps_count_check_time":"13369443297876732","domain_actions_config":"H4sIAAAAAAAAAL1dWZPktpH+KxP9ZDtU6GMujfykHY9txVpHyHIoYh2ODhBEkWiCAAdHVbEc/u+bCVb1dE8RqEqOdh806mbzw8VEXshM/PuKb27vha2luF9LHqKT96KVoru3G+mcquXVN/++4sOgleBBWeOvvvnn4YGs7wcLz8erb65+HMKPMVx9dVXbnisDT4wMa612TNj+6j9fUSA+xFpZPyH/9dVVQig59Wx4L5+Cwzjg799ubt/jJP48zeE9TuHwDjYBc/Ew+Ktvbv/z1ZWoe+rsjB4/7Abr5U+ajz9LXo9Px+21Mk1hoo/oX6HHjTLyKTjYyMJmCbLnO/hZMpjFAjSvxOIhbxgi5FK85m+ZCkuQu7UyKoxLO97yIFoYvbAluiw2oRoYgIQ2nG2AqJY2U+koRXQbbMm3fMsEX9JMK3GLbeAvNjhrlo5GOJiTA/oXLTdG6qXtmMBDiyS59PvY7eCklyb4QcfFi7tpdwu3VBt1XNorvM4+RiU6+CjD0kb+pHz7rRm3rXSyzABnWdKBG+Ijlx7hEE4QTzo+AB6fnDLLJBpo7PKv8Ob367/KjUg8mcY6CmCjTJCmtsWFOcUf5vj04cw0e1yZe2WAl8svFn5IC43jfc+dLnGrEyDwAicHCxNdhlrVa5LEtTgt5u2lAK02pd198r5dr5VYgHj55jUJZGTtlg0NlA7S5AnvB8l7z3olnPV2vfCLsugvBUH7vTVIe9Y151SnmS2Auyvcr5UGYXBvzT2s0L3fKpCZl+2D91MLf04NPNNUni9BZmDP4Sfjk2Ig7ktgg8r8InfhHz//zSP7e8bquWlsDJ411j
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):44966
                                                                  Entropy (8bit):6.094775794245049
                                                                  Encrypted:false
                                                                  SSDEEP:768:+DXzgWPsj/qlGJqIY8GB4xWtXi1zNtTl6NMciQ3zr4EUKJDSgzMMd6qD47u3+CiB:+/Ps+wsI7yORc8KtSmd6qE7lFoC
                                                                  MD5:C8FC673E2B39DA9D7AD6F9AAB7101E09
                                                                  SHA1:C5F9202745FD61EA09420D3E385E5D5BF831C57A
                                                                  SHA-256:AE456DDC30CC64EB0BDFDC8CE14B6B3D58657B7B92B13143FF42ED3DE51A3A90
                                                                  SHA-512:6EE44F5DD7698F9A31CAED06F9C3845970D3CBCE4E762B8CEA36750EA368EF2330CD505748964DADF2D8C0D5D9B2A68B90F7473FCDE0EF25A62309FD44B64B9D
                                                                  Malicious:false
                                                                  Preview:{"abusive_adblocker_etag":"\"229EC35087C81534A88F41A12F3A505F330A0BE57C43F6CEB29F4718042EFC4F\"","apps_count_check_time":"13340961226065099","desktop_mode":{"clear_prefs_once_applied":true,"is_on":false,"is_on_by_default_applied":true,"is_search_only_on_by_default_applied":true},"domain_actions_config":"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
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):44967
                                                                  Entropy (8bit):6.094760155936541
                                                                  Encrypted:false
                                                                  SSDEEP:768:XDXzgWPsj/qlGJqIY8GB4xWyXi1zNtTl6NdciQ3zr4EUKJDSgzMMd6qD47u3+CiB:X/Ps+wsI7yOocfKtSmd6qE7lFoC
                                                                  MD5:DC1504029E536B2B2089C04C960D749D
                                                                  SHA1:C2F595BB7BA538F4B5D24FA329BD3A9139C06D6A
                                                                  SHA-256:69580E051ACB1EA1F0A6B4590EB4846B70F63263ABEF7FBA1124AB4103C2AF57
                                                                  SHA-512:F4DC9065BD8FE70BCE8C8B1BE79C6D3BFC8B9BA39033542C08FA63EEE287B0AC66B330097349D207CD09D62A4867E79F41A399A3DD4F5325AA677B9F27BE7F4B
                                                                  Malicious:false
                                                                  Preview:{"abusive_adblocker_etag":"\"229EC35087C81534A88F41A12F3A505F330A0BE57C43F6CEB29F4718042EFC4F\"","apps_count_check_time":"13369443314741099","desktop_mode":{"clear_prefs_once_applied":true,"is_on":false,"is_on_by_default_applied":true,"is_search_only_on_by_default_applied":true},"domain_actions_config":"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
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):4194304
                                                                  Entropy (8bit):0.12843291071367896
                                                                  Encrypted:false
                                                                  SSDEEP:768:HqjtIBK41/KPlc3QkssSQrReRGO+wC4C294jgBRGO:HqZIB9/Ql0osSQrReRGv6vejgBRG
                                                                  MD5:9BF4339110BDE60ED0884D87B36B8238
                                                                  SHA1:5BDC134134D259AA4AAF427ACF01601BB0328191
                                                                  SHA-256:9B246FD91EA4C0163FD3D188298E95CEF727DB0AD5ABDCF21D9B9B6490CF28E4
                                                                  SHA-512:E56B96C6E1E8E9C35F5749BAE242EE0BC3FCD24B9DD883FDA58255B747C71DECC8A9EA7FF10A9B54AAC00BDD0F0CD053F0C6E771C1688FCA02B1F11C8D43C935
                                                                  Malicious:false
                                                                  Preview:...@..@...@.....C.].....@...............X$..................`... ...i.y.........BrowserMetrics......i.y..Yd. .......A...................v.0.....UV&K.k<................UV&K.k<................UMA.PersistentHistograms.InitResult.....8...i.y.[".................................................i.y.Pq.30...............117.0.2045.55-64..".en-GB*...Windows NT..10.0.190452l..x86_64..?........".stqbdd20,1(.0..8..B.......2.:.M..BU..Be...?j...GenuineIntel... .. ..........x86_64...J....k..^o..J..l.zL.^o..J....\.^o..J.....f.^o..J....?.^o..P.Z...b.INBXj....... .8.@....................................w..U].0r........>.........."....."...24.."."+jDg7C0j+BlQ1Nj+QPG7Safjq+2ZvoQsMhxZL1Gpc+U="*.:............B)..1.3.177.11.. .*.RegKeyNotFound2.windowsR...Z...Nb.X9.I@..$...SF@.......Y@.......4@.......Y@........?........?.........................Y@.......Y@.......Y@.......Y@.......Y@.......Y@.......Y@.......4@.......Y@................Y@.......Y@.......Y@........?........?2............... .2......
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):280
                                                                  Entropy (8bit):4.0984945491284295
                                                                  Encrypted:false
                                                                  SSDEEP:3:FiWWltlcUpPmPIijS3XbnbO6YBVP/Sh/JzvbYuDRBOc7cEJHCll:o1cUh4Y3LbO/BVsJDbYuDRBOycd
                                                                  MD5:AFAC5E4CC1213807ACB7D1A0F61BCF99
                                                                  SHA1:FEDCA0A829A0DBCCD1E9D7048398372FF9604783
                                                                  SHA-256:FF48F538CBF3D665C9B115D6F3F6459E0CD7D9DF368E921E5A4BF2CA88E3C55F
                                                                  SHA-512:44F1A7E8C8DD1D5CE625AE26ED4074900A979ACD34BAFB3D3B354145690D37D34E07F2D0D9DEE81BE80EAFA9E3973AB11AD6E85EB23A804958584D8DB4902D66
                                                                  Malicious:false
                                                                  Preview:sdPC.....................cT..\.E.....P."+jDg7C0j+BlQ1Nj+QPG7Safjq+2ZvoQsMhxZL1Gpc+U="..................................................................................47DEQpj8HBSa+/TImW+5JCeuQeRkm5NMpJWZG3hSuFU=....................7aa5fc64-f4df-45d8-92ed-89470ca1c2d2............
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:very short file (no magic)
                                                                  Category:dropped
                                                                  Size (bytes):1
                                                                  Entropy (8bit):0.0
                                                                  Encrypted:false
                                                                  SSDEEP:3:L:L
                                                                  MD5:5058F1AF8388633F609CADB75A75DC9D
                                                                  SHA1:3A52CE780950D4D969792A2559CD519D7EE8C727
                                                                  SHA-256:CDB4EE2AEA69CC6A83331BBE96DC2CAA9A299D21329EFB0336FC02A82E1839A8
                                                                  SHA-512:0B61241D7C17BCBB1BAEE7094D14B7C451EFECC7FFCBD92598A0F13D313CC9EBC2A07E61F007BAF58FBF94FF9A8695BDD5CAE7CE03BBF1E94E93613A00F25F21
                                                                  Malicious:false
                                                                  Preview:.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:very short file (no magic)
                                                                  Category:dropped
                                                                  Size (bytes):1
                                                                  Entropy (8bit):0.0
                                                                  Encrypted:false
                                                                  SSDEEP:3:L:L
                                                                  MD5:5058F1AF8388633F609CADB75A75DC9D
                                                                  SHA1:3A52CE780950D4D969792A2559CD519D7EE8C727
                                                                  SHA-256:CDB4EE2AEA69CC6A83331BBE96DC2CAA9A299D21329EFB0336FC02A82E1839A8
                                                                  SHA-512:0B61241D7C17BCBB1BAEE7094D14B7C451EFECC7FFCBD92598A0F13D313CC9EBC2A07E61F007BAF58FBF94FF9A8695BDD5CAE7CE03BBF1E94E93613A00F25F21
                                                                  Malicious:false
                                                                  Preview:.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):352
                                                                  Entropy (8bit):5.232751105962155
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52UO23+q2PN723oH+TcwtnG2tMsIFUt8852UsmZmw+852UoNVkwON723oH+Tcwj:Np33+vVaYebn9GFUt88psm/+8p0V5Oa5
                                                                  MD5:F37B53E7A41F513E15F8BB034A0016C6
                                                                  SHA1:45BA9307C69714F891FD8372B93FABA1C94451C6
                                                                  SHA-256:B9CC71E09FD2D0AA90A95DBDFAB67EF0EA7139763C1F3D959F857425558246CB
                                                                  SHA-512:E3111A1A32489E092E18FF62D36ABA58603FC4C7FD72F7935DFDB37DDF91CF6BE1BC76AE23A647B09BE401747B2B027C39A49F0FEE42ECFEE09B7681BBCB9161
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:15:14.760 222c Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons/coupons_data.db/MANIFEST-000001.2024/08/29-18:15:14.777 222c Recovering log #3.2024/08/29-18:15:14.783 222c Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons/coupons_data.db/000003.log .
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):352
                                                                  Entropy (8bit):5.232751105962155
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52UO23+q2PN723oH+TcwtnG2tMsIFUt8852UsmZmw+852UoNVkwON723oH+Tcwj:Np33+vVaYebn9GFUt88psm/+8p0V5Oa5
                                                                  MD5:F37B53E7A41F513E15F8BB034A0016C6
                                                                  SHA1:45BA9307C69714F891FD8372B93FABA1C94451C6
                                                                  SHA-256:B9CC71E09FD2D0AA90A95DBDFAB67EF0EA7139763C1F3D959F857425558246CB
                                                                  SHA-512:E3111A1A32489E092E18FF62D36ABA58603FC4C7FD72F7935DFDB37DDF91CF6BE1BC76AE23A647B09BE401747B2B027C39A49F0FEE42ECFEE09B7681BBCB9161
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:15:14.760 222c Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons/coupons_data.db/MANIFEST-000001.2024/08/29-18:15:14.777 222c Recovering log #3.2024/08/29-18:15:14.783 222c Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons/coupons_data.db/000003.log .
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):352
                                                                  Entropy (8bit):5.232751105962155
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52UO23+q2PN723oH+TcwtnG2tMsIFUt8852UsmZmw+852UoNVkwON723oH+Tcwj:Np33+vVaYebn9GFUt88psm/+8p0V5Oa5
                                                                  MD5:F37B53E7A41F513E15F8BB034A0016C6
                                                                  SHA1:45BA9307C69714F891FD8372B93FABA1C94451C6
                                                                  SHA-256:B9CC71E09FD2D0AA90A95DBDFAB67EF0EA7139763C1F3D959F857425558246CB
                                                                  SHA-512:E3111A1A32489E092E18FF62D36ABA58603FC4C7FD72F7935DFDB37DDF91CF6BE1BC76AE23A647B09BE401747B2B027C39A49F0FEE42ECFEE09B7681BBCB9161
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:15:14.760 222c Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons/coupons_data.db/MANIFEST-000001.2024/08/29-18:15:14.777 222c Recovering log #3.2024/08/29-18:15:14.783 222c Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons/coupons_data.db/000003.log .
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):380
                                                                  Entropy (8bit):1.8784775129881184
                                                                  Encrypted:false
                                                                  SSDEEP:6:qTCTCTCTCTCTCTCTCTCTCTCTCTCTCTCTCTCTCTCT:qWWWWWWWWWWWWWWWWWWW
                                                                  MD5:9FE07A071FDA31327FA322B32FCA0B7E
                                                                  SHA1:A3E0BAE8853A163C9BB55F68616C795AAAF462E8
                                                                  SHA-256:E02333C0359406998E3FED40B69B61C9D28B2117CF9E6C0239E2E13EC13BA7C8
                                                                  SHA-512:9CCE621CD5B7CFBD899ABCBDD71235776FF9FF7DEA19C67F86E7F0603F7B09CA294CC16B672B742FA9B51387B2F0A501C3446872980BCA69ADE13F2B5677601D
                                                                  Malicious:false
                                                                  Preview:.f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5...............
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):328
                                                                  Entropy (8bit):5.163762545874254
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52UgbQL+q2PN723oH+Tcwt8aPrqIFUt8852U/bG1Zmw+852U/bQLVkwON723oHj:Npg0yvVaYebL3FUt88p8/+8psR5OaYeo
                                                                  MD5:F156FDACAC48521C927956E9460B2EDC
                                                                  SHA1:42DD189AA5B8506FFF11BF1A087DE9EA85B46041
                                                                  SHA-256:4495E9A0D32A67FA36A1317609AD3F81F4F3FAF8156B23A3B38D3F45597D73F8
                                                                  SHA-512:58C4D3750C0E4F242A3E92D7DC416A6E65186499E1D0A003954C501AE99D8AEDDAC19C902271B0BB3983988BC5227FBF9A1154FC9B22CA85202DA64340ADBFDF
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:15:14.553 2258 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules/MANIFEST-000001.2024/08/29-18:15:14.554 2258 Recovering log #3.2024/08/29-18:15:14.554 2258 Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules/000003.log .
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):328
                                                                  Entropy (8bit):5.163762545874254
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52UgbQL+q2PN723oH+Tcwt8aPrqIFUt8852U/bG1Zmw+852U/bQLVkwON723oHj:Npg0yvVaYebL3FUt88p8/+8psR5OaYeo
                                                                  MD5:F156FDACAC48521C927956E9460B2EDC
                                                                  SHA1:42DD189AA5B8506FFF11BF1A087DE9EA85B46041
                                                                  SHA-256:4495E9A0D32A67FA36A1317609AD3F81F4F3FAF8156B23A3B38D3F45597D73F8
                                                                  SHA-512:58C4D3750C0E4F242A3E92D7DC416A6E65186499E1D0A003954C501AE99D8AEDDAC19C902271B0BB3983988BC5227FBF9A1154FC9B22CA85202DA64340ADBFDF
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:15:14.553 2258 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules/MANIFEST-000001.2024/08/29-18:15:14.554 2258 Recovering log #3.2024/08/29-18:15:14.554 2258 Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules/000003.log .
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):380
                                                                  Entropy (8bit):1.8784775129881184
                                                                  Encrypted:false
                                                                  SSDEEP:6:qTCTCTCTCTCTCTCTCTCTCTCTCTCTCTCTCTCTCTCT:qWWWWWWWWWWWWWWWWWWW
                                                                  MD5:9FE07A071FDA31327FA322B32FCA0B7E
                                                                  SHA1:A3E0BAE8853A163C9BB55F68616C795AAAF462E8
                                                                  SHA-256:E02333C0359406998E3FED40B69B61C9D28B2117CF9E6C0239E2E13EC13BA7C8
                                                                  SHA-512:9CCE621CD5B7CFBD899ABCBDD71235776FF9FF7DEA19C67F86E7F0603F7B09CA294CC16B672B742FA9B51387B2F0A501C3446872980BCA69ADE13F2B5677601D
                                                                  Malicious:false
                                                                  Preview:.f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5...............
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):332
                                                                  Entropy (8bit):5.2034261904889405
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52U2QQL+q2PN723oH+Tcwt865IFUt8852UsGSG1Zmw+852UsGSQLVkwON723oHY:Np2FyvVaYeb/WFUt88pv/+8pLR5OaYev
                                                                  MD5:72FE015A48D30CDF05D782B8F6646CDA
                                                                  SHA1:5DF0AC653FC1112D9EA9F895C3A4958E7AF21DF2
                                                                  SHA-256:C5C184002B4FFA012DD16B500171869C505CB1D25F28556C6BDBFACAE30A1C1D
                                                                  SHA-512:9D08EA8E018313E4092143A0405B7B4FECF7777DF1F979E9BDA9684D975EE4C5B6BE20C6637B890B7136619071F25DE4ECB68A1B72D8D4376E306BC53EF3CB37
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:15:14.563 2258 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts/MANIFEST-000001.2024/08/29-18:15:14.564 2258 Recovering log #3.2024/08/29-18:15:14.564 2258 Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts/000003.log .
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):332
                                                                  Entropy (8bit):5.2034261904889405
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52U2QQL+q2PN723oH+Tcwt865IFUt8852UsGSG1Zmw+852UsGSQLVkwON723oHY:Np2FyvVaYeb/WFUt88pv/+8pLR5OaYev
                                                                  MD5:72FE015A48D30CDF05D782B8F6646CDA
                                                                  SHA1:5DF0AC653FC1112D9EA9F895C3A4958E7AF21DF2
                                                                  SHA-256:C5C184002B4FFA012DD16B500171869C505CB1D25F28556C6BDBFACAE30A1C1D
                                                                  SHA-512:9D08EA8E018313E4092143A0405B7B4FECF7777DF1F979E9BDA9684D975EE4C5B6BE20C6637B890B7136619071F25DE4ECB68A1B72D8D4376E306BC53EF3CB37
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:15:14.563 2258 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts/MANIFEST-000001.2024/08/29-18:15:14.564 2258 Recovering log #3.2024/08/29-18:15:14.564 2258 Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts/000003.log .
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):1140
                                                                  Entropy (8bit):1.8784775129881184
                                                                  Encrypted:false
                                                                  SSDEEP:12:qWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWW:
                                                                  MD5:914FD8DC5F9A741C6947E1AB12A9D113
                                                                  SHA1:6529EFE14E7B0BEA47D78B147243096408CDAAE4
                                                                  SHA-256:8BE3C96EE64B5D2768057EA1C4D1A70F40A0041585F3173806E2278E9300960B
                                                                  SHA-512:2862BF83C061414EFA2AC035FFC25BA9C4ED523B430FDEEED4974F55D4450A62766C2E799D0ACDB8269210078547048ACAABFD78EDE6AB91133E30F6B5EBFFBD
                                                                  Malicious:false
                                                                  Preview:.f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5........
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):328
                                                                  Entropy (8bit):5.1803332452622755
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52UWp99+q2PN723oH+Tcwt8NIFUt8852UWp9JZmw+852UWp99VkwON723oH+TcN:NpWp94vVaYebpFUt88pWp9J/+8pWp9Dw
                                                                  MD5:179DD9B26AEE92CED04BC0A116607575
                                                                  SHA1:5168B58E118AA45F854086965E77C46BDDB5AEFE
                                                                  SHA-256:61F4FD77CB225D2A230876718A9A7B9B81F360B3A1A002935F67E6FEC6A31FBC
                                                                  SHA-512:43A0A1123110AC9FF594C5E0C26800ABC108D66B524B49F654A74B47092B83E7E071B9250001588C8FC29FA69A4DAE6522C3E921408CB5962171041C2ED7FEFD
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:15:22.491 2378 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State/MANIFEST-000001.2024/08/29-18:15:22.491 2378 Recovering log #3.2024/08/29-18:15:22.491 2378 Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State/000003.log .
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):328
                                                                  Entropy (8bit):5.1803332452622755
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52UWp99+q2PN723oH+Tcwt8NIFUt8852UWp9JZmw+852UWp99VkwON723oH+TcN:NpWp94vVaYebpFUt88pWp9J/+8pWp9Dw
                                                                  MD5:179DD9B26AEE92CED04BC0A116607575
                                                                  SHA1:5168B58E118AA45F854086965E77C46BDDB5AEFE
                                                                  SHA-256:61F4FD77CB225D2A230876718A9A7B9B81F360B3A1A002935F67E6FEC6A31FBC
                                                                  SHA-512:43A0A1123110AC9FF594C5E0C26800ABC108D66B524B49F654A74B47092B83E7E071B9250001588C8FC29FA69A4DAE6522C3E921408CB5962171041C2ED7FEFD
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:15:22.491 2378 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State/MANIFEST-000001.2024/08/29-18:15:22.491 2378 Recovering log #3.2024/08/29-18:15:22.491 2378 Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State/000003.log .
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):328
                                                                  Entropy (8bit):5.1803332452622755
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52UWp99+q2PN723oH+Tcwt8NIFUt8852UWp9JZmw+852UWp99VkwON723oH+TcN:NpWp94vVaYebpFUt88pWp9J/+8pWp9Dw
                                                                  MD5:179DD9B26AEE92CED04BC0A116607575
                                                                  SHA1:5168B58E118AA45F854086965E77C46BDDB5AEFE
                                                                  SHA-256:61F4FD77CB225D2A230876718A9A7B9B81F360B3A1A002935F67E6FEC6A31FBC
                                                                  SHA-512:43A0A1123110AC9FF594C5E0C26800ABC108D66B524B49F654A74B47092B83E7E071B9250001588C8FC29FA69A4DAE6522C3E921408CB5962171041C2ED7FEFD
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:15:22.491 2378 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State/MANIFEST-000001.2024/08/29-18:15:22.491 2378 Recovering log #3.2024/08/29-18:15:22.491 2378 Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State/000003.log .
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):340
                                                                  Entropy (8bit):5.187688160065443
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52UUq2PN723oH+Tcwt8a2jMGIFUt8852UpXW1Zmw+852UpikwON723oH+Tcwt8N:NpUvVaYeb8EFUt88p5W1/+8pk5OaYebw
                                                                  MD5:1469BE540EF280392508B2A749500387
                                                                  SHA1:83D4F8B358A610C914CA0CD7C245B6221157FD4F
                                                                  SHA-256:8A42DF79B439B75EDD007950A179E85C33ADD426BC872C6420A7AAD9E6A4562B
                                                                  SHA-512:AAC0BA43C05891EFE6CCC073EA7A6830FFAE1ED92BAF897282BA6B429B463DD3F48202207BE793F628F18AD7236FFE6605A508D96DB38B776613393A86DA35C9
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:15:15.480 2360 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb/MANIFEST-000001.2024/08/29-18:15:15.492 2360 Recovering log #3.2024/08/29-18:15:15.506 2360 Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb/000003.log .
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):340
                                                                  Entropy (8bit):5.187688160065443
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52UUq2PN723oH+Tcwt8a2jMGIFUt8852UpXW1Zmw+852UpikwON723oH+Tcwt8N:NpUvVaYeb8EFUt88p5W1/+8pk5OaYebw
                                                                  MD5:1469BE540EF280392508B2A749500387
                                                                  SHA1:83D4F8B358A610C914CA0CD7C245B6221157FD4F
                                                                  SHA-256:8A42DF79B439B75EDD007950A179E85C33ADD426BC872C6420A7AAD9E6A4562B
                                                                  SHA-512:AAC0BA43C05891EFE6CCC073EA7A6830FFAE1ED92BAF897282BA6B429B463DD3F48202207BE793F628F18AD7236FFE6605A508D96DB38B776613393A86DA35C9
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:15:15.480 2360 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb/MANIFEST-000001.2024/08/29-18:15:15.492 2360 Recovering log #3.2024/08/29-18:15:15.506 2360 Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb/000003.log .
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):61
                                                                  Entropy (8bit):3.926136109079379
                                                                  Encrypted:false
                                                                  SSDEEP:3:YLb9N+eAXRfHDH2LSL:YHpoeSL
                                                                  MD5:4DF4574BFBB7E0B0BC56C2C9B12B6C47
                                                                  SHA1:81EFCBD3E3DA8221444A21F45305AF6FA4B71907
                                                                  SHA-256:E1B77550222C2451772C958E44026ABE518A2C8766862F331765788DDD196377
                                                                  SHA-512:78B14F60F2D80400FE50360CF303A961685396B7697775D078825A29B717081442D357C2039AD0984D4B622976B0314EDE8F478CDE320DAEC118DA546CB0682A
                                                                  Malicious:false
                                                                  Preview:{"net":{"http_server_properties":{"servers":[],"version":5}}}
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):61
                                                                  Entropy (8bit):3.926136109079379
                                                                  Encrypted:false
                                                                  SSDEEP:3:YLb9N+eAXRfHDH2LSL:YHpoeSL
                                                                  MD5:4DF4574BFBB7E0B0BC56C2C9B12B6C47
                                                                  SHA1:81EFCBD3E3DA8221444A21F45305AF6FA4B71907
                                                                  SHA-256:E1B77550222C2451772C958E44026ABE518A2C8766862F331765788DDD196377
                                                                  SHA-512:78B14F60F2D80400FE50360CF303A961685396B7697775D078825A29B717081442D357C2039AD0984D4B622976B0314EDE8F478CDE320DAEC118DA546CB0682A
                                                                  Malicious:false
                                                                  Preview:{"net":{"http_server_properties":{"servers":[],"version":5}}}
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):2
                                                                  Entropy (8bit):1.0
                                                                  Encrypted:false
                                                                  SSDEEP:3:H:H
                                                                  MD5:D751713988987E9331980363E24189CE
                                                                  SHA1:97D170E1550EEE4AFC0AF065B78CDA302A97674C
                                                                  SHA-256:4F53CDA18C2BAA0C0354BB5F9A3ECBE5ED12AB4D8E11BA873C2F11161202B945
                                                                  SHA-512:B25B294CB4DEB69EA00A4C3CF3113904801B6015E5956BD019A8570B1FE1D6040E944EF3CDEE16D0A46503CA6E659A25F21CF9CEDDC13F352A3C98138C15D6AF
                                                                  Malicious:false
                                                                  Preview:[]
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):2
                                                                  Entropy (8bit):1.0
                                                                  Encrypted:false
                                                                  SSDEEP:3:H:H
                                                                  MD5:D751713988987E9331980363E24189CE
                                                                  SHA1:97D170E1550EEE4AFC0AF065B78CDA302A97674C
                                                                  SHA-256:4F53CDA18C2BAA0C0354BB5F9A3ECBE5ED12AB4D8E11BA873C2F11161202B945
                                                                  SHA-512:B25B294CB4DEB69EA00A4C3CF3113904801B6015E5956BD019A8570B1FE1D6040E944EF3CDEE16D0A46503CA6E659A25F21CF9CEDDC13F352A3C98138C15D6AF
                                                                  Malicious:false
                                                                  Preview:[]
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):7818
                                                                  Entropy (8bit):5.085052307783759
                                                                  Encrypted:false
                                                                  SSDEEP:96:steqKzs1ebDd7wfiwXnMwjTrEm8zRsY5eh6Cb7/x+6MhmuecmAeZdDUEWCML/EJ:stezs96wFvrEmkRsY8bV+FiA0UEWbLMJ
                                                                  MD5:47A3F6A7CED51D8644B78488E373B96E
                                                                  SHA1:DCB7A71CD97779AB7284892A21A5D290D17030DC
                                                                  SHA-256:D25ECDD7DAC599F1F1D060E649F42E2E462FC190A5DB3F65D99189BFB3742D73
                                                                  SHA-512:4F623357BA9163C8488D41E24B81FD9FD39D40F58F8C39F29F35973CF5A6106E4FB2890F4E9543470CBADEF02CE12A57BEB9E4633A00788523D644CB5399C721
                                                                  Malicious:false
                                                                  Preview:{"aadc_info":{"age_group":0},"account_tracker_service_last_update":"13340960281231018","alternate_error_pages":{"backup":true},"apps":{"shortcuts_arch":"","shortcuts_version":0},"arbitration_experiences":{},"arbitration_local_nsat_reset_time":"13340961151815957","arbitration_using_experiment_config":false,"browser":{"available_dark_theme_options":"All","has_seen_welcome_page":false},"continuous_migration":{"ci_correction_for_holdout_treatment_state":1},"countryid_at_install":17224,"custom_links":{"list":[]},"default_apps_install_state":3,"domain_diversity":{"last_reporting_timestamp":"13369443314645161"},"dual_user":{"consumer_mode":{"ie_user":false},"consumer_site_list_with_ie_entries":false,"consumer_sitelist_location":"","consumer_sitelist_version":"","external_consumer_shared_cookie_data":{},"shared_cookie_data":{},"sitelist_data_2":{},"sitelist_has_consumer_data":false,"sitelist_has_enterprise_data":false,"sitelist_location":"","sitelist_source":0,"sitelist_version":""},"edge":{
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):7818
                                                                  Entropy (8bit):5.085052307783759
                                                                  Encrypted:false
                                                                  SSDEEP:96:steqKzs1ebDd7wfiwXnMwjTrEm8zRsY5eh6Cb7/x+6MhmuecmAeZdDUEWCML/EJ:stezs96wFvrEmkRsY8bV+FiA0UEWbLMJ
                                                                  MD5:47A3F6A7CED51D8644B78488E373B96E
                                                                  SHA1:DCB7A71CD97779AB7284892A21A5D290D17030DC
                                                                  SHA-256:D25ECDD7DAC599F1F1D060E649F42E2E462FC190A5DB3F65D99189BFB3742D73
                                                                  SHA-512:4F623357BA9163C8488D41E24B81FD9FD39D40F58F8C39F29F35973CF5A6106E4FB2890F4E9543470CBADEF02CE12A57BEB9E4633A00788523D644CB5399C721
                                                                  Malicious:false
                                                                  Preview:{"aadc_info":{"age_group":0},"account_tracker_service_last_update":"13340960281231018","alternate_error_pages":{"backup":true},"apps":{"shortcuts_arch":"","shortcuts_version":0},"arbitration_experiences":{},"arbitration_local_nsat_reset_time":"13340961151815957","arbitration_using_experiment_config":false,"browser":{"available_dark_theme_options":"All","has_seen_welcome_page":false},"continuous_migration":{"ci_correction_for_holdout_treatment_state":1},"countryid_at_install":17224,"custom_links":{"list":[]},"default_apps_install_state":3,"domain_diversity":{"last_reporting_timestamp":"13369443314645161"},"dual_user":{"consumer_mode":{"ie_user":false},"consumer_site_list_with_ie_entries":false,"consumer_sitelist_location":"","consumer_sitelist_version":"","external_consumer_shared_cookie_data":{},"shared_cookie_data":{},"sitelist_data_2":{},"sitelist_has_consumer_data":false,"sitelist_has_enterprise_data":false,"sitelist_location":"","sitelist_source":0,"sitelist_version":""},"edge":{
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):24691
                                                                  Entropy (8bit):5.5676908285271
                                                                  Encrypted:false
                                                                  SSDEEP:768:cgoGnaW9UW5wTuf4w/8F1+UoAYDCx9Tuqh0VfUC9xbog/OVPpJIP8ZNrwXIApftO:cDMaWUWaTufN/u1jassC2ftO
                                                                  MD5:0E329842628E7C9D2424D7E5D5204E63
                                                                  SHA1:9370369CB437E22AF6D76B29EF99AEDE1528C248
                                                                  SHA-256:20B80C0199C1FCA3DF0E76A6C11B47DD09E35D8B79F8A53DA3FC92E6D2DA686E
                                                                  SHA-512:104F95F80EA99F2CC4ABB7A7D798C72CF5F837AB6265F9486EC406C4ED0ABD680DFCA8CFE9E37EBB2E9508A6C1678020CEEF87F44E19624FD1C18E83984DD954
                                                                  Malicious:false
                                                                  Preview:{"edge_fundamentals_appdefaults":{"ess_lightweight_version":101},"ess_kv_states":{"restore_on_startup":{"closed_notification":false,"decrypt_success":true,"key":"restore_on_startup","notification_popup_count":0},"startup_urls":{"closed_notification":false,"decrypt_success":true,"key":"startup_urls","notification_popup_count":0},"template_url_data":{"closed_notification":false,"decrypt_success":true,"key":"template_url_data","notification_popup_count":0}},"extensions":{"settings":{"ahfgeienlihckogmohjhadlkjgocpleb":{"active_permissions":{"api":["management","system.display","system.storage","webstorePrivate","system.cpu","system.memory","system.network"],"explicit_host":[],"manifest_permissions":[],"scriptable_host":[]},"app_launcher_ordinal":"t","commands":{},"content_settings":[],"creation_flags":1,"events":[],"first_install_time":"13369443314463782","from_webstore":false,"incognito_content_settings":[],"incognito_preferences":{},"last_update_time":"13369443314463782","location":5,"ma
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):328
                                                                  Entropy (8bit):5.164557848720076
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52U6UIq2PN723oH+TcwtrQMxIFUt8852U4Zmw+852UURFzkwON723oH+TcwtrQq:Np6NvVaYebCFUt88p4/+8pIF5OaYebtJ
                                                                  MD5:B5D268DEF6D5B22586D5A10078006086
                                                                  SHA1:1CB65D91A8D24851752F62A56B69198DE74F42D1
                                                                  SHA-256:8804063A508CAFB6D2199AEC243D336F39A18529285BB79C1ECD8F5D0BCD0370
                                                                  SHA-512:3698A17BE75AD83E3FF7A2FEB6EA28A23770263A01D2BEC7B0F4EDAFAB67E47F1C6F51ABB3B39EAEC54C4748EEEC5A9097AD664BD0F62A886A7297481F95152E
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:15:15.475 2344 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage/MANIFEST-000001.2024/08/29-18:15:15.478 2344 Recovering log #3.2024/08/29-18:15:15.485 2344 Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage/000003.log .
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):328
                                                                  Entropy (8bit):5.164557848720076
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52U6UIq2PN723oH+TcwtrQMxIFUt8852U4Zmw+852UURFzkwON723oH+TcwtrQq:Np6NvVaYebCFUt88p4/+8pIF5OaYebtJ
                                                                  MD5:B5D268DEF6D5B22586D5A10078006086
                                                                  SHA1:1CB65D91A8D24851752F62A56B69198DE74F42D1
                                                                  SHA-256:8804063A508CAFB6D2199AEC243D336F39A18529285BB79C1ECD8F5D0BCD0370
                                                                  SHA-512:3698A17BE75AD83E3FF7A2FEB6EA28A23770263A01D2BEC7B0F4EDAFAB67E47F1C6F51ABB3B39EAEC54C4748EEEC5A9097AD664BD0F62A886A7297481F95152E
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:15:15.475 2344 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage/MANIFEST-000001.2024/08/29-18:15:15.478 2344 Recovering log #3.2024/08/29-18:15:15.485 2344 Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage/000003.log .
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):356
                                                                  Entropy (8bit):5.170868291566213
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52U024q2PN723oH+Tcwt7Uh2ghZIFUt8852U02JZmw+852UHDkwON723oH+TcwK:Np6vVaYebIhHh2FUt88pz/+8pj5OaYeQ
                                                                  MD5:3ABBD55F05A60B9BEE1DE3068B0A36A2
                                                                  SHA1:24ADAB6311758FD860A13AEE55974E7622B1BC5A
                                                                  SHA-256:48428AE5E6241311D09FE494CBAF8B6FEDF22E1EB4F8088D66554F9E6E11763A
                                                                  SHA-512:5DC1CBCA426275CFF90BA3289CE06EB3E3CC882EE491E00113FF96F98F0A056C78C958E92BFE6E14C729A401501D06F5F50BE0AB6F5C1A820938863C8307E91D
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:15:14.469 2254 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database/MANIFEST-000001.2024/08/29-18:15:14.469 2254 Recovering log #3.2024/08/29-18:15:14.470 2254 Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database/000003.log .
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):356
                                                                  Entropy (8bit):5.170868291566213
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52U024q2PN723oH+Tcwt7Uh2ghZIFUt8852U02JZmw+852UHDkwON723oH+TcwK:Np6vVaYebIhHh2FUt88pz/+8pj5OaYeQ
                                                                  MD5:3ABBD55F05A60B9BEE1DE3068B0A36A2
                                                                  SHA1:24ADAB6311758FD860A13AEE55974E7622B1BC5A
                                                                  SHA-256:48428AE5E6241311D09FE494CBAF8B6FEDF22E1EB4F8088D66554F9E6E11763A
                                                                  SHA-512:5DC1CBCA426275CFF90BA3289CE06EB3E3CC882EE491E00113FF96F98F0A056C78C958E92BFE6E14C729A401501D06F5F50BE0AB6F5C1A820938863C8307E91D
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:15:14.469 2254 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database/MANIFEST-000001.2024/08/29-18:15:14.469 2254 Recovering log #3.2024/08/29-18:15:14.470 2254 Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database/000003.log .
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):356
                                                                  Entropy (8bit):5.170868291566213
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52U024q2PN723oH+Tcwt7Uh2ghZIFUt8852U02JZmw+852UHDkwON723oH+TcwK:Np6vVaYebIhHh2FUt88pz/+8pj5OaYeQ
                                                                  MD5:3ABBD55F05A60B9BEE1DE3068B0A36A2
                                                                  SHA1:24ADAB6311758FD860A13AEE55974E7622B1BC5A
                                                                  SHA-256:48428AE5E6241311D09FE494CBAF8B6FEDF22E1EB4F8088D66554F9E6E11763A
                                                                  SHA-512:5DC1CBCA426275CFF90BA3289CE06EB3E3CC882EE491E00113FF96F98F0A056C78C958E92BFE6E14C729A401501D06F5F50BE0AB6F5C1A820938863C8307E91D
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:15:14.469 2254 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database/MANIFEST-000001.2024/08/29-18:15:14.469 2254 Recovering log #3.2024/08/29-18:15:14.470 2254 Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database/000003.log .
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):438
                                                                  Entropy (8bit):5.247969285282022
                                                                  Encrypted:false
                                                                  SSDEEP:12:NprIvVaYebvqBQFUt88pPm/+8pb5OaYebvqBvJ:NpuVaYebvZg88pPkpNOaYebvk
                                                                  MD5:C75C880EA4C71586D7506470B36CA2D2
                                                                  SHA1:1AB01F657A828410F2010311EC7FC608813A8972
                                                                  SHA-256:0DC4BFC247D1452B88962D997198CFA7D72DF38123894F7C7789BD9F4CF4F5A4
                                                                  SHA-512:63C98DDBFE921654D65E2CF0452A0F23D9A59BA8B7AE1F24A197C1870EF463DD6C3E383C5D6412A70ADA23B7687EBDE25A064D1D9B23926FCDD25E5C8E3AA692
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:15:15.510 2344 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb/MANIFEST-000001.2024/08/29-18:15:15.519 2344 Recovering log #3.2024/08/29-18:15:15.525 2344 Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb/000003.log .
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):438
                                                                  Entropy (8bit):5.247969285282022
                                                                  Encrypted:false
                                                                  SSDEEP:12:NprIvVaYebvqBQFUt88pPm/+8pb5OaYebvqBvJ:NpuVaYebvZg88pPkpNOaYebvk
                                                                  MD5:C75C880EA4C71586D7506470B36CA2D2
                                                                  SHA1:1AB01F657A828410F2010311EC7FC608813A8972
                                                                  SHA-256:0DC4BFC247D1452B88962D997198CFA7D72DF38123894F7C7789BD9F4CF4F5A4
                                                                  SHA-512:63C98DDBFE921654D65E2CF0452A0F23D9A59BA8B7AE1F24A197C1870EF463DD6C3E383C5D6412A70ADA23B7687EBDE25A064D1D9B23926FCDD25E5C8E3AA692
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:15:15.510 2344 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb/MANIFEST-000001.2024/08/29-18:15:15.519 2344 Recovering log #3.2024/08/29-18:15:15.525 2344 Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb/000003.log .
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):426
                                                                  Entropy (8bit):5.274043647297843
                                                                  Encrypted:false
                                                                  SSDEEP:12:NpJvVaYebvqBZFUt88p6/+8p55OaYebvqBaJ:Np1VaYebvyg88p4prOaYebvL
                                                                  MD5:804A1CEB3095F796842922C689D6B2AB
                                                                  SHA1:3DB03ECECBA0EB81F3D817B2BFA1CE3C5869A482
                                                                  SHA-256:5A8790CFC58BCF3ABD6ADC90B5FCF5C8E901F833EA17F9DDB56FCC0FAF870A47
                                                                  SHA-512:21270955CCB787B5D2B91247162B361FD2C3590BB03DBD1A25485AD247A379DF89B568082442254A17FA8C44415F72ED4FE296CB0146CC69AD33018F8E8B80EA
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:15:15.483 2364 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage/MANIFEST-000001.2024/08/29-18:15:15.496 2364 Recovering log #3.2024/08/29-18:15:15.510 2364 Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage/000003.log .
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):426
                                                                  Entropy (8bit):5.274043647297843
                                                                  Encrypted:false
                                                                  SSDEEP:12:NpJvVaYebvqBZFUt88p6/+8p55OaYebvqBaJ:Np1VaYebvyg88p4prOaYebvL
                                                                  MD5:804A1CEB3095F796842922C689D6B2AB
                                                                  SHA1:3DB03ECECBA0EB81F3D817B2BFA1CE3C5869A482
                                                                  SHA-256:5A8790CFC58BCF3ABD6ADC90B5FCF5C8E901F833EA17F9DDB56FCC0FAF870A47
                                                                  SHA-512:21270955CCB787B5D2B91247162B361FD2C3590BB03DBD1A25485AD247A379DF89B568082442254A17FA8C44415F72ED4FE296CB0146CC69AD33018F8E8B80EA
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:15:15.483 2364 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage/MANIFEST-000001.2024/08/29-18:15:15.496 2364 Recovering log #3.2024/08/29-18:15:15.510 2364 Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage/000003.log .
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):332
                                                                  Entropy (8bit):5.241359169563514
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52U5W+q2PN723oH+TcwtpIFUt8852U56Zmw+852U5WVkwON723oH+Tcwta/WLJ:NphvVaYebmFUt88pc/+8pc5OaYebaUJ
                                                                  MD5:6AD7B071E465CC94742D3E5908990E76
                                                                  SHA1:52D04AD687B051242A4CFD2F5184DD10CD553B44
                                                                  SHA-256:4E6457323D4E93EB1A377C844CBD9B6067F47DA93F74745019878C7A3F9C41F4
                                                                  SHA-512:184188DA479FCCE7A43E6F1894B5E9CBFA3B5DAB58875128FBBCFFDA76A5AD20E1D223A9CF1F400ED4B6CF582D58DD297A1B6CA519CC443C8B70C0A31BE7262C
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:15:14.596 2238 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB/MANIFEST-000001.2024/08/29-18:15:14.596 2238 Recovering log #3.2024/08/29-18:15:14.596 2238 Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB/000003.log .
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):332
                                                                  Entropy (8bit):5.241359169563514
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52U5W+q2PN723oH+TcwtpIFUt8852U56Zmw+852U5WVkwON723oH+Tcwta/WLJ:NphvVaYebmFUt88pc/+8pc5OaYebaUJ
                                                                  MD5:6AD7B071E465CC94742D3E5908990E76
                                                                  SHA1:52D04AD687B051242A4CFD2F5184DD10CD553B44
                                                                  SHA-256:4E6457323D4E93EB1A377C844CBD9B6067F47DA93F74745019878C7A3F9C41F4
                                                                  SHA-512:184188DA479FCCE7A43E6F1894B5E9CBFA3B5DAB58875128FBBCFFDA76A5AD20E1D223A9CF1F400ED4B6CF582D58DD297A1B6CA519CC443C8B70C0A31BE7262C
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:15:14.596 2238 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB/MANIFEST-000001.2024/08/29-18:15:14.596 2238 Recovering log #3.2024/08/29-18:15:14.596 2238 Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB/000003.log .
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):332
                                                                  Entropy (8bit):5.241359169563514
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52U5W+q2PN723oH+TcwtpIFUt8852U56Zmw+852U5WVkwON723oH+Tcwta/WLJ:NphvVaYebmFUt88pc/+8pc5OaYebaUJ
                                                                  MD5:6AD7B071E465CC94742D3E5908990E76
                                                                  SHA1:52D04AD687B051242A4CFD2F5184DD10CD553B44
                                                                  SHA-256:4E6457323D4E93EB1A377C844CBD9B6067F47DA93F74745019878C7A3F9C41F4
                                                                  SHA-512:184188DA479FCCE7A43E6F1894B5E9CBFA3B5DAB58875128FBBCFFDA76A5AD20E1D223A9CF1F400ED4B6CF582D58DD297A1B6CA519CC443C8B70C0A31BE7262C
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:15:14.596 2238 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB/MANIFEST-000001.2024/08/29-18:15:14.596 2238 Recovering log #3.2024/08/29-18:15:14.596 2238 Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB/000003.log .
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 10
                                                                  Category:dropped
                                                                  Size (bytes):196608
                                                                  Entropy (8bit):1.124009514405325
                                                                  Encrypted:false
                                                                  SSDEEP:384:A2qOB1nxCkvSA1LyKOMq+8iP5GDHP/0j:dq+n0E91LyKOMq+8iP5GLP/0
                                                                  MD5:CADC9BCDE2726405EF6E3D4C74A68954
                                                                  SHA1:E83FB652CA4DF328D0E7502E6E59B279BE76F939
                                                                  SHA-256:248BABEDCE7B352EC01DA58B745079FF9B57443758BC6AE5B901855F51DDCFEF
                                                                  SHA-512:A1D1F5CC7FEEAE2515C4CD9AED39E8AF9C6FD700A704F55EDAC16CD499C7E703E417A149C0C69F74A7D932A2DD71156A70F563221BEE6BC98D00D9C5445E3337
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ .......Y...........7......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:very short file (no magic)
                                                                  Category:dropped
                                                                  Size (bytes):1
                                                                  Entropy (8bit):0.0
                                                                  Encrypted:false
                                                                  SSDEEP:3:L:L
                                                                  MD5:5058F1AF8388633F609CADB75A75DC9D
                                                                  SHA1:3A52CE780950D4D969792A2559CD519D7EE8C727
                                                                  SHA-256:CDB4EE2AEA69CC6A83331BBE96DC2CAA9A299D21329EFB0336FC02A82E1839A8
                                                                  SHA-512:0B61241D7C17BCBB1BAEE7094D14B7C451EFECC7FFCBD92598A0F13D313CC9EBC2A07E61F007BAF58FBF94FF9A8695BDD5CAE7CE03BBF1E94E93613A00F25F21
                                                                  Malicious:false
                                                                  Preview:.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:very short file (no magic)
                                                                  Category:dropped
                                                                  Size (bytes):1
                                                                  Entropy (8bit):0.0
                                                                  Encrypted:false
                                                                  SSDEEP:3:L:L
                                                                  MD5:5058F1AF8388633F609CADB75A75DC9D
                                                                  SHA1:3A52CE780950D4D969792A2559CD519D7EE8C727
                                                                  SHA-256:CDB4EE2AEA69CC6A83331BBE96DC2CAA9A299D21329EFB0336FC02A82E1839A8
                                                                  SHA-512:0B61241D7C17BCBB1BAEE7094D14B7C451EFECC7FFCBD92598A0F13D313CC9EBC2A07E61F007BAF58FBF94FF9A8695BDD5CAE7CE03BBF1E94E93613A00F25F21
                                                                  Malicious:false
                                                                  Preview:.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):7818
                                                                  Entropy (8bit):5.085052307783759
                                                                  Encrypted:false
                                                                  SSDEEP:96:steqKzs1ebDd7wfiwXnMwjTrEm8zRsY5eh6Cb7/x+6MhmuecmAeZdDUEWCML/EJ:stezs96wFvrEmkRsY8bV+FiA0UEWbLMJ
                                                                  MD5:47A3F6A7CED51D8644B78488E373B96E
                                                                  SHA1:DCB7A71CD97779AB7284892A21A5D290D17030DC
                                                                  SHA-256:D25ECDD7DAC599F1F1D060E649F42E2E462FC190A5DB3F65D99189BFB3742D73
                                                                  SHA-512:4F623357BA9163C8488D41E24B81FD9FD39D40F58F8C39F29F35973CF5A6106E4FB2890F4E9543470CBADEF02CE12A57BEB9E4633A00788523D644CB5399C721
                                                                  Malicious:false
                                                                  Preview:{"aadc_info":{"age_group":0},"account_tracker_service_last_update":"13340960281231018","alternate_error_pages":{"backup":true},"apps":{"shortcuts_arch":"","shortcuts_version":0},"arbitration_experiences":{},"arbitration_local_nsat_reset_time":"13340961151815957","arbitration_using_experiment_config":false,"browser":{"available_dark_theme_options":"All","has_seen_welcome_page":false},"continuous_migration":{"ci_correction_for_holdout_treatment_state":1},"countryid_at_install":17224,"custom_links":{"list":[]},"default_apps_install_state":3,"domain_diversity":{"last_reporting_timestamp":"13369443314645161"},"dual_user":{"consumer_mode":{"ie_user":false},"consumer_site_list_with_ie_entries":false,"consumer_sitelist_location":"","consumer_sitelist_version":"","external_consumer_shared_cookie_data":{},"shared_cookie_data":{},"sitelist_data_2":{},"sitelist_has_consumer_data":false,"sitelist_has_enterprise_data":false,"sitelist_location":"","sitelist_source":0,"sitelist_version":""},"edge":{
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):24691
                                                                  Entropy (8bit):5.5676908285271
                                                                  Encrypted:false
                                                                  SSDEEP:768:cgoGnaW9UW5wTuf4w/8F1+UoAYDCx9Tuqh0VfUC9xbog/OVPpJIP8ZNrwXIApftO:cDMaWUWaTufN/u1jassC2ftO
                                                                  MD5:0E329842628E7C9D2424D7E5D5204E63
                                                                  SHA1:9370369CB437E22AF6D76B29EF99AEDE1528C248
                                                                  SHA-256:20B80C0199C1FCA3DF0E76A6C11B47DD09E35D8B79F8A53DA3FC92E6D2DA686E
                                                                  SHA-512:104F95F80EA99F2CC4ABB7A7D798C72CF5F837AB6265F9486EC406C4ED0ABD680DFCA8CFE9E37EBB2E9508A6C1678020CEEF87F44E19624FD1C18E83984DD954
                                                                  Malicious:false
                                                                  Preview:{"edge_fundamentals_appdefaults":{"ess_lightweight_version":101},"ess_kv_states":{"restore_on_startup":{"closed_notification":false,"decrypt_success":true,"key":"restore_on_startup","notification_popup_count":0},"startup_urls":{"closed_notification":false,"decrypt_success":true,"key":"startup_urls","notification_popup_count":0},"template_url_data":{"closed_notification":false,"decrypt_success":true,"key":"template_url_data","notification_popup_count":0}},"extensions":{"settings":{"ahfgeienlihckogmohjhadlkjgocpleb":{"active_permissions":{"api":["management","system.display","system.storage","webstorePrivate","system.cpu","system.memory","system.network"],"explicit_host":[],"manifest_permissions":[],"scriptable_host":[]},"app_launcher_ordinal":"t","commands":{},"content_settings":[],"creation_flags":1,"events":[],"first_install_time":"13369443314463782","from_webstore":false,"incognito_content_settings":[],"incognito_preferences":{},"last_update_time":"13369443314463782","location":5,"ma
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:SQLite 3.x database, last written using SQLite version 3042000, writer version 2, read version 2, file counter 8, database pages 11, cookie 0x7, schema 4, UTF-8, version-valid-for 8
                                                                  Category:dropped
                                                                  Size (bytes):45056
                                                                  Entropy (8bit):0.4108834313259155
                                                                  Encrypted:false
                                                                  SSDEEP:24:TSWUYP5/ZrK/AxH1Aj5sAFWZmasamfDsCBjy8e+ZcI5fc:TnUYVAKAFXX+CcEc
                                                                  MD5:8593795778EA3EC8221366AA2FBBA867
                                                                  SHA1:2F307D4925183EA13E7BE637CB93ECAF2BA9810A
                                                                  SHA-256:F3C17873660988454A5A403D047FCE88379D1FE8917A89C98E6EB940F8929C03
                                                                  SHA-512:CC86DD61ACEDA6F2927C4C23CBD6D426F2C8CD1DF65E342C76D07153ACBF801F9B297F8EF182097CBABBDE6A49C90AF0E7A38E49AB53DF3FD2EC2D5BC675099A
                                                                  Malicious:false
                                                                  Preview:SQLite format 3......@ ..........................................................................j..................?.P................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):32768
                                                                  Entropy (8bit):0.04980715022639089
                                                                  Encrypted:false
                                                                  SSDEEP:6:Gd0ddi8gd0ddi8myL9XCChslotGLNl0ml/XoQDeX:zddHgiddH7pEjVl/XoQ
                                                                  MD5:0DCF538A04A10139C2BEF0CD1B1FA9FB
                                                                  SHA1:C6AED1B5CA0A1ECE6E81CC70CD14AA046162B5D0
                                                                  SHA-256:752A0BD20BD96F5916028A5F87541F11C760FDC19DE38C8BCB16B4C14DF60647
                                                                  SHA-512:49DBC69DFFD0CCAEE055EB9D417412E90EEA4362B57585064E8F89B0911264BA86A06EC01B31B0450027E87AAB4BB2CB0754666F4C81604C152A06C5BE1FE287
                                                                  Malicious:false
                                                                  Preview:..-.......................FVN...$J...V..n.c..mv=..-.......................FVN...$J...V..n.c..mv=........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):328
                                                                  Entropy (8bit):5.238630442666173
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52UrAVq2PN723oH+TcwtfrK+IFUt8852UKAgZmw+852UQgAIkwON723oH+Tcwt5:Npr4vVaYeb23FUt88pKJ/+8pQgD5OaYq
                                                                  MD5:ECF6A2BDA19CBCFAE9D2C1D6BC23396E
                                                                  SHA1:20B2ECBAD2CDEE90D053DD93A9C78194D2B98096
                                                                  SHA-256:8191FAB55EA8B3549E2884FFD9E24453D2AC05F845F37ED61E5A705CBA3A7B6F
                                                                  SHA-512:F129CFA904745E1F86885D75A44E039DB59482C9832278FB38B1EABD0B3D92560D5564DC3679B432EA313841D55037B06D2F547742876F89CDB27E4E80E4A958
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:15:14.717 2230 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db/MANIFEST-000001.2024/08/29-18:15:14.718 2230 Recovering log #3.2024/08/29-18:15:14.719 2230 Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db/000003.log .
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):328
                                                                  Entropy (8bit):5.238630442666173
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52UrAVq2PN723oH+TcwtfrK+IFUt8852UKAgZmw+852UQgAIkwON723oH+Tcwt5:Npr4vVaYeb23FUt88pKJ/+8pQgD5OaYq
                                                                  MD5:ECF6A2BDA19CBCFAE9D2C1D6BC23396E
                                                                  SHA1:20B2ECBAD2CDEE90D053DD93A9C78194D2B98096
                                                                  SHA-256:8191FAB55EA8B3549E2884FFD9E24453D2AC05F845F37ED61E5A705CBA3A7B6F
                                                                  SHA-512:F129CFA904745E1F86885D75A44E039DB59482C9832278FB38B1EABD0B3D92560D5564DC3679B432EA313841D55037B06D2F547742876F89CDB27E4E80E4A958
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:15:14.717 2230 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db/MANIFEST-000001.2024/08/29-18:15:14.718 2230 Recovering log #3.2024/08/29-18:15:14.719 2230 Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db/000003.log .
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):816
                                                                  Entropy (8bit):4.0647916882227655
                                                                  Encrypted:false
                                                                  SSDEEP:12:G0nYUtTNop//z32m5t/yVf9HqlIZfkBA//DtKhKg+rOyBrgxvB1ySxs:G0nYUtypD32m3yWlIZMBA5NgKIvB8Sxs
                                                                  MD5:3BE72D8D40752B3A97028FDB2931FABA
                                                                  SHA1:A27EA4726857A948F0A4B074062B674469A9A371
                                                                  SHA-256:3C18553C8C3F7E801855F3579AC57F3C156D783BBA27FB35C6D2FB6CB89BD902
                                                                  SHA-512:8EBD4D6980BB7796615217E72BC65953C920B68B9259341CD52858C1E889EC90339E2A304FE0C971D6C6EF9AFC4A00CFB3E5CC89C7B2DF8737A0C7EC241BDADC
                                                                  Malicious:false
                                                                  Preview:.h.6.................__global... .t...................__global... .9..b.................33_..........................33_........v.................21_.....vuNX.................21_.....<...................20_.....X...................20_.....W.J+.................19_......qY.................18_.....'}2..................37_.......c..................38_......i...................39_.....Owa..................20_.....4.9..................20_.....B.I..................19_..........................18_.....2.1..................37_..........................38_......=.%.................39_.....p.j..................9_.....JJ...................9_.....|.&R.................__global... ./....................__global... ..T...................__global... ...G..................__global... ......................__global... .
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):346
                                                                  Entropy (8bit):5.221013590377909
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52UqgAVq2PN723oH+TcwtfrzAdIFUt8852UFXQAgZmw+852UFXQAIkwON723oHf:Npqg4vVaYeb9FUt88pOJ/+8pOD5OaYe+
                                                                  MD5:255688C412A00183EFC7A364EF586267
                                                                  SHA1:F0B2B57052B7F4AD21BDDB922F40740F60DD4AAF
                                                                  SHA-256:1CCBFF1FF0BA40AFB29BD48D1ABCE3693468C2B6E7DE4C24AA8F4D928579FD8C
                                                                  SHA-512:979E297754907AFCC739C4B05B43122B55F2CBFA0FAD1163BA2A4842E419B260339837584DE1D4E6EB77D3A1CB554A44E37AE5B61B40BF073C8D08AB7561B07E
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:15:14.713 2230 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata/MANIFEST-000001.2024/08/29-18:15:14.714 2230 Recovering log #3.2024/08/29-18:15:14.714 2230 Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata/000003.log .
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text
                                                                  Category:dropped
                                                                  Size (bytes):346
                                                                  Entropy (8bit):5.221013590377909
                                                                  Encrypted:false
                                                                  SSDEEP:6:N52UqgAVq2PN723oH+TcwtfrzAdIFUt8852UFXQAgZmw+852UFXQAIkwON723oHf:Npqg4vVaYeb9FUt88pOJ/+8pOD5OaYe+
                                                                  MD5:255688C412A00183EFC7A364EF586267
                                                                  SHA1:F0B2B57052B7F4AD21BDDB922F40740F60DD4AAF
                                                                  SHA-256:1CCBFF1FF0BA40AFB29BD48D1ABCE3693468C2B6E7DE4C24AA8F4D928579FD8C
                                                                  SHA-512:979E297754907AFCC739C4B05B43122B55F2CBFA0FAD1163BA2A4842E419B260339837584DE1D4E6EB77D3A1CB554A44E37AE5B61B40BF073C8D08AB7561B07E
                                                                  Malicious:false
                                                                  Preview:2024/08/29-18:15:14.713 2230 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata/MANIFEST-000001.2024/08/29-18:15:14.714 2230 Recovering log #3.2024/08/29-18:15:14.714 2230 Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata/000003.log .
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):13
                                                                  Entropy (8bit):2.6612262562697895
                                                                  Encrypted:false
                                                                  SSDEEP:3:NYLFRQZ:ap2Z
                                                                  MD5:B64BD80D877645C2DD14265B1A856F8A
                                                                  SHA1:F7379E1A6F8CE062E891C56736C789C7EA77CD6A
                                                                  SHA-256:83476CEEEB7682F41030664B4E17305986878D14E82D0C277FB99EC546B44569
                                                                  SHA-512:734A7316A269C76DD052D980CC0D5209C0BFEDFFC55B11C58FA25C433CE8A42536827298C3E58CACD68CC01593C23D39350E956E8DE2268D8D29918E1F0667F2
                                                                  Malicious:false
                                                                  Preview:117.0.2045.55
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):44455
                                                                  Entropy (8bit):6.089777720849606
                                                                  Encrypted:false
                                                                  SSDEEP:768:+DXzgWPsj/qlGJqIY8GB4kWldi1zNtPMqkzZ7okEt9r1JDSgzMMd6qD47u3+CioC:+/Ps+wsI7ynfNkzItSmd6qE7lFoC
                                                                  MD5:BE37C957AEA59ADB2338BB5A36A71FC5
                                                                  SHA1:5D52EDA93EB4C8757E153B5BB1C8E36FFDF44C8D
                                                                  SHA-256:1A2BFF1F3B397EAE737057FF48BC03AC57FAF91B202D2C36A4BDE39FF84E7BEE
                                                                  SHA-512:8869D9C9E86719793A02C7431B93ECB74786B851BDBA4B4660004EBAD781F00DB3C689DE0490EF5E8018246BDC8653C2CDB596A847864863B40E07F44BE38466
                                                                  Malicious:false
                                                                  Preview:{"abusive_adblocker_etag":"\"229EC35087C81534A88F41A12F3A505F330A0BE57C43F6CEB29F4718042EFC4F\"","apps_count_check_time":"13340961226065099","desktop_mode":{"clear_prefs_once_applied":true,"is_on":false,"is_on_by_default_applied":true,"is_search_only_on_by_default_applied":true},"domain_actions_config":"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
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):44455
                                                                  Entropy (8bit):6.089777720849606
                                                                  Encrypted:false
                                                                  SSDEEP:768:+DXzgWPsj/qlGJqIY8GB4kWldi1zNtPMqkzZ7okEt9r1JDSgzMMd6qD47u3+CioC:+/Ps+wsI7ynfNkzItSmd6qE7lFoC
                                                                  MD5:BE37C957AEA59ADB2338BB5A36A71FC5
                                                                  SHA1:5D52EDA93EB4C8757E153B5BB1C8E36FFDF44C8D
                                                                  SHA-256:1A2BFF1F3B397EAE737057FF48BC03AC57FAF91B202D2C36A4BDE39FF84E7BEE
                                                                  SHA-512:8869D9C9E86719793A02C7431B93ECB74786B851BDBA4B4660004EBAD781F00DB3C689DE0490EF5E8018246BDC8653C2CDB596A847864863B40E07F44BE38466
                                                                  Malicious:false
                                                                  Preview:{"abusive_adblocker_etag":"\"229EC35087C81534A88F41A12F3A505F330A0BE57C43F6CEB29F4718042EFC4F\"","apps_count_check_time":"13340961226065099","desktop_mode":{"clear_prefs_once_applied":true,"is_on":false,"is_on_by_default_applied":true,"is_search_only_on_by_default_applied":true},"domain_actions_config":"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
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):44455
                                                                  Entropy (8bit):6.089777720849606
                                                                  Encrypted:false
                                                                  SSDEEP:768:+DXzgWPsj/qlGJqIY8GB4kWldi1zNtPMqkzZ7okEt9r1JDSgzMMd6qD47u3+CioC:+/Ps+wsI7ynfNkzItSmd6qE7lFoC
                                                                  MD5:BE37C957AEA59ADB2338BB5A36A71FC5
                                                                  SHA1:5D52EDA93EB4C8757E153B5BB1C8E36FFDF44C8D
                                                                  SHA-256:1A2BFF1F3B397EAE737057FF48BC03AC57FAF91B202D2C36A4BDE39FF84E7BEE
                                                                  SHA-512:8869D9C9E86719793A02C7431B93ECB74786B851BDBA4B4660004EBAD781F00DB3C689DE0490EF5E8018246BDC8653C2CDB596A847864863B40E07F44BE38466
                                                                  Malicious:false
                                                                  Preview:{"abusive_adblocker_etag":"\"229EC35087C81534A88F41A12F3A505F330A0BE57C43F6CEB29F4718042EFC4F\"","apps_count_check_time":"13340961226065099","desktop_mode":{"clear_prefs_once_applied":true,"is_on":false,"is_on_by_default_applied":true,"is_search_only_on_by_default_applied":true},"domain_actions_config":"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
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):44455
                                                                  Entropy (8bit):6.089777720849606
                                                                  Encrypted:false
                                                                  SSDEEP:768:+DXzgWPsj/qlGJqIY8GB4kWldi1zNtPMqkzZ7okEt9r1JDSgzMMd6qD47u3+CioC:+/Ps+wsI7ynfNkzItSmd6qE7lFoC
                                                                  MD5:BE37C957AEA59ADB2338BB5A36A71FC5
                                                                  SHA1:5D52EDA93EB4C8757E153B5BB1C8E36FFDF44C8D
                                                                  SHA-256:1A2BFF1F3B397EAE737057FF48BC03AC57FAF91B202D2C36A4BDE39FF84E7BEE
                                                                  SHA-512:8869D9C9E86719793A02C7431B93ECB74786B851BDBA4B4660004EBAD781F00DB3C689DE0490EF5E8018246BDC8653C2CDB596A847864863B40E07F44BE38466
                                                                  Malicious:false
                                                                  Preview:{"abusive_adblocker_etag":"\"229EC35087C81534A88F41A12F3A505F330A0BE57C43F6CEB29F4718042EFC4F\"","apps_count_check_time":"13340961226065099","desktop_mode":{"clear_prefs_once_applied":true,"is_on":false,"is_on_by_default_applied":true,"is_search_only_on_by_default_applied":true},"domain_actions_config":"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
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):44455
                                                                  Entropy (8bit):6.089777720849606
                                                                  Encrypted:false
                                                                  SSDEEP:768:+DXzgWPsj/qlGJqIY8GB4kWldi1zNtPMqkzZ7okEt9r1JDSgzMMd6qD47u3+CioC:+/Ps+wsI7ynfNkzItSmd6qE7lFoC
                                                                  MD5:BE37C957AEA59ADB2338BB5A36A71FC5
                                                                  SHA1:5D52EDA93EB4C8757E153B5BB1C8E36FFDF44C8D
                                                                  SHA-256:1A2BFF1F3B397EAE737057FF48BC03AC57FAF91B202D2C36A4BDE39FF84E7BEE
                                                                  SHA-512:8869D9C9E86719793A02C7431B93ECB74786B851BDBA4B4660004EBAD781F00DB3C689DE0490EF5E8018246BDC8653C2CDB596A847864863B40E07F44BE38466
                                                                  Malicious:false
                                                                  Preview:{"abusive_adblocker_etag":"\"229EC35087C81534A88F41A12F3A505F330A0BE57C43F6CEB29F4718042EFC4F\"","apps_count_check_time":"13340961226065099","desktop_mode":{"clear_prefs_once_applied":true,"is_on":false,"is_on_by_default_applied":true,"is_search_only_on_by_default_applied":true},"domain_actions_config":"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
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):44455
                                                                  Entropy (8bit):6.089777720849606
                                                                  Encrypted:false
                                                                  SSDEEP:768:+DXzgWPsj/qlGJqIY8GB4kWldi1zNtPMqkzZ7okEt9r1JDSgzMMd6qD47u3+CioC:+/Ps+wsI7ynfNkzItSmd6qE7lFoC
                                                                  MD5:BE37C957AEA59ADB2338BB5A36A71FC5
                                                                  SHA1:5D52EDA93EB4C8757E153B5BB1C8E36FFDF44C8D
                                                                  SHA-256:1A2BFF1F3B397EAE737057FF48BC03AC57FAF91B202D2C36A4BDE39FF84E7BEE
                                                                  SHA-512:8869D9C9E86719793A02C7431B93ECB74786B851BDBA4B4660004EBAD781F00DB3C689DE0490EF5E8018246BDC8653C2CDB596A847864863B40E07F44BE38466
                                                                  Malicious:false
                                                                  Preview:{"abusive_adblocker_etag":"\"229EC35087C81534A88F41A12F3A505F330A0BE57C43F6CEB29F4718042EFC4F\"","apps_count_check_time":"13340961226065099","desktop_mode":{"clear_prefs_once_applied":true,"is_on":false,"is_on_by_default_applied":true,"is_search_only_on_by_default_applied":true},"domain_actions_config":"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
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):44455
                                                                  Entropy (8bit):6.089777720849606
                                                                  Encrypted:false
                                                                  SSDEEP:768:+DXzgWPsj/qlGJqIY8GB4kWldi1zNtPMqkzZ7okEt9r1JDSgzMMd6qD47u3+CioC:+/Ps+wsI7ynfNkzItSmd6qE7lFoC
                                                                  MD5:BE37C957AEA59ADB2338BB5A36A71FC5
                                                                  SHA1:5D52EDA93EB4C8757E153B5BB1C8E36FFDF44C8D
                                                                  SHA-256:1A2BFF1F3B397EAE737057FF48BC03AC57FAF91B202D2C36A4BDE39FF84E7BEE
                                                                  SHA-512:8869D9C9E86719793A02C7431B93ECB74786B851BDBA4B4660004EBAD781F00DB3C689DE0490EF5E8018246BDC8653C2CDB596A847864863B40E07F44BE38466
                                                                  Malicious:false
                                                                  Preview:{"abusive_adblocker_etag":"\"229EC35087C81534A88F41A12F3A505F330A0BE57C43F6CEB29F4718042EFC4F\"","apps_count_check_time":"13340961226065099","desktop_mode":{"clear_prefs_once_applied":true,"is_on":false,"is_on_by_default_applied":true,"is_search_only_on_by_default_applied":true},"domain_actions_config":"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
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:modified
                                                                  Size (bytes):270336
                                                                  Entropy (8bit):0.0018238520723782249
                                                                  Encrypted:false
                                                                  SSDEEP:3:MsEllllkEthXllkl2zEjrrXF:/M/xT02zaXF
                                                                  MD5:5193C55BE2D3F5497D7596B39377876D
                                                                  SHA1:0A25106CA005623F6E005DEF4567BDC870844F01
                                                                  SHA-256:415D4415888438A6C56F72A4C195BE3D1C61695CAC5B9416495A653A21FDC1A4
                                                                  SHA-512:3962E77786E0712C5DB741442FB24402479FE4AE5E6F63F1A9B0D9A764394E9570CF3338F95DF680E0ED1D289AAE7D7BD6FB67430E2116070E4211B532037E84
                                                                  Malicious:false
                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):85
                                                                  Entropy (8bit):4.3488360343066725
                                                                  Encrypted:false
                                                                  SSDEEP:3:YQ3JYq9xSs0dMEJAELJ25AmIpozQp:YQ3Kq9X0dMgAEiLIj
                                                                  MD5:8549C255650427D618EF18B14DFD2B56
                                                                  SHA1:8272585186777B344DB3960DF62B00F570D247F6
                                                                  SHA-256:40395D9CA4B65D48DEAC792844A77D4F8051F1CEF30DF561DACFEEED3C3BAE13
                                                                  SHA-512:E5BB8A0AD338372635C3629E306604E3DC5A5C26FB5547A3DD7E404E5261630612C07326E7EBF5B47ABAFADE8E555965A1A59A1EECFC496DCDD5003048898A8C
                                                                  Malicious:false
                                                                  Preview:{"user_experience_metrics.stability.exited_cleanly":true,"variations_crash_streak":1}
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):44967
                                                                  Entropy (8bit):6.094760155936541
                                                                  Encrypted:false
                                                                  SSDEEP:768:XDXzgWPsj/qlGJqIY8GB4xWyXi1zNtTl6NdciQ3zr4EUKJDSgzMMd6qD47u3+CiB:X/Ps+wsI7yOocfKtSmd6qE7lFoC
                                                                  MD5:DC1504029E536B2B2089C04C960D749D
                                                                  SHA1:C2F595BB7BA538F4B5D24FA329BD3A9139C06D6A
                                                                  SHA-256:69580E051ACB1EA1F0A6B4590EB4846B70F63263ABEF7FBA1124AB4103C2AF57
                                                                  SHA-512:F4DC9065BD8FE70BCE8C8B1BE79C6D3BFC8B9BA39033542C08FA63EEE287B0AC66B330097349D207CD09D62A4867E79F41A399A3DD4F5325AA677B9F27BE7F4B
                                                                  Malicious:false
                                                                  Preview:{"abusive_adblocker_etag":"\"229EC35087C81534A88F41A12F3A505F330A0BE57C43F6CEB29F4718042EFC4F\"","apps_count_check_time":"13369443314741099","desktop_mode":{"clear_prefs_once_applied":true,"is_on":false,"is_on_by_default_applied":true,"is_search_only_on_by_default_applied":true},"domain_actions_config":"H4sIAAAAAAAAAL19a4/cNpboXzH60+4gRbvbrzj7aTbj2Ql2MhlkswhwF4MGRVISWxQp81FVqkH++z2HUrXbLkndh51dBHba1XX4PDzvxz+v+P76VjipxG2teExe3YpWie7W7ZX3Wqqr7/55xYfBaMGjdjZcffc/8wdK3g4OPh+vvrv6aYg/pXj1zZV0PdcWPrEq1kYfmXD91W/fUEBCTFK7MEH+45urDKHVNLPlvXoIHMcB//3H/fX3uIk/T3v4HrcwfweHgL0EWPzVd9e/fXMlZE/dnTXjx+Pggvq74ePPisvx4bqD0bbZ2Og99K8w415b9RA4usTivgSy50f4WTHYRQE0r0TxkvcMIVQpvOHvmY4lkMdaWx3H0okPPIoWVi/cFl5uDqEbWICCMbxrAKlKh6lMUiL5PY4UWn5ggpcM0yp8Ynv4jYve2dLVCA978oD/ouXWKlM6jo08toiSpffjDoNXQdkYBpOKD3ffHgufVJtMKp0Vvs4+JS06uJShdJA/6dD+0Y6HVnm1TQAXSdJMDfEjnz/CJVxAPJh4Brj/5JJYZtZAI5d/gW/+WP9F7UWmyTTSsQFstY3KSrd5MJfw8x4ffriwzR5P5lZboOXq2cwPcaHxvO+5N1vU6gKw18K74OqIVMGrwcGWi+B3/fhgiJ2sSYzY4W5ZcE8FcFZJr/eKGfyLMJO
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):44967
                                                                  Entropy (8bit):6.094730680450409
                                                                  Encrypted:false
                                                                  SSDEEP:768:XDXzgWPsj/qlGJqIY8GB4xWyXi1zNtTl69qc0hHGXRPgKJDSgzMMd6qD47u3+CiB:X/Ps+wsI7yOocUKtSmd6qE7lFoC
                                                                  MD5:3FCED85B99C4DF5317D0DFEA49779619
                                                                  SHA1:936AC5106334063F3AECDD9380F2BAE0B3A75039
                                                                  SHA-256:686D26E1EB2E2763E47FDB15B7A583E92911BF7448D13EDD4833A679F7D716F8
                                                                  SHA-512:A7CA97FE32D4A71F26CC878EAABC4AEE0B88E982F1977073831A8B7A025EFB3A21ED8E15870927B5FB823ABC025B0C8D839C0E3884D99A41ADCA825637E421F1
                                                                  Malicious:false
                                                                  Preview:{"abusive_adblocker_etag":"\"229EC35087C81534A88F41A12F3A505F330A0BE57C43F6CEB29F4718042EFC4F\"","apps_count_check_time":"13369443314741099","desktop_mode":{"clear_prefs_once_applied":true,"is_on":false,"is_on_by_default_applied":true,"is_search_only_on_by_default_applied":true},"domain_actions_config":"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
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):44967
                                                                  Entropy (8bit):6.094743849511438
                                                                  Encrypted:false
                                                                  SSDEEP:768:XDXzgWPsj/qlGJqIY8GB4xWyXi1zNtTl69Zhc0hHGXRPgKJDSgzMMd6qD47u3+CO:X/Ps+wsI7yOoc3KtSmd6qE7lFoC
                                                                  MD5:74362958A0D5B4B590F223A278B0E1CD
                                                                  SHA1:1E449A6CDC3C6E32664067F57787EBF56740E05B
                                                                  SHA-256:162DDC398A7A45453342EA53B6781188D4195FF42813A4A56454619126DCE5FA
                                                                  SHA-512:E1567E2E0A8A5D7FEF7308632582F9E08820A2E236925B755D61C8F73C04B40A366C1AEBB9A3F0F5DFE54E7FAD3F7CD2455D98F4593A42F411831F6B1295581F
                                                                  Malicious:false
                                                                  Preview:{"abusive_adblocker_etag":"\"229EC35087C81534A88F41A12F3A505F330A0BE57C43F6CEB29F4718042EFC4F\"","apps_count_check_time":"13369443314741099","desktop_mode":{"clear_prefs_once_applied":true,"is_on":false,"is_on_by_default_applied":true,"is_search_only_on_by_default_applied":true},"domain_actions_config":"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
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):44455
                                                                  Entropy (8bit):6.089777720849606
                                                                  Encrypted:false
                                                                  SSDEEP:768:+DXzgWPsj/qlGJqIY8GB4kWldi1zNtPMqkzZ7okEt9r1JDSgzMMd6qD47u3+CioC:+/Ps+wsI7ynfNkzItSmd6qE7lFoC
                                                                  MD5:BE37C957AEA59ADB2338BB5A36A71FC5
                                                                  SHA1:5D52EDA93EB4C8757E153B5BB1C8E36FFDF44C8D
                                                                  SHA-256:1A2BFF1F3B397EAE737057FF48BC03AC57FAF91B202D2C36A4BDE39FF84E7BEE
                                                                  SHA-512:8869D9C9E86719793A02C7431B93ECB74786B851BDBA4B4660004EBAD781F00DB3C689DE0490EF5E8018246BDC8653C2CDB596A847864863B40E07F44BE38466
                                                                  Malicious:false
                                                                  Preview:{"abusive_adblocker_etag":"\"229EC35087C81534A88F41A12F3A505F330A0BE57C43F6CEB29F4718042EFC4F\"","apps_count_check_time":"13340961226065099","desktop_mode":{"clear_prefs_once_applied":true,"is_on":false,"is_on_by_default_applied":true,"is_search_only_on_by_default_applied":true},"domain_actions_config":"H4sIAAAAAAAAAL19a4/cNpboXzH60+4gRbvbrzj7aTbj2Ql2MhlkswhwF4MGRVISWxQp81FVqkH++z2HUrXbLkndh51dBHba1XX4PDzvxz+v+P76VjipxG2teExe3YpWie7W7ZX3Wqqr7/55xYfBaMGjdjZcffc/8wdK3g4OPh+vvrv6aYg/pXj1zZV0PdcWPrEq1kYfmXD91W/fUEBCTFK7MEH+45urDKHVNLPlvXoIHMcB//3H/fX3uIk/T3v4HrcwfweHgL0EWPzVd9e/fXMlZE/dnTXjx+Pggvq74ePPisvx4bqD0bbZ2Og99K8w415b9RA4usTivgSy50f4WTHYRQE0r0TxkvcMIVQpvOHvmY4lkMdaWx3H0okPPIoWVi/cFl5uDqEbWICCMbxrAKlKh6lMUiL5PY4UWn5ggpcM0yp8Ynv4jYve2dLVCA978oD/ouXWKlM6jo08toiSpffjDoNXQdkYBpOKD3ffHgufVJtMKp0Vvs4+JS06uJShdJA/6dD+0Y6HVnm1TQAXSdJMDfEjnz/CJVxAPJh4Brj/5JJYZtZAI5d/gW/+WP9F7UWmyTTSsQFstY3KSrd5MJfw8x4ffriwzR5P5lZboOXq2cwPcaHxvO+5N1vU6gKw18K74OqIVMGrwcGWi+B3/fhgiJ2sSYzY4W5ZcE8FcFZJr/eKGfyLMJO
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):2278
                                                                  Entropy (8bit):3.8461613646957997
                                                                  Encrypted:false
                                                                  SSDEEP:48:uiTrlKxrgx9Jxl9Il8utX56IOzjINQegHxd1rc:mO9Y7X56PjdeaS
                                                                  MD5:4D5B0A31B409C09FDE0F30B0D3C24278
                                                                  SHA1:5DF80F38EDF24AA8274CD9693D859B9770B98B49
                                                                  SHA-256:071ED6EC38D08E88DEAA647B0B20FB86BAC79005096C537BC581DB98263AD049
                                                                  SHA-512:8D7FB06C5B7B42B34BB7C0B47A47416210FD8E3D041C75D9A62547DAC4B2A0A09134BB88627F718532E1E5229172264377BB2DA82A9BEC8B916A0DE0818773B3
                                                                  Malicious:false
                                                                  Preview:{.".T.B.D.a.t.a.S.t.o.r.e.O.b.j.e.c.t.".:.{.".H.e.a.d.e.r.".:.{.".O.b.j.e.c.t.T.y.p.e.".:.".T.o.k.e.n.R.e.s.p.o.n.s.e.".,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.a.j.o.r.".:.2.,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.i.n.o.r.".:.1.}.,.".O.b.j.e.c.t.D.a.t.a.".:.{.".S.y.s.t.e.m.D.e.f.i.n.e.d.P.r.o.p.e.r.t.i.e.s.".:.{.".R.e.q.u.e.s.t.I.n.d.e.x.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".W.i.p.w.W.M.+.N.H.l.b.C.D.m.s.Z.p.8.S.O.s.j.h.t.F.B.s.=.".}.,.".E.x.p.i.r.a.t.i.o.n.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".g.F.u.V.R.G.n.6.2.g.E.=.".}.,.".S.t.a.t.u.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".A.A.A.A.A.A.=.=.".}.,.".R.e.s.p.o.n.s.e.B.y.t.e.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.t.r.u.e.,.".V.a.l.u.e.".:.".A.Q.A.A.A.N.C.M.n.d.8.B.F.d.E.R.j.H.o.A.w.E./.C.l.+.s.B.A.A.A.A.o.p.f.H.I.t.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):4622
                                                                  Entropy (8bit):4.00327746358754
                                                                  Encrypted:false
                                                                  SSDEEP:96:iY7XRD0OCHgaZLuaXYNA/slxRiuOKF3OOvOxNXS3IclF:i0iOqgNGs1LX3OOkXS4clF
                                                                  MD5:F3F98A357BA29B4D5AF5CDC514235B36
                                                                  SHA1:83EED9F49A5944AAC84D0481FAAB5D1B3F6D1415
                                                                  SHA-256:5644E5BDF6D4F08460BD16A69759AF20ABA02AFC1C942FC3A25B50991C696DDD
                                                                  SHA-512:2C5EAEA48B30FDE839149180BAEE916ED3167AE15A2696A2F4376E9FFB082AC9C355F4EF82E02E8805138660B906F7A80EA4FE81BAE19D9A0C77EB9363155B3D
                                                                  Malicious:false
                                                                  Preview:{.".T.B.D.a.t.a.S.t.o.r.e.O.b.j.e.c.t.".:.{.".H.e.a.d.e.r.".:.{.".O.b.j.e.c.t.T.y.p.e.".:.".T.o.k.e.n.R.e.s.p.o.n.s.e.".,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.a.j.o.r.".:.2.,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.i.n.o.r.".:.1.}.,.".O.b.j.e.c.t.D.a.t.a.".:.{.".S.y.s.t.e.m.D.e.f.i.n.e.d.P.r.o.p.e.r.t.i.e.s.".:.{.".R.e.q.u.e.s.t.I.n.d.e.x.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".z.3.U.T.q.T.b.3.7./.u.z.h.i.f.l.b.4.0.f.z.h.D.r.E.s.w.=.".}.,.".E.x.p.i.r.a.t.i.o.n.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".h.Y.K.d.K.m.H.6.2.g.E.=.".}.,.".S.t.a.t.u.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".A.w.A.A.A.A.=.=.".}.,.".R.e.s.p.o.n.s.e.B.y.t.e.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.t.r.u.e.,.".V.a.l.u.e.".:.".A.Q.A.A.A.N.C.M.n.d.8.B.F.d.E.R.j.H.o.A.w.E./.C.l.+.s.B.A.A.A.A.o.p.f.H.I.t.
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):1428
                                                                  Entropy (8bit):5.393273539511176
                                                                  Encrypted:false
                                                                  SSDEEP:24:YZGMfJVA/5BGMLfp5BGMz6jT07ncIF5InHI0MY5kUQnA0OpJ5xHRS4L0Mom2J5VQ:Y4MfJVe5wMd5wMe07cIF5Io0MY5kU2Af
                                                                  MD5:984032CEFC966555F54247EB4E4C8B28
                                                                  SHA1:D88CF3FC1D03EE808852F80753731D7E33E957D6
                                                                  SHA-256:21C2090529F9A90B98F04BF1336D0390FBFD49AFC36D247CC7B26EF365766216
                                                                  SHA-512:F67FEB54AAA25DB6EEB8317CC284032F7DB630D9312D27B8428AF3E12F2ECF8EF96077AB205BCA4C9E9E7C78E574D60206863805639349C3708B4AEC33B55BFE
                                                                  Malicious:false
                                                                  Preview:{"logTime": "1005/061810", "correlationVector":"0kV+/vRB8ay0a3Cue7mk6o","action":"EXTENSION_UPDATER", "result":""}.{"logTime": "1005/061810", "correlationVector":"AFo3IfjRT+3l4ojiXpMdNH","action":"EXTENSION_UPDATER", "result":""}.{"logTime": "1005/061810", "correlationVector":"838E3BF9A44F456CB4AD62AC737EDD15","action":"FETCH_UX_CONFIG", "result":""}.{"logTime": "1005/063233", "correlationVector":"2N8fwTcZh6EtTfQ8o4+6aX","action":"EXTENSION_UPDATER", "result":""}.{"logTime": "1005/063233", "correlationVector":"5ADEBA42608E4CC9A1FACA719F284CF9","action":"FETCH_UX_CONFIG", "result":""}.{"logTime": "1005/063346", "correlationVector":"xp/hBMCdVPtUIxZHIviv/x","action":"EXTENSION_UPDATER", "result":""}.{"logTime": "1005/063347", "correlationVector":"BF0B9E58C0CC45ED9AB5D0371131E69A","action":"FETCH_UX_CONFIG", "result":""}.{"logTime": "1005/064305", "correlationVector":"ONVjsWDap1LyjIRdxsqPGs","action":"EXTENSION_UPDATER", "result":""}.{"logTime": "1005/064305", "correlationVector":"82E52491
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):3888
                                                                  Entropy (8bit):3.5197066479608026
                                                                  Encrypted:false
                                                                  SSDEEP:48:y2dK+dOu7HOsikOzBdLXuHhYkDpEgAdK+dOu7HOsikOzngdLXuHhYk+21:43uBYkDVlnIuBYkz
                                                                  MD5:8237138079653895CC28EB6E495775C8
                                                                  SHA1:C78C9AE742B5E8E68AB3E0521A3E983051DEB506
                                                                  SHA-256:D229D7FFCE9001AE777532036F2F18E5155E2E05B43D626F309B1C673856223D
                                                                  SHA-512:FED02A51672296405E4CA9241CE8B6FB55E16E6CE7FC2EABF062FF4334D426346AEF1599A127FF808E67F4707DC6CB80459E06AF0B310BC01E1688D3AA03A9FE
                                                                  Malicious:false
                                                                  Preview:...................................FL..................F.@.. .....|.K.......`...".......(>@.....................1....P.O. .:i.....+00.../C:\.....................1......Y...PROGRA~2.........O.I.Y.....................V.........P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....\.1.....EW.5..MICROS~1..D......(Ux..Y...............................M.i.c.r.o.s.o.f.t.....N.1.....EW/40.Edge..:.......S8..Y...............................E.d.g.e.....`.1.....EW$40.APPLIC~1..H.......S8..Y...............................A.p.p.l.i.c.a.t.i.o.n.....`.2.(>@.DW. .msedge.exe..F.......S8..Y............................5.m.s.e.d.g.e...e.x.e.......k...............-.......j............,.......C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe..<.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.M.i.c.r.o.s.o.f.t.\.E.d.g.e.\.A.p.p.l.i.c.a.t.i.o.n.\.m.s.e.d.g.e...e.x.e.........%ProgramFiles(x86)%\Microsoft\Edge\Application\msedge.exe...............................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):3888
                                                                  Entropy (8bit):3.5220788046554596
                                                                  Encrypted:false
                                                                  SSDEEP:48:y2JP/0dOu7mOsikOzBdLXuHhYkDpEgAdK+dOu7HOsikOzngdLXuHhYk+21:jY3uBYkDVlnIuBYkz
                                                                  MD5:6F0325522650754417CCEED41F30809C
                                                                  SHA1:200618642B7CD873E81CE9E3C3C7E3D2EF88D90B
                                                                  SHA-256:2CC11EFF148DA12F7E3CCFF9C13D2E10576D10A650820C9134AB4DFDA4401282
                                                                  SHA-512:A434249F97CCAB8D6B1FF4935186EF5DDA15BF61F4C6D4C291D20B7351E71253EF047F6A69EC2399FA79942E7610DFD6A34F382F224630B19B3408F41D02CA38
                                                                  Malicious:false
                                                                  Preview:...................................FL..................F.@.. .....|.K.......`...".......(>@.....................1....P.O. .:i.....+00.../C:\.....................1.....EW.5..PROGRA~2.........O.IEW.5....................V......._.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....\.1.....EW.5..MICROS~1..D......(Ux..Y...............................M.i.c.r.o.s.o.f.t.....N.1.....EW/40.Edge..:.......S8.EW74..............................E.d.g.e.....`.1.....EW$40.APPLIC~1..H.......S8..Y...............................A.p.p.l.i.c.a.t.i.o.n.....`.2.(>@.DW. .msedge.exe..F.......S8..Y............................5.m.s.e.d.g.e...e.x.e.......k...............-.......j............,.......C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe..<.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.M.i.c.r.o.s.o.f.t.\.E.d.g.e.\.A.p.p.l.i.c.a.t.i.o.n.\.m.s.e.d.g.e...e.x.e.........%ProgramFiles(x86)%\Microsoft\Edge\Application\msedge.exe...............................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):3888
                                                                  Entropy (8bit):3.5220788046554596
                                                                  Encrypted:false
                                                                  SSDEEP:48:y2JP/0dOu7mOsikOzBdLXuHhYkDpEgAdK+dOu7HOsikOzngdLXuHhYk+21:jY3uBYkDVlnIuBYkz
                                                                  MD5:6F0325522650754417CCEED41F30809C
                                                                  SHA1:200618642B7CD873E81CE9E3C3C7E3D2EF88D90B
                                                                  SHA-256:2CC11EFF148DA12F7E3CCFF9C13D2E10576D10A650820C9134AB4DFDA4401282
                                                                  SHA-512:A434249F97CCAB8D6B1FF4935186EF5DDA15BF61F4C6D4C291D20B7351E71253EF047F6A69EC2399FA79942E7610DFD6A34F382F224630B19B3408F41D02CA38
                                                                  Malicious:false
                                                                  Preview:...................................FL..................F.@.. .....|.K.......`...".......(>@.....................1....P.O. .:i.....+00.../C:\.....................1.....EW.5..PROGRA~2.........O.IEW.5....................V......._.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....\.1.....EW.5..MICROS~1..D......(Ux..Y...............................M.i.c.r.o.s.o.f.t.....N.1.....EW/40.Edge..:.......S8.EW74..............................E.d.g.e.....`.1.....EW$40.APPLIC~1..H.......S8..Y...............................A.p.p.l.i.c.a.t.i.o.n.....`.2.(>@.DW. .msedge.exe..F.......S8..Y............................5.m.s.e.d.g.e...e.x.e.......k...............-.......j............,.......C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe..<.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.M.i.c.r.o.s.o.f.t.\.E.d.g.e.\.A.p.p.l.i.c.a.t.i.o.n.\.m.s.e.d.g.e...e.x.e.........%ProgramFiles(x86)%\Microsoft\Edge\Application\msedge.exe...............................
                                                                  Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):3888
                                                                  Entropy (8bit):3.5197066479608026
                                                                  Encrypted:false
                                                                  SSDEEP:48:y2dK+dOu7HOsikOzBdLXuHhYkDpEgAdK+dOu7HOsikOzngdLXuHhYk+21:43uBYkDVlnIuBYkz
                                                                  MD5:8237138079653895CC28EB6E495775C8
                                                                  SHA1:C78C9AE742B5E8E68AB3E0521A3E983051DEB506
                                                                  SHA-256:D229D7FFCE9001AE777532036F2F18E5155E2E05B43D626F309B1C673856223D
                                                                  SHA-512:FED02A51672296405E4CA9241CE8B6FB55E16E6CE7FC2EABF062FF4334D426346AEF1599A127FF808E67F4707DC6CB80459E06AF0B310BC01E1688D3AA03A9FE
                                                                  Malicious:false
                                                                  Preview:...................................FL..................F.@.. .....|.K.......`...".......(>@.....................1....P.O. .:i.....+00.../C:\.....................1......Y...PROGRA~2.........O.I.Y.....................V.........P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....\.1.....EW.5..MICROS~1..D......(Ux..Y...............................M.i.c.r.o.s.o.f.t.....N.1.....EW/40.Edge..:.......S8..Y...............................E.d.g.e.....`.1.....EW$40.APPLIC~1..H.......S8..Y...............................A.p.p.l.i.c.a.t.i.o.n.....`.2.(>@.DW. .msedge.exe..F.......S8..Y............................5.m.s.e.d.g.e...e.x.e.......k...............-.......j............,.......C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe..<.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.M.i.c.r.o.s.o.f.t.\.E.d.g.e.\.A.p.p.l.i.c.a.t.i.o.n.\.m.s.e.d.g.e...e.x.e.........%ProgramFiles(x86)%\Microsoft\Edge\Application\msedge.exe...............................
                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                  Entropy (8bit):6.579787044153043
                                                                  TrID:
                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                  File name:file.exe
                                                                  File size:917'504 bytes
                                                                  MD5:10954d86b01d1f67f98a43858063b3dc
                                                                  SHA1:66be87dba6cac60f3000e509041f7be25449359c
                                                                  SHA256:20abc825e9a18eed4c4b188ef470d90282b880ea64e6252763d2ddee0aff4c7c
                                                                  SHA512:980f7d9af274aab491564d76b4684f9beb73ebe272efaac99dbb9f3af958e380ca34fe2c3854b72a70b3a93cf8a99bb3e9dbb4f39e8997462f0eef28ae9d593b
                                                                  SSDEEP:12288:TqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDgacT0:TqDEvCTbMWu7rQYlBQcBiT6rprG8as0
                                                                  TLSH:A4159E0273D1C062FFAB92334B5AF6515BBC69260123E61F13981DB9BE701B1563E7A3
                                                                  File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                                  Icon Hash:aaf3e3e3938382a0
                                                                  Entrypoint:0x420577
                                                                  Entrypoint Section:.text
                                                                  Digitally signed:false
                                                                  Imagebase:0x400000
                                                                  Subsystem:windows gui
                                                                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                  DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                  Time Stamp:0x66D0E993 [Thu Aug 29 21:35:15 2024 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:
                                                                  OS Version Major:5
                                                                  OS Version Minor:1
                                                                  File Version Major:5
                                                                  File Version Minor:1
                                                                  Subsystem Version Major:5
                                                                  Subsystem Version Minor:1
                                                                  Import Hash:948cc502fe9226992dce9417f952fce3
                                                                  Instruction
                                                                  call 00007F15C11057D3h
                                                                  jmp 00007F15C11050DFh
                                                                  push ebp
                                                                  mov ebp, esp
                                                                  push esi
                                                                  push dword ptr [ebp+08h]
                                                                  mov esi, ecx
                                                                  call 00007F15C11052BDh
                                                                  mov dword ptr [esi], 0049FDF0h
                                                                  mov eax, esi
                                                                  pop esi
                                                                  pop ebp
                                                                  retn 0004h
                                                                  and dword ptr [ecx+04h], 00000000h
                                                                  mov eax, ecx
                                                                  and dword ptr [ecx+08h], 00000000h
                                                                  mov dword ptr [ecx+04h], 0049FDF8h
                                                                  mov dword ptr [ecx], 0049FDF0h
                                                                  ret
                                                                  push ebp
                                                                  mov ebp, esp
                                                                  push esi
                                                                  push dword ptr [ebp+08h]
                                                                  mov esi, ecx
                                                                  call 00007F15C110528Ah
                                                                  mov dword ptr [esi], 0049FE0Ch
                                                                  mov eax, esi
                                                                  pop esi
                                                                  pop ebp
                                                                  retn 0004h
                                                                  and dword ptr [ecx+04h], 00000000h
                                                                  mov eax, ecx
                                                                  and dword ptr [ecx+08h], 00000000h
                                                                  mov dword ptr [ecx+04h], 0049FE14h
                                                                  mov dword ptr [ecx], 0049FE0Ch
                                                                  ret
                                                                  push ebp
                                                                  mov ebp, esp
                                                                  push esi
                                                                  mov esi, ecx
                                                                  lea eax, dword ptr [esi+04h]
                                                                  mov dword ptr [esi], 0049FDD0h
                                                                  and dword ptr [eax], 00000000h
                                                                  and dword ptr [eax+04h], 00000000h
                                                                  push eax
                                                                  mov eax, dword ptr [ebp+08h]
                                                                  add eax, 04h
                                                                  push eax
                                                                  call 00007F15C1107E7Dh
                                                                  pop ecx
                                                                  pop ecx
                                                                  mov eax, esi
                                                                  pop esi
                                                                  pop ebp
                                                                  retn 0004h
                                                                  lea eax, dword ptr [ecx+04h]
                                                                  mov dword ptr [ecx], 0049FDD0h
                                                                  push eax
                                                                  call 00007F15C1107EC8h
                                                                  pop ecx
                                                                  ret
                                                                  push ebp
                                                                  mov ebp, esp
                                                                  push esi
                                                                  mov esi, ecx
                                                                  lea eax, dword ptr [esi+04h]
                                                                  mov dword ptr [esi], 0049FDD0h
                                                                  push eax
                                                                  call 00007F15C1107EB1h
                                                                  test byte ptr [ebp+08h], 00000001h
                                                                  pop ecx
                                                                  Programming Language:
                                                                  • [ C ] VS2008 SP1 build 30729
                                                                  • [IMP] VS2008 SP1 build 30729
                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x95c8.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xde0000x7594.reloc
                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                  .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                  .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  .rsrc0xd40000x95c80x9600c613b04b94e8c2d27ef1e3755f8a9563False0.2869010416666667data5.165959506555307IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .reloc0xde0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                  RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                  RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                  RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                  RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                                  RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                                  RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                                  RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                                  RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                                  RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                                  RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                                  RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                                  RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                                                  RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                                                  RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                                                  RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                                                  RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                                  RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                                  RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                                  RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                  RT_RCDATA0xdc7b80x890data1.0050182481751824
                                                                  RT_GROUP_ICON0xdd0480x76dataEnglishGreat Britain0.6610169491525424
                                                                  RT_GROUP_ICON0xdd0c00x14dataEnglishGreat Britain1.25
                                                                  RT_GROUP_ICON0xdd0d40x14dataEnglishGreat Britain1.15
                                                                  RT_GROUP_ICON0xdd0e80x14dataEnglishGreat Britain1.25
                                                                  RT_VERSION0xdd0fc0xdcdataEnglishGreat Britain0.6181818181818182
                                                                  RT_MANIFEST0xdd1d80x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                                  DLLImport
                                                                  WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                                  VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                                  WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                  COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                                  MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                                  WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                                  PSAPI.DLLGetProcessMemoryInfo
                                                                  IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                                  USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                                  UxTheme.dllIsThemeActive
                                                                  KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                                  USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                                  GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                                  COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                                  ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                                  SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                                  ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                                  OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                                  Language of compilation systemCountry where language is spokenMap
                                                                  EnglishGreat Britain
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Aug 30, 2024 00:14:51.938740015 CEST4434971040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:14:51.938864946 CEST49710443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:14:51.943881035 CEST49710443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:14:51.943893909 CEST4434971040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:14:51.944135904 CEST4434971040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:14:51.945192099 CEST49710443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:14:51.945251942 CEST49710443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:14:51.945256948 CEST4434971040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:14:51.945375919 CEST49710443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:14:51.988508940 CEST4434971040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:14:52.345587969 CEST4434971040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:14:52.345679045 CEST4434971040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:14:52.345778942 CEST49710443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:14:52.345930099 CEST49710443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:14:52.345948935 CEST4434971040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:14:53.010644913 CEST49674443192.168.2.6173.222.162.64
                                                                  Aug 30, 2024 00:14:53.010644913 CEST49673443192.168.2.6173.222.162.64
                                                                  Aug 30, 2024 00:14:53.307626963 CEST49672443192.168.2.6173.222.162.64
                                                                  Aug 30, 2024 00:15:00.072582006 CEST49719443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:00.072628021 CEST4434971940.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:00.072943926 CEST49719443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:00.073797941 CEST49719443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:00.073812008 CEST4434971940.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:00.458869934 CEST49720443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:00.458925962 CEST4434972040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:00.459014893 CEST49720443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:00.459552050 CEST49720443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:00.459570885 CEST4434972040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:00.863545895 CEST4434971940.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:00.863610983 CEST49719443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:00.866781950 CEST49719443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:00.866795063 CEST4434971940.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:00.867029905 CEST4434971940.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:00.869355917 CEST49719443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:00.869411945 CEST49719443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:00.869415998 CEST4434971940.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:00.869919062 CEST49719443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:00.916491032 CEST4434971940.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:01.042109013 CEST4434971940.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:01.042181969 CEST4434971940.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:01.042241096 CEST49719443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:01.071751118 CEST49719443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:01.071782112 CEST4434971940.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:01.257277966 CEST4434972040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:01.257359982 CEST49720443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:01.259010077 CEST49720443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:01.259026051 CEST4434972040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:01.259227037 CEST4434972040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:01.260822058 CEST49720443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:01.260919094 CEST49720443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:01.260924101 CEST4434972040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:01.261131048 CEST49720443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:01.308515072 CEST4434972040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:01.433016062 CEST4434972040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:01.433224916 CEST4434972040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:01.433289051 CEST49720443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:01.434570074 CEST49720443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:01.434588909 CEST4434972040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:01.434608936 CEST49720443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:02.250617027 CEST49728443192.168.2.6184.28.90.27
                                                                  Aug 30, 2024 00:15:02.250653982 CEST44349728184.28.90.27192.168.2.6
                                                                  Aug 30, 2024 00:15:02.250763893 CEST49728443192.168.2.6184.28.90.27
                                                                  Aug 30, 2024 00:15:02.253343105 CEST49728443192.168.2.6184.28.90.27
                                                                  Aug 30, 2024 00:15:02.253355980 CEST44349728184.28.90.27192.168.2.6
                                                                  Aug 30, 2024 00:15:02.637680054 CEST49674443192.168.2.6173.222.162.64
                                                                  Aug 30, 2024 00:15:02.714538097 CEST49673443192.168.2.6173.222.162.64
                                                                  Aug 30, 2024 00:15:02.962642908 CEST49672443192.168.2.6173.222.162.64
                                                                  Aug 30, 2024 00:15:03.187047958 CEST44349728184.28.90.27192.168.2.6
                                                                  Aug 30, 2024 00:15:03.187128067 CEST49728443192.168.2.6184.28.90.27
                                                                  Aug 30, 2024 00:15:03.189790964 CEST49728443192.168.2.6184.28.90.27
                                                                  Aug 30, 2024 00:15:03.189801931 CEST44349728184.28.90.27192.168.2.6
                                                                  Aug 30, 2024 00:15:03.190048933 CEST44349728184.28.90.27192.168.2.6
                                                                  Aug 30, 2024 00:15:03.191894054 CEST49732443192.168.2.613.107.246.60
                                                                  Aug 30, 2024 00:15:03.191931009 CEST4434973213.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:03.192011118 CEST49732443192.168.2.613.107.246.60
                                                                  Aug 30, 2024 00:15:03.192318916 CEST49732443192.168.2.613.107.246.60
                                                                  Aug 30, 2024 00:15:03.192334890 CEST4434973213.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:03.244576931 CEST49728443192.168.2.6184.28.90.27
                                                                  Aug 30, 2024 00:15:03.288503885 CEST44349728184.28.90.27192.168.2.6
                                                                  Aug 30, 2024 00:15:03.407661915 CEST49733443192.168.2.613.107.246.60
                                                                  Aug 30, 2024 00:15:03.407701969 CEST4434973313.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:03.407784939 CEST49733443192.168.2.613.107.246.60
                                                                  Aug 30, 2024 00:15:03.408039093 CEST49733443192.168.2.613.107.246.60
                                                                  Aug 30, 2024 00:15:03.408054113 CEST4434973313.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:03.466873884 CEST44349728184.28.90.27192.168.2.6
                                                                  Aug 30, 2024 00:15:03.466933966 CEST44349728184.28.90.27192.168.2.6
                                                                  Aug 30, 2024 00:15:03.467011929 CEST49728443192.168.2.6184.28.90.27
                                                                  Aug 30, 2024 00:15:03.479335070 CEST49728443192.168.2.6184.28.90.27
                                                                  Aug 30, 2024 00:15:03.479356050 CEST44349728184.28.90.27192.168.2.6
                                                                  Aug 30, 2024 00:15:03.479366064 CEST49728443192.168.2.6184.28.90.27
                                                                  Aug 30, 2024 00:15:03.479372025 CEST44349728184.28.90.27192.168.2.6
                                                                  Aug 30, 2024 00:15:03.548157930 CEST49734443192.168.2.6184.28.90.27
                                                                  Aug 30, 2024 00:15:03.548203945 CEST44349734184.28.90.27192.168.2.6
                                                                  Aug 30, 2024 00:15:03.548300028 CEST49734443192.168.2.6184.28.90.27
                                                                  Aug 30, 2024 00:15:03.548703909 CEST49734443192.168.2.6184.28.90.27
                                                                  Aug 30, 2024 00:15:03.548713923 CEST44349734184.28.90.27192.168.2.6
                                                                  Aug 30, 2024 00:15:03.957192898 CEST4434973213.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:03.957422972 CEST49732443192.168.2.613.107.246.60
                                                                  Aug 30, 2024 00:15:03.957437992 CEST4434973213.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:03.958393097 CEST4434973213.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:03.958451033 CEST49732443192.168.2.613.107.246.60
                                                                  Aug 30, 2024 00:15:03.959479094 CEST49732443192.168.2.613.107.246.60
                                                                  Aug 30, 2024 00:15:03.959588051 CEST4434973213.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:03.959727049 CEST49732443192.168.2.613.107.246.60
                                                                  Aug 30, 2024 00:15:03.959733009 CEST4434973213.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:04.072761059 CEST4434973213.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:04.072805882 CEST4434973213.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:04.072839975 CEST49732443192.168.2.613.107.246.60
                                                                  Aug 30, 2024 00:15:04.072840929 CEST4434973213.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:04.072915077 CEST49732443192.168.2.613.107.246.60
                                                                  Aug 30, 2024 00:15:04.074255943 CEST49732443192.168.2.613.107.246.60
                                                                  Aug 30, 2024 00:15:04.074279070 CEST4434973213.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:04.145068884 CEST4434973313.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:04.145284891 CEST49733443192.168.2.613.107.246.60
                                                                  Aug 30, 2024 00:15:04.145313978 CEST4434973313.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:04.146732092 CEST4434973313.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:04.146792889 CEST49733443192.168.2.613.107.246.60
                                                                  Aug 30, 2024 00:15:04.147214890 CEST49733443192.168.2.613.107.246.60
                                                                  Aug 30, 2024 00:15:04.147362947 CEST4434973313.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:04.147617102 CEST49733443192.168.2.613.107.246.60
                                                                  Aug 30, 2024 00:15:04.147624016 CEST4434973313.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:04.212450981 CEST49733443192.168.2.613.107.246.60
                                                                  Aug 30, 2024 00:15:04.264908075 CEST4434973313.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:04.264931917 CEST4434973313.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:04.264940977 CEST4434973313.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:04.264956951 CEST4434973313.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:04.264964104 CEST4434973313.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:04.264970064 CEST4434973313.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:04.265000105 CEST49733443192.168.2.613.107.246.60
                                                                  Aug 30, 2024 00:15:04.265028000 CEST4434973313.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:04.265057087 CEST49733443192.168.2.613.107.246.60
                                                                  Aug 30, 2024 00:15:04.265078068 CEST49733443192.168.2.613.107.246.60
                                                                  Aug 30, 2024 00:15:04.285512924 CEST44349734184.28.90.27192.168.2.6
                                                                  Aug 30, 2024 00:15:04.285625935 CEST49734443192.168.2.6184.28.90.27
                                                                  Aug 30, 2024 00:15:04.309669018 CEST49734443192.168.2.6184.28.90.27
                                                                  Aug 30, 2024 00:15:04.309699059 CEST44349734184.28.90.27192.168.2.6
                                                                  Aug 30, 2024 00:15:04.310692072 CEST44349734184.28.90.27192.168.2.6
                                                                  Aug 30, 2024 00:15:04.313129902 CEST49734443192.168.2.6184.28.90.27
                                                                  Aug 30, 2024 00:15:04.349133015 CEST4434973313.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:04.349160910 CEST4434973313.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:04.349230051 CEST49733443192.168.2.613.107.246.60
                                                                  Aug 30, 2024 00:15:04.349245071 CEST4434973313.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:04.349277973 CEST49733443192.168.2.613.107.246.60
                                                                  Aug 30, 2024 00:15:04.349425077 CEST49733443192.168.2.613.107.246.60
                                                                  Aug 30, 2024 00:15:04.351316929 CEST4434973313.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:04.351346016 CEST4434973313.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:04.351407051 CEST49733443192.168.2.613.107.246.60
                                                                  Aug 30, 2024 00:15:04.351412058 CEST4434973313.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:04.351454020 CEST49733443192.168.2.613.107.246.60
                                                                  Aug 30, 2024 00:15:04.356498957 CEST44349734184.28.90.27192.168.2.6
                                                                  Aug 30, 2024 00:15:04.438590050 CEST4434973313.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:04.438612938 CEST4434973313.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:04.438688993 CEST49733443192.168.2.613.107.246.60
                                                                  Aug 30, 2024 00:15:04.438704014 CEST4434973313.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:04.438731909 CEST49733443192.168.2.613.107.246.60
                                                                  Aug 30, 2024 00:15:04.438745022 CEST49733443192.168.2.613.107.246.60
                                                                  Aug 30, 2024 00:15:04.439196110 CEST4434973313.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:04.439260006 CEST49733443192.168.2.613.107.246.60
                                                                  Aug 30, 2024 00:15:04.439265013 CEST4434973313.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:04.439277887 CEST4434973313.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:04.439317942 CEST49733443192.168.2.613.107.246.60
                                                                  Aug 30, 2024 00:15:04.440103054 CEST49733443192.168.2.613.107.246.60
                                                                  Aug 30, 2024 00:15:04.440119028 CEST4434973313.107.246.60192.168.2.6
                                                                  Aug 30, 2024 00:15:04.566349983 CEST44349734184.28.90.27192.168.2.6
                                                                  Aug 30, 2024 00:15:04.566524029 CEST44349734184.28.90.27192.168.2.6
                                                                  Aug 30, 2024 00:15:04.566631079 CEST49734443192.168.2.6184.28.90.27
                                                                  Aug 30, 2024 00:15:04.567797899 CEST49734443192.168.2.6184.28.90.27
                                                                  Aug 30, 2024 00:15:04.567822933 CEST44349734184.28.90.27192.168.2.6
                                                                  Aug 30, 2024 00:15:04.581073046 CEST49738443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:15:04.581099987 CEST44349738162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:15:04.581199884 CEST49738443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:15:04.581453085 CEST49738443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:15:04.581468105 CEST44349738162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:15:04.581990957 CEST49739443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:04.582004070 CEST44349739172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:04.582204103 CEST49739443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:04.582387924 CEST49740443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:04.582413912 CEST44349740172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:04.582498074 CEST49740443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:04.582767963 CEST49740443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:04.582781076 CEST44349740172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:04.582824945 CEST49739443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:04.582842112 CEST44349739172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:04.583817005 CEST49741443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:04.583832026 CEST44349741172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:04.583904028 CEST49741443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:04.584054947 CEST49741443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:04.584078074 CEST44349741172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:04.651186943 CEST44349705173.222.162.64192.168.2.6
                                                                  Aug 30, 2024 00:15:04.651292086 CEST49705443192.168.2.6173.222.162.64
                                                                  Aug 30, 2024 00:15:04.774833918 CEST49744443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:15:04.774883986 CEST44349744162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:15:04.774987936 CEST49744443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:15:04.777978897 CEST49744443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:15:04.777998924 CEST44349744162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.048655033 CEST44349739172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.048938036 CEST49739443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:05.048955917 CEST44349739172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.050026894 CEST44349739172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.050082922 CEST49739443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:05.051402092 CEST49739443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:05.051476955 CEST44349739172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.051589966 CEST49739443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:05.052372932 CEST44349740172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.052639008 CEST49740443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:05.052651882 CEST44349740172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.053822994 CEST44349740172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.053888083 CEST49740443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:05.054780006 CEST49740443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:05.054841995 CEST44349740172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.055016041 CEST49740443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:05.055025101 CEST44349740172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.066656113 CEST44349741172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.066932917 CEST49741443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:05.066951036 CEST44349741172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.068059921 CEST44349741172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.068137884 CEST49741443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:05.069545984 CEST49741443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:05.069634914 CEST44349741172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.070051908 CEST49741443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:05.070061922 CEST44349741172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.082535028 CEST44349738162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.083022118 CEST49738443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:15:05.083030939 CEST44349738162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.084673882 CEST44349738162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.084742069 CEST49738443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:15:05.086024046 CEST49738443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:15:05.086194992 CEST44349738162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.086200953 CEST49738443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:15:05.092499018 CEST44349739172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.103192091 CEST49739443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:05.103199005 CEST44349739172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.103236914 CEST49740443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:05.118833065 CEST49741443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:05.132512093 CEST44349738162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.134458065 CEST49738443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:15:05.134473085 CEST44349738162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.150075912 CEST49739443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:05.175770044 CEST49738443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:15:05.183089972 CEST44349739172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.183185101 CEST44349739172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.183238029 CEST49739443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:05.183366060 CEST49739443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:05.183376074 CEST44349739172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.186976910 CEST44349740172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.187041044 CEST44349740172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.187186003 CEST49740443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:05.187308073 CEST49740443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:05.187324047 CEST44349740172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.206515074 CEST44349738162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.206684113 CEST44349738162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.206756115 CEST49738443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:15:05.206876040 CEST49738443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:15:05.206887007 CEST44349738162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.219417095 CEST44349741172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.219475985 CEST44349741172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.219525099 CEST49741443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:05.219671011 CEST49741443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:05.219676971 CEST44349741172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.233395100 CEST44349744162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.233658075 CEST49744443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:15:05.233680964 CEST44349744162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.234733105 CEST44349744162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.234791040 CEST49744443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:15:05.235914946 CEST49744443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:15:05.235989094 CEST44349744162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.236254930 CEST49744443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:15:05.236262083 CEST44349744162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.290705919 CEST49744443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:15:05.356800079 CEST44349744162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.356887102 CEST44349744162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:15:05.356933117 CEST49744443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:15:05.357251883 CEST49744443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:15:05.357273102 CEST44349744162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:15:07.229974985 CEST49745443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:07.230006933 CEST44349745172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:07.230073929 CEST49745443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:07.230237961 CEST49746443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:07.230245113 CEST44349746172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:07.230463028 CEST49746443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:07.230659008 CEST49745443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:07.230673075 CEST44349745172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:07.230937004 CEST49746443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:07.230947018 CEST44349746172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:07.664928913 CEST49747443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:07.664958954 CEST44349747142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:07.665030003 CEST49747443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:07.665088892 CEST49748443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:07.665115118 CEST44349748142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:07.665168047 CEST49748443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:07.665276051 CEST49747443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:07.665287018 CEST44349747142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:07.665385008 CEST49748443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:07.665399075 CEST44349748142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:07.753231049 CEST44349745172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:07.753757954 CEST49745443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:07.753782034 CEST44349745172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:07.754097939 CEST44349745172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:07.754440069 CEST49745443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:07.754498005 CEST44349745172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:07.764455080 CEST44349746172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:07.764655113 CEST49746443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:07.764664888 CEST44349746172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:07.765799999 CEST44349746172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:07.766472101 CEST49746443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:07.766648054 CEST44349746172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:07.803993940 CEST49745443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:07.818996906 CEST49746443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:08.042593002 CEST49749443192.168.2.6142.250.65.164
                                                                  Aug 30, 2024 00:15:08.042624950 CEST44349749142.250.65.164192.168.2.6
                                                                  Aug 30, 2024 00:15:08.042704105 CEST49749443192.168.2.6142.250.65.164
                                                                  Aug 30, 2024 00:15:08.042851925 CEST49749443192.168.2.6142.250.65.164
                                                                  Aug 30, 2024 00:15:08.042861938 CEST44349749142.250.65.164192.168.2.6
                                                                  Aug 30, 2024 00:15:08.149112940 CEST44349748142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.149343967 CEST49748443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.149353981 CEST44349748142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.149812937 CEST44349748142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.149877071 CEST49748443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.150024891 CEST44349747142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.150278091 CEST49747443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.150291920 CEST44349747142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.150516987 CEST44349748142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.150569916 CEST49748443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.150933981 CEST44349747142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.151014090 CEST49747443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.151657104 CEST44349747142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.151678085 CEST49748443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.151709080 CEST49747443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.151787996 CEST44349748142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.151973963 CEST49748443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.151981115 CEST44349748142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.152832985 CEST49747443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.152967930 CEST44349747142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.153053045 CEST49747443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.153064966 CEST44349747142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.195152044 CEST49747443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.195153952 CEST49748443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.255327940 CEST49750443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:08.255374908 CEST4434975040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:08.255501986 CEST49750443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:08.256700039 CEST49750443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:08.256714106 CEST4434975040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:08.262429953 CEST44349748142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.262526989 CEST44349748142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.262648106 CEST49748443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.263819933 CEST44349747142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.263972998 CEST44349747142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.264020920 CEST49747443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.309779882 CEST49748443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.309818029 CEST44349748142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.319583893 CEST49747443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.319616079 CEST44349747142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.506901979 CEST44349749142.250.65.164192.168.2.6
                                                                  Aug 30, 2024 00:15:08.522268057 CEST49749443192.168.2.6142.250.65.164
                                                                  Aug 30, 2024 00:15:08.522280931 CEST44349749142.250.65.164192.168.2.6
                                                                  Aug 30, 2024 00:15:08.523324013 CEST44349749142.250.65.164192.168.2.6
                                                                  Aug 30, 2024 00:15:08.525549889 CEST49749443192.168.2.6142.250.65.164
                                                                  Aug 30, 2024 00:15:08.540994883 CEST49749443192.168.2.6142.250.65.164
                                                                  Aug 30, 2024 00:15:08.541069984 CEST44349749142.250.65.164192.168.2.6
                                                                  Aug 30, 2024 00:15:08.592540026 CEST49749443192.168.2.6142.250.65.164
                                                                  Aug 30, 2024 00:15:08.592554092 CEST44349749142.250.65.164192.168.2.6
                                                                  Aug 30, 2024 00:15:08.609445095 CEST49749443192.168.2.6142.250.65.164
                                                                  Aug 30, 2024 00:15:08.652426958 CEST49751443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.652463913 CEST44349751142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.652704954 CEST49751443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.653053999 CEST49752443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.653060913 CEST44349752142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.653424978 CEST49751443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.653440952 CEST44349751142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.653465986 CEST49752443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.653673887 CEST49752443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.653682947 CEST44349752142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.656501055 CEST44349749142.250.65.164192.168.2.6
                                                                  Aug 30, 2024 00:15:08.710398912 CEST44349749142.250.65.164192.168.2.6
                                                                  Aug 30, 2024 00:15:08.710468054 CEST44349749142.250.65.164192.168.2.6
                                                                  Aug 30, 2024 00:15:08.710498095 CEST44349749142.250.65.164192.168.2.6
                                                                  Aug 30, 2024 00:15:08.710546017 CEST44349749142.250.65.164192.168.2.6
                                                                  Aug 30, 2024 00:15:08.710571051 CEST49749443192.168.2.6142.250.65.164
                                                                  Aug 30, 2024 00:15:08.710580111 CEST44349749142.250.65.164192.168.2.6
                                                                  Aug 30, 2024 00:15:08.710603952 CEST49749443192.168.2.6142.250.65.164
                                                                  Aug 30, 2024 00:15:08.710655928 CEST44349749142.250.65.164192.168.2.6
                                                                  Aug 30, 2024 00:15:08.710762024 CEST49749443192.168.2.6142.250.65.164
                                                                  Aug 30, 2024 00:15:08.711455107 CEST49749443192.168.2.6142.250.65.164
                                                                  Aug 30, 2024 00:15:08.711474895 CEST44349749142.250.65.164192.168.2.6
                                                                  Aug 30, 2024 00:15:09.118635893 CEST44349752142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:09.119489908 CEST49752443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:09.119502068 CEST44349752142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:09.119883060 CEST44349752142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:09.119980097 CEST49752443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:09.120589018 CEST44349752142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:09.120708942 CEST49752443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:09.120830059 CEST49752443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:09.120894909 CEST44349752142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:09.132093906 CEST44349751142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:09.132380962 CEST49751443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:09.132389069 CEST44349751142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:09.132761002 CEST44349751142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:09.132873058 CEST49751443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:09.133502960 CEST44349751142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:09.133682966 CEST49751443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:09.133682966 CEST49751443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:09.133750916 CEST44349751142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:09.165786028 CEST49752443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:09.165792942 CEST44349752142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:09.170655012 CEST4434975040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:09.170854092 CEST49750443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:09.172373056 CEST49750443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:09.172383070 CEST4434975040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:09.172684908 CEST4434975040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:09.174288034 CEST49750443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:09.174442053 CEST49750443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:09.174442053 CEST49750443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:09.174448013 CEST4434975040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:09.181935072 CEST49751443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:09.181941986 CEST44349751142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:09.212557077 CEST49752443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:09.216515064 CEST4434975040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:09.227972984 CEST49751443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:09.357538939 CEST4434975040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:09.357779980 CEST4434975040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:09.357835054 CEST49750443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:09.358221054 CEST49750443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:09.358221054 CEST49750443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:09.358230114 CEST4434975040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:13.145942926 CEST49753443192.168.2.620.114.59.183
                                                                  Aug 30, 2024 00:15:13.145973921 CEST4434975320.114.59.183192.168.2.6
                                                                  Aug 30, 2024 00:15:13.146059036 CEST49753443192.168.2.620.114.59.183
                                                                  Aug 30, 2024 00:15:13.147011995 CEST49753443192.168.2.620.114.59.183
                                                                  Aug 30, 2024 00:15:13.147021055 CEST4434975320.114.59.183192.168.2.6
                                                                  Aug 30, 2024 00:15:13.939543962 CEST4434975320.114.59.183192.168.2.6
                                                                  Aug 30, 2024 00:15:13.939619064 CEST49753443192.168.2.620.114.59.183
                                                                  Aug 30, 2024 00:15:13.941127062 CEST49753443192.168.2.620.114.59.183
                                                                  Aug 30, 2024 00:15:13.941143990 CEST4434975320.114.59.183192.168.2.6
                                                                  Aug 30, 2024 00:15:13.941385984 CEST4434975320.114.59.183192.168.2.6
                                                                  Aug 30, 2024 00:15:13.994366884 CEST49753443192.168.2.620.114.59.183
                                                                  Aug 30, 2024 00:15:14.048523903 CEST49753443192.168.2.620.114.59.183
                                                                  Aug 30, 2024 00:15:14.092514992 CEST4434975320.114.59.183192.168.2.6
                                                                  Aug 30, 2024 00:15:14.308166027 CEST4434975320.114.59.183192.168.2.6
                                                                  Aug 30, 2024 00:15:14.308185101 CEST4434975320.114.59.183192.168.2.6
                                                                  Aug 30, 2024 00:15:14.308192968 CEST4434975320.114.59.183192.168.2.6
                                                                  Aug 30, 2024 00:15:14.308222055 CEST4434975320.114.59.183192.168.2.6
                                                                  Aug 30, 2024 00:15:14.308233976 CEST4434975320.114.59.183192.168.2.6
                                                                  Aug 30, 2024 00:15:14.308240891 CEST49753443192.168.2.620.114.59.183
                                                                  Aug 30, 2024 00:15:14.308244944 CEST4434975320.114.59.183192.168.2.6
                                                                  Aug 30, 2024 00:15:14.308269978 CEST4434975320.114.59.183192.168.2.6
                                                                  Aug 30, 2024 00:15:14.308283091 CEST4434975320.114.59.183192.168.2.6
                                                                  Aug 30, 2024 00:15:14.308291912 CEST49753443192.168.2.620.114.59.183
                                                                  Aug 30, 2024 00:15:14.308303118 CEST49753443192.168.2.620.114.59.183
                                                                  Aug 30, 2024 00:15:14.308319092 CEST49753443192.168.2.620.114.59.183
                                                                  Aug 30, 2024 00:15:14.308337927 CEST49753443192.168.2.620.114.59.183
                                                                  Aug 30, 2024 00:15:14.308342934 CEST4434975320.114.59.183192.168.2.6
                                                                  Aug 30, 2024 00:15:14.308706999 CEST4434975320.114.59.183192.168.2.6
                                                                  Aug 30, 2024 00:15:14.308759928 CEST49753443192.168.2.620.114.59.183
                                                                  Aug 30, 2024 00:15:14.320679903 CEST49753443192.168.2.620.114.59.183
                                                                  Aug 30, 2024 00:15:14.320715904 CEST4434975320.114.59.183192.168.2.6
                                                                  Aug 30, 2024 00:15:14.320734978 CEST49753443192.168.2.620.114.59.183
                                                                  Aug 30, 2024 00:15:14.320743084 CEST4434975320.114.59.183192.168.2.6
                                                                  Aug 30, 2024 00:15:15.061486006 CEST49756443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:15.061537981 CEST4434975640.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:15.061598063 CEST49756443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:15.062197924 CEST49756443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:15.062221050 CEST4434975640.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:15.879101992 CEST4434975640.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:15.879218102 CEST49756443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:15.945416927 CEST49756443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:15.945440054 CEST4434975640.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:15.945826054 CEST4434975640.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:16.003093958 CEST49756443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:16.027623892 CEST49756443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:16.027695894 CEST49756443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:16.027709007 CEST4434975640.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:16.027801037 CEST49756443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:16.072509050 CEST4434975640.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:17.220937967 CEST4434975640.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:17.221055031 CEST4434975640.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:17.221314907 CEST49756443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:17.221529007 CEST49756443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:17.221553087 CEST4434975640.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:17.221568108 CEST49756443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:20.406564951 CEST49758443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:20.406615019 CEST4434975840.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:20.406774998 CEST49758443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:20.407268047 CEST49758443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:20.407278061 CEST4434975840.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:21.196197033 CEST4434975840.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:21.196346998 CEST49758443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:21.199640036 CEST49758443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:21.199656010 CEST4434975840.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:21.199913025 CEST4434975840.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:21.201787949 CEST49758443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:21.201833010 CEST49758443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:21.201838970 CEST4434975840.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:21.201947927 CEST49758443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:21.248493910 CEST4434975840.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:21.373125076 CEST4434975840.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:21.373205900 CEST4434975840.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:21.373296022 CEST49758443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:21.373449087 CEST49758443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:21.373478889 CEST4434975840.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:22.661169052 CEST44349745172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:22.661525965 CEST44349745172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:22.661572933 CEST49745443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:22.669971943 CEST44349746172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:22.670027018 CEST44349746172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:22.670063019 CEST49746443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:32.934640884 CEST49759443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:32.934676886 CEST4434975940.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:32.934747934 CEST49759443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:32.935301065 CEST49759443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:32.935311079 CEST4434975940.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:34.452742100 CEST4434975940.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:34.452850103 CEST49759443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:34.477922916 CEST49759443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:34.477937937 CEST4434975940.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:34.478173018 CEST4434975940.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:34.504013062 CEST49759443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:34.504056931 CEST49759443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:34.504061937 CEST4434975940.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:34.507395983 CEST49759443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:34.552510977 CEST4434975940.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:34.676074982 CEST4434975940.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:34.676155090 CEST4434975940.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:34.676215887 CEST49759443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:34.676348925 CEST49759443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:34.676354885 CEST4434975940.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:38.627840042 CEST49760443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:38.627875090 CEST4434976040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:38.627966881 CEST49760443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:38.628565073 CEST49760443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:38.628577948 CEST4434976040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:40.452800035 CEST4434976040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:40.452922106 CEST49760443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:40.456973076 CEST49760443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:40.456983089 CEST4434976040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:40.457659006 CEST4434976040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:40.459176064 CEST49760443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:40.459249973 CEST49760443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:40.459254026 CEST4434976040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:40.459395885 CEST49760443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:40.500504971 CEST4434976040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:40.630223989 CEST4434976040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:40.630445004 CEST4434976040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:40.630507946 CEST49760443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:40.630616903 CEST49760443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:40.630630016 CEST4434976040.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:40.719233990 CEST5793853192.168.2.6162.159.36.2
                                                                  Aug 30, 2024 00:15:40.724159002 CEST5357938162.159.36.2192.168.2.6
                                                                  Aug 30, 2024 00:15:40.724239111 CEST5793853192.168.2.6162.159.36.2
                                                                  Aug 30, 2024 00:15:40.729830027 CEST5357938162.159.36.2192.168.2.6
                                                                  Aug 30, 2024 00:15:41.875971079 CEST5793853192.168.2.6162.159.36.2
                                                                  Aug 30, 2024 00:15:41.876138926 CEST5793853192.168.2.6162.159.36.2
                                                                  Aug 30, 2024 00:15:41.915720940 CEST5793853192.168.2.6162.159.36.2
                                                                  Aug 30, 2024 00:15:41.920874119 CEST5357938162.159.36.2192.168.2.6
                                                                  Aug 30, 2024 00:15:41.920917988 CEST5793853192.168.2.6162.159.36.2
                                                                  Aug 30, 2024 00:15:42.131165028 CEST57940443192.168.2.640.127.169.103
                                                                  Aug 30, 2024 00:15:42.131194115 CEST4435794040.127.169.103192.168.2.6
                                                                  Aug 30, 2024 00:15:42.131266117 CEST57940443192.168.2.640.127.169.103
                                                                  Aug 30, 2024 00:15:42.131606102 CEST57940443192.168.2.640.127.169.103
                                                                  Aug 30, 2024 00:15:42.131616116 CEST4435794040.127.169.103192.168.2.6
                                                                  Aug 30, 2024 00:15:42.898211002 CEST4435794040.127.169.103192.168.2.6
                                                                  Aug 30, 2024 00:15:42.898453951 CEST57940443192.168.2.640.127.169.103
                                                                  Aug 30, 2024 00:15:42.900516033 CEST57940443192.168.2.640.127.169.103
                                                                  Aug 30, 2024 00:15:42.900527000 CEST4435794040.127.169.103192.168.2.6
                                                                  Aug 30, 2024 00:15:42.900949001 CEST4435794040.127.169.103192.168.2.6
                                                                  Aug 30, 2024 00:15:42.908773899 CEST57940443192.168.2.640.127.169.103
                                                                  Aug 30, 2024 00:15:42.956501961 CEST4435794040.127.169.103192.168.2.6
                                                                  Aug 30, 2024 00:15:43.231245041 CEST4435794040.127.169.103192.168.2.6
                                                                  Aug 30, 2024 00:15:43.231265068 CEST4435794040.127.169.103192.168.2.6
                                                                  Aug 30, 2024 00:15:43.231278896 CEST4435794040.127.169.103192.168.2.6
                                                                  Aug 30, 2024 00:15:43.231348038 CEST57940443192.168.2.640.127.169.103
                                                                  Aug 30, 2024 00:15:43.231376886 CEST4435794040.127.169.103192.168.2.6
                                                                  Aug 30, 2024 00:15:43.231393099 CEST57940443192.168.2.640.127.169.103
                                                                  Aug 30, 2024 00:15:43.231446981 CEST57940443192.168.2.640.127.169.103
                                                                  Aug 30, 2024 00:15:43.232536077 CEST4435794040.127.169.103192.168.2.6
                                                                  Aug 30, 2024 00:15:43.232584000 CEST4435794040.127.169.103192.168.2.6
                                                                  Aug 30, 2024 00:15:43.232636929 CEST57940443192.168.2.640.127.169.103
                                                                  Aug 30, 2024 00:15:43.232636929 CEST57940443192.168.2.640.127.169.103
                                                                  Aug 30, 2024 00:15:43.232656002 CEST4435794040.127.169.103192.168.2.6
                                                                  Aug 30, 2024 00:15:43.233035088 CEST4435794040.127.169.103192.168.2.6
                                                                  Aug 30, 2024 00:15:43.233094931 CEST57940443192.168.2.640.127.169.103
                                                                  Aug 30, 2024 00:15:43.236373901 CEST57940443192.168.2.640.127.169.103
                                                                  Aug 30, 2024 00:15:43.236398935 CEST4435794040.127.169.103192.168.2.6
                                                                  Aug 30, 2024 00:15:43.236478090 CEST57940443192.168.2.640.127.169.103
                                                                  Aug 30, 2024 00:15:43.236490965 CEST4435794040.127.169.103192.168.2.6
                                                                  Aug 30, 2024 00:15:54.166476965 CEST49752443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:54.166496992 CEST44349752142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:54.182307959 CEST49751443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:54.182322979 CEST44349751142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:58.591069937 CEST57941443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:58.591098070 CEST44357941172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:58.591160059 CEST57941443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:58.591363907 CEST57942443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:58.591370106 CEST44357942172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:58.591430902 CEST57942443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:58.591567993 CEST57941443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:58.591578007 CEST44357941172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:58.591707945 CEST57942443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:58.591717958 CEST44357942172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:59.048372030 CEST44357942172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:59.048593998 CEST57942443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:59.048605919 CEST44357942172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:59.048917055 CEST44357942172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:59.049168110 CEST57942443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:59.049223900 CEST44357942172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:59.080353022 CEST44357941172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:59.082741022 CEST57941443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:59.082751989 CEST44357941172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:59.083108902 CEST44357941172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:59.083424091 CEST57941443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:59.083482981 CEST44357941172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:59.102950096 CEST57942443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:59.134217978 CEST57941443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:59.952296019 CEST57944443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:59.952338934 CEST4435794440.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:15:59.952394009 CEST57944443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:59.952919006 CEST57944443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:15:59.952938080 CEST4435794440.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:00.735641956 CEST57945443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:16:00.735688925 CEST44357945162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:16:00.735783100 CEST57945443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:16:00.735845089 CEST57946443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:16:00.735852957 CEST44357946162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:16:00.735905886 CEST57946443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:16:00.736001968 CEST57945443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:16:00.736022949 CEST44357945162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:16:00.736116886 CEST57946443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:16:00.736128092 CEST44357946162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:16:00.757134914 CEST4435794440.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:00.757244110 CEST57944443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:00.759073019 CEST57944443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:00.759088993 CEST4435794440.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:00.759332895 CEST4435794440.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:00.761071920 CEST57944443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:00.761135101 CEST57944443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:00.761142969 CEST4435794440.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:00.761234045 CEST57944443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:00.808496952 CEST4435794440.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:00.936252117 CEST4435794440.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:00.936415911 CEST4435794440.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:00.936467886 CEST57944443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:00.936518908 CEST57944443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:00.936543941 CEST4435794440.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:01.191274881 CEST44357945162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:16:01.191497087 CEST57945443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:16:01.191512108 CEST44357945162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:16:01.191818953 CEST44357946162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:16:01.191843987 CEST44357945162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:16:01.192117929 CEST57945443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:16:01.192179918 CEST44357945162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:16:01.192269087 CEST57946443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:16:01.192277908 CEST44357946162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:16:01.192643881 CEST44357946162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:16:01.192914963 CEST57946443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:16:01.192995071 CEST44357946162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:16:01.243572950 CEST57946443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:16:01.243572950 CEST57945443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:16:01.287375927 CEST57947443192.168.2.623.44.133.38
                                                                  Aug 30, 2024 00:16:01.287410975 CEST4435794723.44.133.38192.168.2.6
                                                                  Aug 30, 2024 00:16:01.287497997 CEST57947443192.168.2.623.44.133.38
                                                                  Aug 30, 2024 00:16:01.287656069 CEST57947443192.168.2.623.44.133.38
                                                                  Aug 30, 2024 00:16:01.287672043 CEST4435794723.44.133.38192.168.2.6
                                                                  Aug 30, 2024 00:16:01.797595978 CEST4435794723.44.133.38192.168.2.6
                                                                  Aug 30, 2024 00:16:01.797928095 CEST57947443192.168.2.623.44.133.38
                                                                  Aug 30, 2024 00:16:01.797955990 CEST4435794723.44.133.38192.168.2.6
                                                                  Aug 30, 2024 00:16:01.798299074 CEST4435794723.44.133.38192.168.2.6
                                                                  Aug 30, 2024 00:16:01.798604012 CEST57947443192.168.2.623.44.133.38
                                                                  Aug 30, 2024 00:16:01.798655987 CEST4435794723.44.133.38192.168.2.6
                                                                  Aug 30, 2024 00:16:01.798739910 CEST57947443192.168.2.623.44.133.38
                                                                  Aug 30, 2024 00:16:01.840504885 CEST4435794723.44.133.38192.168.2.6
                                                                  Aug 30, 2024 00:16:02.172369003 CEST4435794723.44.133.38192.168.2.6
                                                                  Aug 30, 2024 00:16:02.172480106 CEST4435794723.44.133.38192.168.2.6
                                                                  Aug 30, 2024 00:16:02.172739983 CEST57947443192.168.2.623.44.133.38
                                                                  Aug 30, 2024 00:16:02.172770023 CEST4435794723.44.133.38192.168.2.6
                                                                  Aug 30, 2024 00:16:02.172786951 CEST57947443192.168.2.623.44.133.38
                                                                  Aug 30, 2024 00:16:02.173203945 CEST57948443192.168.2.623.44.133.38
                                                                  Aug 30, 2024 00:16:02.173228025 CEST57947443192.168.2.623.44.133.38
                                                                  Aug 30, 2024 00:16:02.173235893 CEST4435794823.44.133.38192.168.2.6
                                                                  Aug 30, 2024 00:16:02.173293114 CEST57948443192.168.2.623.44.133.38
                                                                  Aug 30, 2024 00:16:02.173476934 CEST57948443192.168.2.623.44.133.38
                                                                  Aug 30, 2024 00:16:02.173491001 CEST4435794823.44.133.38192.168.2.6
                                                                  Aug 30, 2024 00:16:02.644627094 CEST4435794823.44.133.38192.168.2.6
                                                                  Aug 30, 2024 00:16:02.645100117 CEST57948443192.168.2.623.44.133.38
                                                                  Aug 30, 2024 00:16:02.645113945 CEST4435794823.44.133.38192.168.2.6
                                                                  Aug 30, 2024 00:16:02.645427942 CEST4435794823.44.133.38192.168.2.6
                                                                  Aug 30, 2024 00:16:02.645745039 CEST57948443192.168.2.623.44.133.38
                                                                  Aug 30, 2024 00:16:02.645798922 CEST4435794823.44.133.38192.168.2.6
                                                                  Aug 30, 2024 00:16:02.645884037 CEST57948443192.168.2.623.44.133.38
                                                                  Aug 30, 2024 00:16:02.688500881 CEST4435794823.44.133.38192.168.2.6
                                                                  Aug 30, 2024 00:16:02.884898901 CEST4435794823.44.133.38192.168.2.6
                                                                  Aug 30, 2024 00:16:02.885010004 CEST4435794823.44.133.38192.168.2.6
                                                                  Aug 30, 2024 00:16:02.885071993 CEST57948443192.168.2.623.44.133.38
                                                                  Aug 30, 2024 00:16:02.885246038 CEST57948443192.168.2.623.44.133.38
                                                                  Aug 30, 2024 00:16:02.885267019 CEST4435794823.44.133.38192.168.2.6
                                                                  Aug 30, 2024 00:16:03.391311884 CEST57949443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:03.391347885 CEST4435794940.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:03.391433001 CEST57949443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:03.391940117 CEST57949443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:03.391956091 CEST4435794940.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:04.312119961 CEST4435794940.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:04.312225103 CEST57949443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:04.313846111 CEST57949443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:04.313862085 CEST4435794940.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:04.314091921 CEST4435794940.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:04.315602064 CEST57949443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:04.315654993 CEST57949443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:04.315660000 CEST4435794940.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:04.315789938 CEST57949443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:04.356503010 CEST4435794940.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:04.485656023 CEST4435794940.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:04.485872030 CEST4435794940.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:04.485958099 CEST57949443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:04.486042976 CEST57949443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:04.486063957 CEST4435794940.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:07.664927959 CEST49745443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:16:07.664947033 CEST44349745172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:16:07.680546999 CEST49746443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:16:07.680555105 CEST44349746172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:16:13.958477020 CEST44357942172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:16:13.958564043 CEST44357942172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:16:13.958645105 CEST57942443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:16:13.984496117 CEST44357941172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:16:13.984570026 CEST44357941172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:16:13.984674931 CEST57941443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:16:16.101982117 CEST44357946162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:16:16.102061033 CEST44357946162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:16:16.102122068 CEST57946443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:16:16.102447987 CEST44357945162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:16:16.102525949 CEST44357945162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:16:16.102562904 CEST57945443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:16:31.998594999 CEST57951443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:31.998634100 CEST4435795140.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:31.998765945 CEST57951443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:31.999298096 CEST57951443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:31.999313116 CEST4435795140.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:32.804511070 CEST4435795140.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:32.804580927 CEST57951443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:32.813291073 CEST57951443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:32.813313007 CEST4435795140.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:32.813546896 CEST4435795140.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:32.814641953 CEST57951443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:32.814709902 CEST57951443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:32.814717054 CEST4435795140.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:32.814827919 CEST57951443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:32.856506109 CEST4435795140.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:32.962555885 CEST4970480192.168.2.6199.232.210.172
                                                                  Aug 30, 2024 00:16:32.971625090 CEST8049704199.232.210.172192.168.2.6
                                                                  Aug 30, 2024 00:16:32.971700907 CEST4970480192.168.2.6199.232.210.172
                                                                  Aug 30, 2024 00:16:32.996728897 CEST4435795140.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:32.996835947 CEST4435795140.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:32.996957064 CEST57951443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:32.997282028 CEST57951443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:32.997299910 CEST4435795140.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:36.580240965 CEST57952443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:36.580285072 CEST4435795240.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:36.580359936 CEST57952443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:36.580918074 CEST57952443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:36.580929995 CEST4435795240.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:37.363941908 CEST4435795240.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:37.364044905 CEST57952443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:37.365725040 CEST57952443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:37.365741014 CEST4435795240.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:37.365968943 CEST4435795240.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:37.367685080 CEST57952443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:37.367752075 CEST57952443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:37.367755890 CEST4435795240.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:37.367880106 CEST57952443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:37.408505917 CEST4435795240.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:37.537729025 CEST4435795240.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:37.538054943 CEST4435795240.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:37.538132906 CEST57952443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:37.538266897 CEST57952443192.168.2.640.113.110.67
                                                                  Aug 30, 2024 00:16:37.538290024 CEST4435795240.113.110.67192.168.2.6
                                                                  Aug 30, 2024 00:16:39.181406975 CEST49752443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:16:39.181448936 CEST44349752142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:16:39.196825981 CEST49751443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:16:39.196841002 CEST44349751142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:16:52.665891886 CEST49745443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:16:52.665930033 CEST44349745172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:16:52.681400061 CEST49746443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:16:52.681410074 CEST44349746172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:16:58.962529898 CEST57942443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:16:58.962564945 CEST44357942172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:16:58.996160030 CEST57941443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:16:58.996171951 CEST44357941172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:17:01.103296041 CEST57945443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:17:01.103319883 CEST44357945162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:17:01.103347063 CEST57946443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:17:01.103352070 CEST44357946162.159.61.3192.168.2.6
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Aug 30, 2024 00:14:59.901129961 CEST53641131.1.1.1192.168.2.6
                                                                  Aug 30, 2024 00:15:00.724415064 CEST5018553192.168.2.61.1.1.1
                                                                  Aug 30, 2024 00:15:00.724574089 CEST5874353192.168.2.61.1.1.1
                                                                  Aug 30, 2024 00:15:02.153801918 CEST53514121.1.1.1192.168.2.6
                                                                  Aug 30, 2024 00:15:02.163206100 CEST53564341.1.1.1192.168.2.6
                                                                  Aug 30, 2024 00:15:04.571816921 CEST5333653192.168.2.61.1.1.1
                                                                  Aug 30, 2024 00:15:04.572098017 CEST5644653192.168.2.61.1.1.1
                                                                  Aug 30, 2024 00:15:04.572767019 CEST5672253192.168.2.61.1.1.1
                                                                  Aug 30, 2024 00:15:04.572921991 CEST5237553192.168.2.61.1.1.1
                                                                  Aug 30, 2024 00:15:04.573523998 CEST6225053192.168.2.61.1.1.1
                                                                  Aug 30, 2024 00:15:04.573657990 CEST5934853192.168.2.61.1.1.1
                                                                  Aug 30, 2024 00:15:04.574517965 CEST5642553192.168.2.61.1.1.1
                                                                  Aug 30, 2024 00:15:04.574958086 CEST4952653192.168.2.61.1.1.1
                                                                  Aug 30, 2024 00:15:04.580537081 CEST53564461.1.1.1192.168.2.6
                                                                  Aug 30, 2024 00:15:04.580564976 CEST53533361.1.1.1192.168.2.6
                                                                  Aug 30, 2024 00:15:04.581064939 CEST53567221.1.1.1192.168.2.6
                                                                  Aug 30, 2024 00:15:04.581135035 CEST53523751.1.1.1192.168.2.6
                                                                  Aug 30, 2024 00:15:04.581707001 CEST53622501.1.1.1192.168.2.6
                                                                  Aug 30, 2024 00:15:04.581728935 CEST53593481.1.1.1192.168.2.6
                                                                  Aug 30, 2024 00:15:04.583314896 CEST53564251.1.1.1192.168.2.6
                                                                  Aug 30, 2024 00:15:04.583339930 CEST53495261.1.1.1192.168.2.6
                                                                  Aug 30, 2024 00:15:04.765026093 CEST5828253192.168.2.61.1.1.1
                                                                  Aug 30, 2024 00:15:04.765259027 CEST5706053192.168.2.61.1.1.1
                                                                  Aug 30, 2024 00:15:04.773917913 CEST53582821.1.1.1192.168.2.6
                                                                  Aug 30, 2024 00:15:04.774051905 CEST53570601.1.1.1192.168.2.6
                                                                  Aug 30, 2024 00:15:06.915968895 CEST60222443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:07.229588032 CEST60222443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:07.361305952 CEST44360222172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:07.361530066 CEST44360222172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:07.361548901 CEST44360222172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:07.361563921 CEST44360222172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:07.361762047 CEST60222443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:07.363498926 CEST60222443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:07.363590956 CEST60222443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:07.363818884 CEST60222443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:07.363940001 CEST60222443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:07.371315956 CEST44360222172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:07.457072020 CEST44360222172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:07.457081079 CEST44360222172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:07.457084894 CEST44360222172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:07.457093000 CEST44360222172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:07.457403898 CEST60222443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:07.457524061 CEST60222443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:07.457940102 CEST44360222172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:07.459230900 CEST44360222172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:07.459630013 CEST44360222172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:07.460067987 CEST60222443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:07.539946079 CEST60222443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:07.540169001 CEST60222443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:07.552098989 CEST44360222172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:07.604263067 CEST60222443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:07.656918049 CEST44360222172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:07.657344103 CEST44360222172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:07.657356024 CEST44360222172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:07.664135933 CEST60222443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:07.945774078 CEST60222443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:07.946242094 CEST60222443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:08.040508986 CEST44360222172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:08.041541100 CEST44360222172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:08.041657925 CEST44360222172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:08.041830063 CEST60222443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:08.325855017 CEST55162443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.651882887 CEST55162443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.803385973 CEST44355162142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.803421021 CEST44355162142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.804066896 CEST55162443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.806657076 CEST44355162142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.806694031 CEST44355162142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.806761026 CEST44355162142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.806823015 CEST44355162142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.806997061 CEST55162443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.807617903 CEST55162443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.808778048 CEST55162443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.808908939 CEST55162443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.809263945 CEST55162443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.809530973 CEST55162443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.824083090 CEST55162443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.912000895 CEST44355162142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.912020922 CEST44355162142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.912029982 CEST44355162142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.912395000 CEST55162443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.918268919 CEST44355162142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.918967009 CEST55162443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.919126034 CEST44355162142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.919513941 CEST55162443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.920775890 CEST44355162142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.935664892 CEST44355162142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.935679913 CEST44355162142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:08.937536955 CEST55162443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:08.963403940 CEST55162443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:09.030647039 CEST44355162142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:15.699554920 CEST55162443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:15.699744940 CEST55162443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:15.797451973 CEST44355162142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:15.835683107 CEST44355162142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:15.835988045 CEST44355162142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:15.981110096 CEST44355162142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:16.031924009 CEST55162443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:16.032031059 CEST55162443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:16.325552940 CEST55162443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:16.854127884 CEST55162443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:17.063615084 CEST44355162142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:17.063863039 CEST55162443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:17.064587116 CEST44355162142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:17.064764977 CEST55162443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:17.087796926 CEST65078443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:17.151837111 CEST44355162142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:17.151850939 CEST44355162142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:17.400127888 CEST65078443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:17.560308933 CEST44355162142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:17.560319901 CEST44355162142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:17.570622921 CEST44365078142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:17.570719957 CEST44365078142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:17.570874929 CEST55162443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:37.747325897 CEST64884443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:37.747481108 CEST64884443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:38.215032101 CEST44364884142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:38.215080023 CEST44364884142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:38.215641022 CEST64884443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:38.215780973 CEST64884443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:38.216026068 CEST64884443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:38.216039896 CEST64884443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:38.232739925 CEST44364884142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:38.314099073 CEST44364884142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:38.315068007 CEST44364884142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:38.315078020 CEST44364884142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:38.315321922 CEST64884443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:38.330213070 CEST44364884142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:38.330224037 CEST44364884142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:38.330547094 CEST64884443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:38.369832039 CEST64884443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:38.454139948 CEST44364884142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:40.718710899 CEST5356627162.159.36.2192.168.2.6
                                                                  Aug 30, 2024 00:15:41.402322054 CEST64884443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:41.402358055 CEST64884443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:41.933598995 CEST53539691.1.1.1192.168.2.6
                                                                  Aug 30, 2024 00:15:41.973460913 CEST44364884142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:41.988035917 CEST44364884142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:42.016511917 CEST64884443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:42.079884052 CEST64884443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:42.079911947 CEST64884443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:42.138679981 CEST44364884142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:42.177491903 CEST44364884142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:42.192176104 CEST44364884142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:42.192197084 CEST44364884142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:42.192464113 CEST64884443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:42.232662916 CEST64884443192.168.2.6142.251.35.174
                                                                  Aug 30, 2024 00:15:42.322382927 CEST44364884142.251.35.174192.168.2.6
                                                                  Aug 30, 2024 00:15:58.590856075 CEST53595443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:58.900253057 CEST53595443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:59.035784960 CEST44353595172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:59.036159039 CEST44353595172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:59.036204100 CEST44353595172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:59.036267996 CEST44353595172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:59.036278963 CEST44353595172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:59.037254095 CEST53595443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:59.042458057 CEST53595443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:59.043071032 CEST53595443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:59.043165922 CEST53595443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:59.043433905 CEST53595443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:59.043581009 CEST53595443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:59.136238098 CEST44353595172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:59.136358976 CEST44353595172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:59.136369944 CEST44353595172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:59.136377096 CEST44353595172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:59.136770964 CEST53595443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:59.136936903 CEST53595443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:59.137911081 CEST44353595172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:59.139122963 CEST44353595172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:59.139331102 CEST44353595172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:59.139508009 CEST53595443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:15:59.232656002 CEST44353595172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:15:59.297220945 CEST53595443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:16:00.735311985 CEST50505443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:16:01.042232990 CEST50505443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:16:01.186727047 CEST44350505162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:16:01.186739922 CEST44350505162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:16:01.186752081 CEST44350505162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:16:01.186763048 CEST44350505162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:16:01.187354088 CEST50505443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:16:01.188935995 CEST50505443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:16:01.189043045 CEST50505443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:16:01.189258099 CEST50505443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:16:01.189337015 CEST50505443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:16:01.284276009 CEST44350505162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:16:01.284301043 CEST44350505162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:16:01.284318924 CEST44350505162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:16:01.284328938 CEST44350505162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:16:01.284858942 CEST50505443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:16:01.284858942 CEST50505443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:16:01.286189079 CEST44350505162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:16:01.286648989 CEST44350505162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:16:01.286963940 CEST50505443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:16:01.381411076 CEST44350505162.159.61.3192.168.2.6
                                                                  Aug 30, 2024 00:16:01.416909933 CEST50505443192.168.2.6162.159.61.3
                                                                  Aug 30, 2024 00:16:08.713782072 CEST50800443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:16:08.713891983 CEST50800443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:16:08.714215040 CEST50800443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:16:08.714313984 CEST50800443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:16:09.181315899 CEST44350800172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:16:09.181929111 CEST50800443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:16:09.217150927 CEST50800443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:16:09.276204109 CEST44350800172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:16:09.276217937 CEST44350800172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:16:09.276227951 CEST44350800172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:16:09.276240110 CEST44350800172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:16:09.276612043 CEST50800443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:16:09.276685953 CEST50800443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:16:09.370837927 CEST44350800172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:16:09.371304035 CEST50800443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:16:09.467643976 CEST44350800172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:16:09.468274117 CEST44350800172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:16:09.468612909 CEST44350800172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:16:09.468805075 CEST50800443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:16:09.469485998 CEST59515443192.168.2.6142.251.179.84
                                                                  Aug 30, 2024 00:16:09.469610929 CEST59515443192.168.2.6142.251.179.84
                                                                  Aug 30, 2024 00:16:09.920559883 CEST44359515142.251.179.84192.168.2.6
                                                                  Aug 30, 2024 00:16:09.921271086 CEST44359515142.251.179.84192.168.2.6
                                                                  Aug 30, 2024 00:16:09.921318054 CEST44359515142.251.179.84192.168.2.6
                                                                  Aug 30, 2024 00:16:09.921329975 CEST44359515142.251.179.84192.168.2.6
                                                                  Aug 30, 2024 00:16:09.921340942 CEST44359515142.251.179.84192.168.2.6
                                                                  Aug 30, 2024 00:16:09.921542883 CEST59515443192.168.2.6142.251.179.84
                                                                  Aug 30, 2024 00:16:09.922133923 CEST59515443192.168.2.6142.251.179.84
                                                                  Aug 30, 2024 00:16:09.922482967 CEST59515443192.168.2.6142.251.179.84
                                                                  Aug 30, 2024 00:16:10.023689985 CEST44359515142.251.179.84192.168.2.6
                                                                  Aug 30, 2024 00:16:10.023704052 CEST44359515142.251.179.84192.168.2.6
                                                                  Aug 30, 2024 00:16:10.023714066 CEST44359515142.251.179.84192.168.2.6
                                                                  Aug 30, 2024 00:16:10.024024010 CEST59515443192.168.2.6142.251.179.84
                                                                  Aug 30, 2024 00:16:10.058300972 CEST59515443192.168.2.6142.251.179.84
                                                                  Aug 30, 2024 00:16:10.079632044 CEST44359515142.251.179.84192.168.2.6
                                                                  Aug 30, 2024 00:16:10.079648018 CEST44359515142.251.179.84192.168.2.6
                                                                  Aug 30, 2024 00:16:10.079657078 CEST44359515142.251.179.84192.168.2.6
                                                                  Aug 30, 2024 00:16:10.080056906 CEST59515443192.168.2.6142.251.179.84
                                                                  Aug 30, 2024 00:16:10.080188036 CEST59515443192.168.2.6142.251.179.84
                                                                  Aug 30, 2024 00:16:10.206895113 CEST44359515142.251.179.84192.168.2.6
                                                                  Aug 30, 2024 00:16:12.170016050 CEST50800443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:16:12.170150995 CEST50800443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:16:12.265743971 CEST44350800172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:16:12.266635895 CEST44350800172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:16:12.267111063 CEST44350800172.64.41.3192.168.2.6
                                                                  Aug 30, 2024 00:16:12.267290115 CEST50800443192.168.2.6172.64.41.3
                                                                  Aug 30, 2024 00:16:12.267930031 CEST61680443192.168.2.6142.251.40.206
                                                                  Aug 30, 2024 00:16:12.268059969 CEST61680443192.168.2.6142.251.40.206
                                                                  Aug 30, 2024 00:16:12.732706070 CEST44361680142.251.40.206192.168.2.6
                                                                  Aug 30, 2024 00:16:12.732731104 CEST44361680142.251.40.206192.168.2.6
                                                                  Aug 30, 2024 00:16:12.733433962 CEST61680443192.168.2.6142.251.40.206
                                                                  Aug 30, 2024 00:16:12.733510971 CEST61680443192.168.2.6142.251.40.206
                                                                  Aug 30, 2024 00:16:12.733767986 CEST61680443192.168.2.6142.251.40.206
                                                                  Aug 30, 2024 00:16:12.733779907 CEST61680443192.168.2.6142.251.40.206
                                                                  Aug 30, 2024 00:16:12.733907938 CEST61680443192.168.2.6142.251.40.206
                                                                  Aug 30, 2024 00:16:12.733922005 CEST61680443192.168.2.6142.251.40.206
                                                                  Aug 30, 2024 00:16:12.751733065 CEST44361680142.251.40.206192.168.2.6
                                                                  Aug 30, 2024 00:16:12.826965094 CEST44361680142.251.40.206192.168.2.6
                                                                  Aug 30, 2024 00:16:12.827142954 CEST44361680142.251.40.206192.168.2.6
                                                                  Aug 30, 2024 00:16:12.827159882 CEST44361680142.251.40.206192.168.2.6
                                                                  Aug 30, 2024 00:16:12.827420950 CEST61680443192.168.2.6142.251.40.206
                                                                  Aug 30, 2024 00:16:12.827567101 CEST44361680142.251.40.206192.168.2.6
                                                                  Aug 30, 2024 00:16:12.852240086 CEST44361680142.251.40.206192.168.2.6
                                                                  Aug 30, 2024 00:16:12.852830887 CEST61680443192.168.2.6142.251.40.206
                                                                  Aug 30, 2024 00:16:12.904537916 CEST44361680142.251.40.206192.168.2.6
                                                                  Aug 30, 2024 00:16:12.904915094 CEST61680443192.168.2.6142.251.40.206
                                                                  Aug 30, 2024 00:16:12.904947042 CEST44361680142.251.40.206192.168.2.6
                                                                  Aug 30, 2024 00:16:12.905492067 CEST61680443192.168.2.6142.251.40.206
                                                                  Aug 30, 2024 00:16:12.906255960 CEST44361680142.251.40.206192.168.2.6
                                                                  Aug 30, 2024 00:16:12.906755924 CEST44361680142.251.40.206192.168.2.6
                                                                  Aug 30, 2024 00:16:12.907145023 CEST61680443192.168.2.6142.251.40.206
                                                                  Aug 30, 2024 00:16:13.007204056 CEST44361680142.251.40.206192.168.2.6
                                                                  Aug 30, 2024 00:16:42.987617970 CEST64703443192.168.2.6142.251.40.206
                                                                  Aug 30, 2024 00:16:42.987746000 CEST64703443192.168.2.6142.251.40.206
                                                                  Aug 30, 2024 00:16:43.464574099 CEST44364703142.251.40.206192.168.2.6
                                                                  Aug 30, 2024 00:16:43.464591980 CEST44364703142.251.40.206192.168.2.6
                                                                  Aug 30, 2024 00:16:43.465234041 CEST64703443192.168.2.6142.251.40.206
                                                                  Aug 30, 2024 00:16:43.465311050 CEST64703443192.168.2.6142.251.40.206
                                                                  Aug 30, 2024 00:16:43.465594053 CEST64703443192.168.2.6142.251.40.206
                                                                  Aug 30, 2024 00:16:43.465604067 CEST64703443192.168.2.6142.251.40.206
                                                                  Aug 30, 2024 00:16:43.482875109 CEST44364703142.251.40.206192.168.2.6
                                                                  Aug 30, 2024 00:16:43.563607931 CEST44364703142.251.40.206192.168.2.6
                                                                  Aug 30, 2024 00:16:43.565257072 CEST44364703142.251.40.206192.168.2.6
                                                                  Aug 30, 2024 00:16:43.565493107 CEST64703443192.168.2.6142.251.40.206
                                                                  Aug 30, 2024 00:16:43.566867113 CEST44364703142.251.40.206192.168.2.6
                                                                  Aug 30, 2024 00:16:43.642993927 CEST44364703142.251.40.206192.168.2.6
                                                                  Aug 30, 2024 00:16:43.643474102 CEST64703443192.168.2.6142.251.40.206
                                                                  Aug 30, 2024 00:16:43.644758940 CEST44364703142.251.40.206192.168.2.6
                                                                  Aug 30, 2024 00:16:43.682117939 CEST64703443192.168.2.6142.251.40.206
                                                                  Aug 30, 2024 00:16:43.767574072 CEST44364703142.251.40.206192.168.2.6
                                                                  Aug 30, 2024 00:16:43.968319893 CEST64703443192.168.2.6142.251.40.206
                                                                  Aug 30, 2024 00:16:44.092108011 CEST44364703142.251.40.206192.168.2.6
                                                                  Aug 30, 2024 00:16:44.119079113 CEST64703443192.168.2.6142.251.40.206
                                                                  Aug 30, 2024 00:16:44.185040951 CEST44364703142.251.40.206192.168.2.6
                                                                  Aug 30, 2024 00:16:44.185332060 CEST64703443192.168.2.6142.251.40.206
                                                                  Aug 30, 2024 00:16:44.191853046 CEST44364703142.251.40.206192.168.2.6
                                                                  Aug 30, 2024 00:16:44.228477955 CEST64703443192.168.2.6142.251.40.206
                                                                  Aug 30, 2024 00:16:44.307077885 CEST44364703142.251.40.206192.168.2.6
                                                                  Aug 30, 2024 00:16:44.316715956 CEST44364703142.251.40.206192.168.2.6
                                                                  Aug 30, 2024 00:16:44.316993952 CEST64703443192.168.2.6142.251.40.206
                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                  Aug 30, 2024 00:15:00.724415064 CEST192.168.2.61.1.1.10x11e5Standard query (0)bzib.nelreports.netA (IP address)IN (0x0001)false
                                                                  Aug 30, 2024 00:15:00.724574089 CEST192.168.2.61.1.1.10xdd15Standard query (0)bzib.nelreports.net65IN (0x0001)false
                                                                  Aug 30, 2024 00:15:04.571816921 CEST192.168.2.61.1.1.10x4afdStandard query (0)chrome.cloudflare-dns.comA (IP address)IN (0x0001)false
                                                                  Aug 30, 2024 00:15:04.572098017 CEST192.168.2.61.1.1.10x2fd6Standard query (0)chrome.cloudflare-dns.com65IN (0x0001)false
                                                                  Aug 30, 2024 00:15:04.572767019 CEST192.168.2.61.1.1.10xedcbStandard query (0)chrome.cloudflare-dns.comA (IP address)IN (0x0001)false
                                                                  Aug 30, 2024 00:15:04.572921991 CEST192.168.2.61.1.1.10xcaaeStandard query (0)chrome.cloudflare-dns.com65IN (0x0001)false
                                                                  Aug 30, 2024 00:15:04.573523998 CEST192.168.2.61.1.1.10x6346Standard query (0)chrome.cloudflare-dns.comA (IP address)IN (0x0001)false
                                                                  Aug 30, 2024 00:15:04.573657990 CEST192.168.2.61.1.1.10xe5fbStandard query (0)chrome.cloudflare-dns.com65IN (0x0001)false
                                                                  Aug 30, 2024 00:15:04.574517965 CEST192.168.2.61.1.1.10x1984Standard query (0)chrome.cloudflare-dns.comA (IP address)IN (0x0001)false
                                                                  Aug 30, 2024 00:15:04.574958086 CEST192.168.2.61.1.1.10x23a0Standard query (0)chrome.cloudflare-dns.com65IN (0x0001)false
                                                                  Aug 30, 2024 00:15:04.765026093 CEST192.168.2.61.1.1.10x1954Standard query (0)chrome.cloudflare-dns.comA (IP address)IN (0x0001)false
                                                                  Aug 30, 2024 00:15:04.765259027 CEST192.168.2.61.1.1.10xfd89Standard query (0)chrome.cloudflare-dns.com65IN (0x0001)false
                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                  Aug 30, 2024 00:15:00.733526945 CEST1.1.1.1192.168.2.60x11e5No error (0)bzib.nelreports.netbzib.nelreports.net.akamaized.netCNAME (Canonical name)IN (0x0001)false
                                                                  Aug 30, 2024 00:15:00.734010935 CEST1.1.1.1192.168.2.60xdd15No error (0)bzib.nelreports.netbzib.nelreports.net.akamaized.netCNAME (Canonical name)IN (0x0001)false
                                                                  Aug 30, 2024 00:15:03.190998077 CEST1.1.1.1192.168.2.60xc85bNo error (0)shed.dual-low.s-part-0032.t-0009.t-msedge.nets-part-0032.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                                  Aug 30, 2024 00:15:03.190998077 CEST1.1.1.1192.168.2.60xc85bNo error (0)s-part-0032.t-0009.t-msedge.net13.107.246.60A (IP address)IN (0x0001)false
                                                                  Aug 30, 2024 00:15:04.580537081 CEST1.1.1.1192.168.2.60x2fd6No error (0)chrome.cloudflare-dns.com65IN (0x0001)false
                                                                  Aug 30, 2024 00:15:04.580564976 CEST1.1.1.1192.168.2.60x4afdNo error (0)chrome.cloudflare-dns.com162.159.61.3A (IP address)IN (0x0001)false
                                                                  Aug 30, 2024 00:15:04.580564976 CEST1.1.1.1192.168.2.60x4afdNo error (0)chrome.cloudflare-dns.com172.64.41.3A (IP address)IN (0x0001)false
                                                                  Aug 30, 2024 00:15:04.581064939 CEST1.1.1.1192.168.2.60xedcbNo error (0)chrome.cloudflare-dns.com172.64.41.3A (IP address)IN (0x0001)false
                                                                  Aug 30, 2024 00:15:04.581064939 CEST1.1.1.1192.168.2.60xedcbNo error (0)chrome.cloudflare-dns.com162.159.61.3A (IP address)IN (0x0001)false
                                                                  Aug 30, 2024 00:15:04.581135035 CEST1.1.1.1192.168.2.60xcaaeNo error (0)chrome.cloudflare-dns.com65IN (0x0001)false
                                                                  Aug 30, 2024 00:15:04.581707001 CEST1.1.1.1192.168.2.60x6346No error (0)chrome.cloudflare-dns.com172.64.41.3A (IP address)IN (0x0001)false
                                                                  Aug 30, 2024 00:15:04.581707001 CEST1.1.1.1192.168.2.60x6346No error (0)chrome.cloudflare-dns.com162.159.61.3A (IP address)IN (0x0001)false
                                                                  Aug 30, 2024 00:15:04.581728935 CEST1.1.1.1192.168.2.60xe5fbNo error (0)chrome.cloudflare-dns.com65IN (0x0001)false
                                                                  Aug 30, 2024 00:15:04.583314896 CEST1.1.1.1192.168.2.60x1984No error (0)chrome.cloudflare-dns.com172.64.41.3A (IP address)IN (0x0001)false
                                                                  Aug 30, 2024 00:15:04.583314896 CEST1.1.1.1192.168.2.60x1984No error (0)chrome.cloudflare-dns.com162.159.61.3A (IP address)IN (0x0001)false
                                                                  Aug 30, 2024 00:15:04.583339930 CEST1.1.1.1192.168.2.60x23a0No error (0)chrome.cloudflare-dns.com65IN (0x0001)false
                                                                  Aug 30, 2024 00:15:04.773917913 CEST1.1.1.1192.168.2.60x1954No error (0)chrome.cloudflare-dns.com162.159.61.3A (IP address)IN (0x0001)false
                                                                  Aug 30, 2024 00:15:04.773917913 CEST1.1.1.1192.168.2.60x1954No error (0)chrome.cloudflare-dns.com172.64.41.3A (IP address)IN (0x0001)false
                                                                  Aug 30, 2024 00:15:04.774051905 CEST1.1.1.1192.168.2.60xfd89No error (0)chrome.cloudflare-dns.com65IN (0x0001)false
                                                                  • edgeassetservice.azureedge.net
                                                                  • fs.microsoft.com
                                                                  • chrome.cloudflare-dns.com
                                                                  • https:
                                                                    • www.google.com
                                                                  • slscr.update.microsoft.com
                                                                  • bzib.nelreports.net
                                                                  Session IDSource IPSource PortDestination IPDestination Port
                                                                  0192.168.2.64971040.113.110.67443
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-08-29 22:14:51 UTC70OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 34 0d 0a 4d 53 2d 43 56 3a 20 4d 65 42 51 46 64 4e 32 50 30 6d 36 54 37 37 4c 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 33 65 64 61 38 61 35 38 64 39 37 35 30 37 38 0d 0a 0d 0a
                                                                  Data Ascii: CNT 1 CON 304MS-CV: MeBQFdN2P0m6T77L.1Context: 3eda8a58d975078
                                                                  2024-08-29 22:14:51 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                                                  2024-08-29 22:14:51 UTC1083OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 30 0d 0a 4d 53 2d 43 56 3a 20 4d 65 42 51 46 64 4e 32 50 30 6d 36 54 37 37 4c 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 33 65 64 61 38 61 35 38 64 39 37 35 30 37 38 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 57 77 41 4e 2f 69 2f 4f 2f 4f 53 4b 48 2b 67 32 2b 51 57 4b 51 5a 36 41 37 38 49 66 58 63 6a 33 5a 66 4c 4f 32 75 49 72 63 2f 4d 77 51 6d 6d 31 41 6a 41 45 6f 2f 66 68 68 78 69 46 39 41 76 5a 68 46 76 61 4b 47 75 52 32 4d 61 6b 77 48 58 7a 6a 65 41 61 34 52 7a 54 57 39 4f 79 6c 4e 69 6a 6a 49 6b 6f 41 6d 36 33 59 35 61 44 70 6b
                                                                  Data Ascii: ATH 2 CON\DEVICE 1060MS-CV: MeBQFdN2P0m6T77L.2Context: 3eda8a58d975078<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAWwAN/i/O/OSKH+g2+QWKQZ6A78IfXcj3ZfLO2uIrc/MwQmm1AjAEo/fhhxiF9AvZhFvaKGuR2MakwHXzjeAa4RzTW9OylNijjIkoAm63Y5aDpk
                                                                  2024-08-29 22:14:51 UTC73OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 51 4f 53 20 35 35 0d 0a 4d 53 2d 43 56 3a 20 4d 65 42 51 46 64 4e 32 50 30 6d 36 54 37 37 4c 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 33 65 64 61 38 61 35 38 64 39 37 35 30 37 38 0d 0a 0d 0a
                                                                  Data Ascii: BND 3 CON\QOS 55MS-CV: MeBQFdN2P0m6T77L.3Context: 3eda8a58d975078
                                                                  2024-08-29 22:14:52 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                                                  Data Ascii: 202 1 CON 58
                                                                  2024-08-29 22:14:52 UTC58INData Raw: 4d 53 2d 43 56 3a 20 57 39 47 49 51 30 2f 53 74 45 57 2b 62 76 49 4b 6e 45 62 5a 43 77 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                                                  Data Ascii: MS-CV: W9GIQ0/StEW+bvIKnEbZCw.0Payload parsing failed.


                                                                  Session IDSource IPSource PortDestination IPDestination Port
                                                                  1192.168.2.64971940.113.110.67443
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-08-29 22:15:00 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 57 79 78 76 59 6f 58 57 56 6b 4f 51 66 67 68 30 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 64 37 39 31 38 64 31 35 63 63 63 35 39 66 39 0d 0a 0d 0a
                                                                  Data Ascii: CNT 1 CON 305MS-CV: WyxvYoXWVkOQfgh0.1Context: ad7918d15ccc59f9
                                                                  2024-08-29 22:15:00 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                                                  2024-08-29 22:15:00 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 57 79 78 76 59 6f 58 57 56 6b 4f 51 66 67 68 30 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 64 37 39 31 38 64 31 35 63 63 63 35 39 66 39 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 57 77 41 4e 2f 69 2f 4f 2f 4f 53 4b 48 2b 67 32 2b 51 57 4b 51 5a 36 41 37 38 49 66 58 63 6a 33 5a 66 4c 4f 32 75 49 72 63 2f 4d 77 51 6d 6d 31 41 6a 41 45 6f 2f 66 68 68 78 69 46 39 41 76 5a 68 46 76 61 4b 47 75 52 32 4d 61 6b 77 48 58 7a 6a 65 41 61 34 52 7a 54 57 39 4f 79 6c 4e 69 6a 6a 49 6b 6f 41 6d 36 33 59 35 61 44 70
                                                                  Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: WyxvYoXWVkOQfgh0.2Context: ad7918d15ccc59f9<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAWwAN/i/O/OSKH+g2+QWKQZ6A78IfXcj3ZfLO2uIrc/MwQmm1AjAEo/fhhxiF9AvZhFvaKGuR2MakwHXzjeAa4RzTW9OylNijjIkoAm63Y5aDp
                                                                  2024-08-29 22:15:00 UTC74OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 51 4f 53 20 35 36 0d 0a 4d 53 2d 43 56 3a 20 57 79 78 76 59 6f 58 57 56 6b 4f 51 66 67 68 30 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 64 37 39 31 38 64 31 35 63 63 63 35 39 66 39 0d 0a 0d 0a
                                                                  Data Ascii: BND 3 CON\QOS 56MS-CV: WyxvYoXWVkOQfgh0.3Context: ad7918d15ccc59f9
                                                                  2024-08-29 22:15:01 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                                                  Data Ascii: 202 1 CON 58
                                                                  2024-08-29 22:15:01 UTC58INData Raw: 4d 53 2d 43 56 3a 20 6c 6f 52 67 44 6d 72 73 32 30 6d 57 32 69 46 30 59 76 69 35 68 41 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                                                  Data Ascii: MS-CV: loRgDmrs20mW2iF0Yvi5hA.0Payload parsing failed.


                                                                  Session IDSource IPSource PortDestination IPDestination Port
                                                                  2192.168.2.64972040.113.110.67443
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-08-29 22:15:01 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 6a 43 37 38 68 2f 78 75 2f 30 75 50 66 57 59 45 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 35 31 63 39 39 62 31 61 65 37 39 38 31 35 34 35 0d 0a 0d 0a
                                                                  Data Ascii: CNT 1 CON 305MS-CV: jC78h/xu/0uPfWYE.1Context: 51c99b1ae7981545
                                                                  2024-08-29 22:15:01 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                                                  2024-08-29 22:15:01 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 6a 43 37 38 68 2f 78 75 2f 30 75 50 66 57 59 45 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 35 31 63 39 39 62 31 61 65 37 39 38 31 35 34 35 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 57 77 41 4e 2f 69 2f 4f 2f 4f 53 4b 48 2b 67 32 2b 51 57 4b 51 5a 36 41 37 38 49 66 58 63 6a 33 5a 66 4c 4f 32 75 49 72 63 2f 4d 77 51 6d 6d 31 41 6a 41 45 6f 2f 66 68 68 78 69 46 39 41 76 5a 68 46 76 61 4b 47 75 52 32 4d 61 6b 77 48 58 7a 6a 65 41 61 34 52 7a 54 57 39 4f 79 6c 4e 69 6a 6a 49 6b 6f 41 6d 36 33 59 35 61 44 70
                                                                  Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: jC78h/xu/0uPfWYE.2Context: 51c99b1ae7981545<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAWwAN/i/O/OSKH+g2+QWKQZ6A78IfXcj3ZfLO2uIrc/MwQmm1AjAEo/fhhxiF9AvZhFvaKGuR2MakwHXzjeAa4RzTW9OylNijjIkoAm63Y5aDp
                                                                  2024-08-29 22:15:01 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 6a 43 37 38 68 2f 78 75 2f 30 75 50 66 57 59 45 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 35 31 63 39 39 62 31 61 65 37 39 38 31 35 34 35 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                                                  Data Ascii: BND 3 CON\WNS 0 197MS-CV: jC78h/xu/0uPfWYE.3Context: 51c99b1ae7981545<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                                                  2024-08-29 22:15:01 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                                                  Data Ascii: 202 1 CON 58
                                                                  2024-08-29 22:15:01 UTC58INData Raw: 4d 53 2d 43 56 3a 20 63 38 36 54 4e 41 4b 6d 59 45 4f 36 70 50 75 6a 32 71 41 78 79 67 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                                                  Data Ascii: MS-CV: c86TNAKmYEO6pPuj2qAxyg.0Payload parsing failed.


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  3192.168.2.649728184.28.90.27443
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-08-29 22:15:03 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  Accept-Encoding: identity
                                                                  User-Agent: Microsoft BITS/7.8
                                                                  Host: fs.microsoft.com
                                                                  2024-08-29 22:15:03 UTC467INHTTP/1.1 200 OK
                                                                  Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                                                                  Content-Type: application/octet-stream
                                                                  ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                                                                  Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                                                                  Server: ECAcc (lpl/EF06)
                                                                  X-CID: 11
                                                                  X-Ms-ApiVersion: Distribute 1.2
                                                                  X-Ms-Region: prod-weu-z1
                                                                  Cache-Control: public, max-age=127310
                                                                  Date: Thu, 29 Aug 2024 22:15:03 GMT
                                                                  Connection: close
                                                                  X-CID: 2


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  4192.168.2.64973213.107.246.604433268C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-08-29 22:15:03 UTC486OUTGET /assets/arbitration_priority_list/4.0.5/asset?assetgroup=ArbitrationService HTTP/1.1
                                                                  Host: edgeassetservice.azureedge.net
                                                                  Connection: keep-alive
                                                                  Edge-Asset-Group: ArbitrationService
                                                                  Sec-Fetch-Site: none
                                                                  Sec-Fetch-Mode: no-cors
                                                                  Sec-Fetch-Dest: empty
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.55
                                                                  Accept-Encoding: gzip, deflate, br
                                                                  Accept-Language: en-GB,en;q=0.9,en-US;q=0.8
                                                                  2024-08-29 22:15:04 UTC559INHTTP/1.1 200 OK
                                                                  Date: Thu, 29 Aug 2024 22:15:03 GMT
                                                                  Content-Type: application/octet-stream
                                                                  Content-Length: 11989
                                                                  Connection: close
                                                                  Last-Modified: Fri, 23 Aug 2024 00:10:35 GMT
                                                                  ETag: 0x8DCC30802EF150E
                                                                  x-ms-request-id: 903262f1-801e-001b-4826-f94695000000
                                                                  x-ms-version: 2009-09-19
                                                                  x-ms-lease-status: unlocked
                                                                  x-ms-blob-type: BlockBlob
                                                                  x-azure-ref: 20240829T221503Z-16579567576h9nndaeer0cv35w00000002e0000000004t3u
                                                                  Cache-Control: public, max-age=604800
                                                                  x-fd-int-roxy-purgeid: 69316365
                                                                  X-Cache: TCP_HIT
                                                                  X-Cache-Info: L1_T2
                                                                  Accept-Ranges: bytes
                                                                  2024-08-29 22:15:04 UTC11989INData Raw: 7b 0d 0a 20 20 22 63 6f 6e 66 69 67 56 65 72 73 69 6f 6e 22 3a 20 33 32 2c 0d 0a 20 20 22 50 72 69 76 69 6c 65 67 65 64 45 78 70 65 72 69 65 6e 63 65 73 22 3a 20 5b 0d 0a 20 20 20 20 22 53 68 6f 72 65 6c 69 6e 65 50 72 69 76 69 6c 65 67 65 64 45 78 70 65 72 69 65 6e 63 65 49 44 22 2c 0d 0a 20 20 20 20 22 53 48 4f 50 50 49 4e 47 5f 41 55 54 4f 5f 53 48 4f 57 5f 43 4f 55 50 4f 4e 53 5f 43 48 45 43 4b 4f 55 54 22 2c 0d 0a 20 20 20 20 22 53 48 4f 50 50 49 4e 47 5f 41 55 54 4f 5f 53 48 4f 57 5f 4c 4f 57 45 52 5f 50 52 49 43 45 5f 46 4f 55 4e 44 22 2c 0d 0a 20 20 20 20 22 53 48 4f 50 50 49 4e 47 5f 41 55 54 4f 5f 53 48 4f 57 5f 42 49 4e 47 5f 53 45 41 52 43 48 22 2c 0d 0a 20 20 20 20 22 53 48 4f 50 50 49 4e 47 5f 41 55 54 4f 5f 53 48 4f 57 5f 52 45 42 41 54 45
                                                                  Data Ascii: { "configVersion": 32, "PrivilegedExperiences": [ "ShorelinePrivilegedExperienceID", "SHOPPING_AUTO_SHOW_COUPONS_CHECKOUT", "SHOPPING_AUTO_SHOW_LOWER_PRICE_FOUND", "SHOPPING_AUTO_SHOW_BING_SEARCH", "SHOPPING_AUTO_SHOW_REBATE


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  5192.168.2.64973313.107.246.604433268C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-08-29 22:15:04 UTC711OUTGET /assets/domains_config_gz/2.8.76/asset?assetgroup=EntityExtractionDomainsConfig HTTP/1.1
                                                                  Host: edgeassetservice.azureedge.net
                                                                  Connection: keep-alive
                                                                  Edge-Asset-Group: EntityExtractionDomainsConfig
                                                                  Sec-Mesh-Client-Edge-Version: 117.0.2045.55
                                                                  Sec-Mesh-Client-Edge-Channel: stable
                                                                  Sec-Mesh-Client-OS: Windows
                                                                  Sec-Mesh-Client-OS-Version: 10.0.19045
                                                                  Sec-Mesh-Client-Arch: x86_64
                                                                  Sec-Mesh-Client-WebView: 0
                                                                  Sec-Fetch-Site: none
                                                                  Sec-Fetch-Mode: no-cors
                                                                  Sec-Fetch-Dest: empty
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.55
                                                                  Accept-Encoding: gzip, deflate, br
                                                                  Accept-Language: en-GB,en;q=0.9,en-US;q=0.8
                                                                  2024-08-29 22:15:04 UTC583INHTTP/1.1 200 OK
                                                                  Date: Thu, 29 Aug 2024 22:15:04 GMT
                                                                  Content-Type: application/octet-stream
                                                                  Content-Length: 70207
                                                                  Connection: close
                                                                  Content-Encoding: gzip
                                                                  Last-Modified: Fri, 02 Aug 2024 18:10:35 GMT
                                                                  ETag: 0x8DCB31E67C22927
                                                                  x-ms-request-id: 66f87118-601e-001a-2116-f94768000000
                                                                  x-ms-version: 2009-09-19
                                                                  x-ms-lease-status: unlocked
                                                                  x-ms-blob-type: BlockBlob
                                                                  x-azure-ref: 20240829T221504Z-165795675767hwjqv3v00bvq3400000002h000000000gnrg
                                                                  Cache-Control: public, max-age=604800
                                                                  x-fd-int-roxy-purgeid: 69316365
                                                                  X-Cache: TCP_HIT
                                                                  X-Cache-Info: L1_T2
                                                                  Accept-Ranges: bytes
                                                                  2024-08-29 22:15:04 UTC15801INData Raw: 1f 8b 08 08 1a 21 ad 66 02 ff 61 73 73 65 74 00 ec bd 0b 97 db 36 b2 30 f8 57 b2 b9 33 b3 dd 89 d5 d6 5b dd d9 cd fa f4 d3 f1 f8 39 6d 3b 19 db f1 d5 01 49 48 a2 45 91 0c 1f 6a ab c3 be bf 7d 0b 05 80 00 08 50 52 db ce 77 ef b7 67 67 9c 16 09 14 0a 40 a1 50 a8 2a 14 c0 3f bf f7 93 78 16 ce bf ff e9 bb 3f bf 2f 92 25 8d a7 51 b8 0a 0b 78 ef 8d bb dd 07 df 7d 9f 92 39 9d fa 65 91 cc 66 90 38 1c f4 59 62 40 67 a4 8c 8a 69 94 f8 24 a2 d3 15 49 11 81 c7 f0 c0 df 0e 3c 00 94 97 e3 6b de f1 08 7b a5 11 7b a5 51 67 9e e1 6b 8c af 71 a7 cc f1 15 81 69 de 59 7d c6 d7 02 5f 8b 0e a5 ec d5 c7 5c 3f ef f8 b7 ec 35 20 ec 35 20 9d 60 89 af 14 5f 69 27 40 e0 19 e6 ce 48 27 c4 8a 66 21 be 86 1d 78 60 af 19 be 66 9d 19 e6 2e b0 ec 82 76 c2 08 5f 31 77 91 75 16 3c b7 c4 d7
                                                                  Data Ascii: !fasset60W3[9m;IHEj}PRwgg@P*?x?/%Qx}9ef8Yb@gi$I<k{{QgkqiY}_\?5 5 `_i'@H'f!x`f.v_1wu<
                                                                  2024-08-29 22:15:04 UTC16384INData Raw: 4a b0 09 cb 82 45 ac c5 f3 e8 07 bb 82 71 ba da 2a 0b c7 62 2c 30 96 c2 52 09 74 65 c0 2a 8a c3 88 95 9c 7c 3e a9 79 09 d4 fa 9a 9f 30 4a 49 28 2b d7 97 ff 7a 7b f9 fa cd f4 c9 05 68 2b 37 9c c1 08 01 cb 2f 28 f3 02 34 de 08 0c a6 34 da 38 c6 ec 48 27 33 28 96 9f 45 d9 4f 9f 12 f7 54 d2 47 a6 39 87 08 81 e9 6d 4f c1 43 97 10 bf ad 59 55 67 39 13 fe 1e 05 67 65 16 87 6c 9b f5 cb 90 60 eb 3d ea 25 09 33 8b f9 4a fb 10 ef 11 3b 7c e8 61 60 14 a0 60 b9 7c 16 e7 69 54 b1 c3 22 c0 e0 29 df c2 05 4c 8f bc f0 67 5e 04 75 33 51 9a b7 e1 61 1a 61 48 f5 c3 30 f7 62 91 d5 a8 34 39 2a 97 ff 2d f5 aa c1 c2 6c 78 e0 35 33 d1 42 b3 75 c4 be 3b f4 d0 68 83 51 a7 81 2d a0 ff 0d 5d 10 62 ed 7f 55 a5 99 9f 25 2b 2f a4 4d 09 21 65 43 c7 04 cf 93 19 f3 c1 d0 b6 e9 14 38 59 31
                                                                  Data Ascii: JEq*b,0Rte*|>y0JI(+z{h+7/(448H'3(EOTG9mOCYUg9gel`=%3J;|a``|iT")Lg^u3QaaH0b49*-lx53Bu;hQ-]bU%+/M!eC8Y1
                                                                  2024-08-29 22:15:04 UTC16384INData Raw: 2f 4d 35 19 b9 3f d5 c1 f4 52 a7 67 b3 99 ff bc b7 c2 8e 7c d3 4d 9a a5 bf dc f0 20 15 b1 bc 1f 82 9a 8d 98 a7 af db 80 6b 74 e7 ab 7c e6 18 7d 9a 2b 3e 34 2d 1a e7 c0 d5 e8 b4 a0 0e d4 7d 19 bb 69 52 58 a2 33 32 78 db 4b 2d cd 54 dd d2 2b 9c a0 29 69 1a ba 4a ee 0a 4d 33 5a 7b a7 1a 83 5f f3 f7 fe 2c 2f 84 3b 39 d0 56 82 ef 75 a4 f3 69 57 af 58 09 8c 2a 1d 24 b9 4e 6b cf 63 d0 74 99 e3 02 0f 26 7f 1a 86 a9 a8 69 fa 5a d8 25 83 c1 ea f8 fd 12 62 16 86 38 17 5a 19 6f 13 03 00 e6 6a 07 a4 40 be bb 20 de a6 de bf d1 06 75 32 1f c3 4f 67 41 ad 31 bd b0 9c ee 44 47 33 2a 92 9c d3 f6 35 64 a9 b1 d3 f6 b1 c7 a7 b4 80 af ea c1 2a 6c dd 81 a0 0b 67 ca d2 b2 11 7c 8d dc 39 47 56 d1 bd 08 e8 ec 3e 4f c9 56 d6 7a d3 9a 56 4d 17 50 41 9b 17 9b 37 36 da 2e 7c a4 ba 63
                                                                  Data Ascii: /M5?Rg|M kt|}+>4-}iRX32xK-T+)iJM3Z{_,/;9VuiWX*$Nkct&iZ%b8Zoj@ u2OgA1DG3*5d*lg|9GV>OVzVMPA76.|c
                                                                  2024-08-29 22:15:04 UTC16384INData Raw: 99 dc 5a 2e 69 cf 52 41 9e 48 c8 71 d7 39 94 dd f7 b6 3f 2a 48 d1 b5 2e 37 a4 97 5f 43 54 c9 8d d7 76 7a 14 e4 6f 3b 80 f7 6a 61 e8 6f 47 e9 2d cb 60 84 66 2b c0 b9 77 09 1b c0 32 5c aa 6c 0e 25 81 ed a0 5e 61 25 37 6f 3c a5 bc 1f 04 1a dd b1 04 1d c9 73 16 3a 58 a8 69 4d 12 c1 5e e9 66 5f 14 6c e4 9e d4 61 25 e1 2f c3 fc b8 ed df 80 5d 2b 3a 5b 4c 56 c9 72 1f 59 1d 6a 72 0b d2 b0 4c 8e d5 67 db 16 79 41 90 65 4f 4b 68 63 f6 d1 e5 db b6 6a 18 e6 ca 5f 04 79 2e 71 69 5d 0e 19 cc d9 f6 58 27 58 af 1c 18 04 f1 98 d2 bf 15 1e 37 ce e0 1e 88 54 83 3c 82 f8 a8 05 5f b0 1b 3f 2f 02 8f 31 a4 e9 1d ed 45 e6 e4 85 e6 b9 66 4c fd cd 8d e4 58 f7 79 73 8b 47 40 25 b6 0d 7f 78 ff a8 fe e7 7d 69 4a fc 00 c7 b0 37 a9 44 f0 40 1e e8 bd 41 8a b4 0a 5d 5a 2c 0e 60 f7 fb 81
                                                                  Data Ascii: Z.iRAHq9?*H.7_CTvzo;jaoG-`f+w2\l%^a%7o<s:XiM^f_la%/]+:[LVrYjrLgyAeOKhcj_y.qi]X'X7T<_?/1EfLXysG@%x}iJ7D@A]Z,`
                                                                  2024-08-29 22:15:04 UTC5254INData Raw: 29 50 5f 50 34 9a d3 9a 2a 83 ab 27 93 58 c5 2b d2 9c af 2b 4e 0f 79 ac a9 56 57 20 b1 61 ca d2 f5 ed 38 df 10 b9 60 88 4c 48 ac b1 cd 10 b5 8f 76 49 19 f2 b6 d5 54 1d d1 9c b1 20 7a d3 64 f7 91 a2 0c 4d 73 6d e0 da be ee e6 87 03 9f 5e f7 4f 98 9c 12 cd 88 68 4c 2e b1 48 00 60 c3 31 74 31 8d 87 b4 32 56 02 4f bf e1 a9 3b c0 40 d6 24 8e 10 55 c7 c3 e7 8c f3 78 28 78 d3 94 de b0 5a 4d 22 eb 28 5c 22 00 98 8e 15 1a f8 ab ac 54 f4 5d 80 d0 a5 aa 6e 87 83 fd d6 f1 b0 c0 82 f7 f4 5e ef 2f 2b b8 62 a2 13 a1 4d ae 60 cf 59 3c b1 b1 f4 40 4d 41 74 7c ac 2c 5a 9e ef f4 d2 81 6d 69 e1 d3 8b 73 2c 84 2c 06 37 fd 72 38 10 a5 b2 13 51 f1 a0 a2 06 7d 3f 89 8f 72 35 a0 58 a0 46 79 2f b7 1f cc 57 92 ec c8 b4 b5 f2 5c 65 e7 30 5a 93 e3 b1 8e 5f f5 91 44 87 44 19 1d 59 83
                                                                  Data Ascii: )P_P4*'X++NyVW a8`LHvIT zdMsm^OhL.H`1t12VO;@$Ux(xZM"(\"T]n^/+bM`Y<@MAt|,Zmis,,7r8Q}?r5XFy/W\e0Z_DDY


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  6192.168.2.649734184.28.90.27443
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-08-29 22:15:04 UTC239OUTGET /fs/windows/config.json HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  Accept-Encoding: identity
                                                                  If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
                                                                  Range: bytes=0-2147483646
                                                                  User-Agent: Microsoft BITS/7.8
                                                                  Host: fs.microsoft.com
                                                                  2024-08-29 22:15:04 UTC515INHTTP/1.1 200 OK
                                                                  ApiVersion: Distribute 1.1
                                                                  Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                                                                  Content-Type: application/octet-stream
                                                                  ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                                                                  Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                                                                  Server: ECAcc (lpl/EF06)
                                                                  X-CID: 11
                                                                  X-Ms-ApiVersion: Distribute 1.2
                                                                  X-Ms-Region: prod-weu-z1
                                                                  Cache-Control: public, max-age=127262
                                                                  Date: Thu, 29 Aug 2024 22:15:04 GMT
                                                                  Content-Length: 55
                                                                  Connection: close
                                                                  X-CID: 2
                                                                  2024-08-29 22:15:04 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
                                                                  Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  7192.168.2.649739172.64.41.34433268C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-08-29 22:15:05 UTC245OUTPOST /dns-query HTTP/1.1
                                                                  Host: chrome.cloudflare-dns.com
                                                                  Connection: keep-alive
                                                                  Content-Length: 128
                                                                  Accept: application/dns-message
                                                                  Accept-Language: *
                                                                  User-Agent: Chrome
                                                                  Accept-Encoding: identity
                                                                  Content-Type: application/dns-message
                                                                  2024-08-29 22:15:05 UTC128OUTData Raw: 00 00 01 00 00 01 00 00 00 00 00 01 03 77 77 77 07 67 73 74 61 74 69 63 03 63 6f 6d 00 00 01 00 01 00 00 29 10 00 00 00 00 00 00 54 00 0c 00 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                  Data Ascii: wwwgstaticcom)TP
                                                                  2024-08-29 22:15:05 UTC247INHTTP/1.1 200 OK
                                                                  Server: cloudflare
                                                                  Date: Thu, 29 Aug 2024 22:15:05 GMT
                                                                  Content-Type: application/dns-message
                                                                  Connection: close
                                                                  Access-Control-Allow-Origin: *
                                                                  Content-Length: 468
                                                                  CF-RAY: 8bafe5d11d3d9e05-EWR
                                                                  alt-svc: h3=":443"; ma=86400
                                                                  2024-08-29 22:15:05 UTC468INData Raw: 00 00 81 80 00 01 00 01 00 00 00 01 03 77 77 77 07 67 73 74 61 74 69 63 03 63 6f 6d 00 00 01 00 01 c0 0c 00 01 00 01 00 00 00 71 00 04 8e fb 28 c3 00 00 29 04 d0 00 00 00 00 01 98 00 0c 01 94 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                  Data Ascii: wwwgstaticcomq()


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  8192.168.2.649740172.64.41.34433268C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-08-29 22:15:05 UTC245OUTPOST /dns-query HTTP/1.1
                                                                  Host: chrome.cloudflare-dns.com
                                                                  Connection: keep-alive
                                                                  Content-Length: 128
                                                                  Accept: application/dns-message
                                                                  Accept-Language: *
                                                                  User-Agent: Chrome
                                                                  Accept-Encoding: identity
                                                                  Content-Type: application/dns-message
                                                                  2024-08-29 22:15:05 UTC128OUTData Raw: 00 00 01 00 00 01 00 00 00 00 00 01 03 77 77 77 07 67 73 74 61 74 69 63 03 63 6f 6d 00 00 01 00 01 00 00 29 10 00 00 00 00 00 00 54 00 0c 00 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                  Data Ascii: wwwgstaticcom)TP
                                                                  2024-08-29 22:15:05 UTC247INHTTP/1.1 200 OK
                                                                  Server: cloudflare
                                                                  Date: Thu, 29 Aug 2024 22:15:05 GMT
                                                                  Content-Type: application/dns-message
                                                                  Connection: close
                                                                  Access-Control-Allow-Origin: *
                                                                  Content-Length: 468
                                                                  CF-RAY: 8bafe5d12ac843f8-EWR
                                                                  alt-svc: h3=":443"; ma=86400
                                                                  2024-08-29 22:15:05 UTC468INData Raw: 00 00 81 80 00 01 00 01 00 00 00 01 03 77 77 77 07 67 73 74 61 74 69 63 03 63 6f 6d 00 00 01 00 01 c0 0c 00 01 00 01 00 00 00 ce 00 04 8e fa 50 63 00 00 29 04 d0 00 00 00 00 01 98 00 0c 01 94 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                  Data Ascii: wwwgstaticcomPc)


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  9192.168.2.649741172.64.41.34433268C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-08-29 22:15:05 UTC245OUTPOST /dns-query HTTP/1.1
                                                                  Host: chrome.cloudflare-dns.com
                                                                  Connection: keep-alive
                                                                  Content-Length: 128
                                                                  Accept: application/dns-message
                                                                  Accept-Language: *
                                                                  User-Agent: Chrome
                                                                  Accept-Encoding: identity
                                                                  Content-Type: application/dns-message
                                                                  2024-08-29 22:15:05 UTC128OUTData Raw: 00 00 01 00 00 01 00 00 00 00 00 01 03 77 77 77 07 67 73 74 61 74 69 63 03 63 6f 6d 00 00 01 00 01 00 00 29 10 00 00 00 00 00 00 54 00 0c 00 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                  Data Ascii: wwwgstaticcom)TP
                                                                  2024-08-29 22:15:05 UTC247INHTTP/1.1 200 OK
                                                                  Server: cloudflare
                                                                  Date: Thu, 29 Aug 2024 22:15:05 GMT
                                                                  Content-Type: application/dns-message
                                                                  Connection: close
                                                                  Access-Control-Allow-Origin: *
                                                                  Content-Length: 468
                                                                  CF-RAY: 8bafe5d15b0dc35f-EWR
                                                                  alt-svc: h3=":443"; ma=86400
                                                                  2024-08-29 22:15:05 UTC468INData Raw: 00 00 81 80 00 01 00 01 00 00 00 01 03 77 77 77 07 67 73 74 61 74 69 63 03 63 6f 6d 00 00 01 00 01 c0 0c 00 01 00 01 00 00 00 f2 00 04 8e fb 23 a3 00 00 29 04 d0 00 00 00 00 01 98 00 0c 01 94 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                  Data Ascii: wwwgstaticcom#)


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  10192.168.2.649738162.159.61.34433268C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-08-29 22:15:05 UTC245OUTPOST /dns-query HTTP/1.1
                                                                  Host: chrome.cloudflare-dns.com
                                                                  Connection: keep-alive
                                                                  Content-Length: 128
                                                                  Accept: application/dns-message
                                                                  Accept-Language: *
                                                                  User-Agent: Chrome
                                                                  Accept-Encoding: identity
                                                                  Content-Type: application/dns-message
                                                                  2024-08-29 22:15:05 UTC128OUTData Raw: 00 00 01 00 00 01 00 00 00 00 00 01 03 77 77 77 07 67 73 74 61 74 69 63 03 63 6f 6d 00 00 01 00 01 00 00 29 10 00 00 00 00 00 00 54 00 0c 00 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                  Data Ascii: wwwgstaticcom)TP
                                                                  2024-08-29 22:15:05 UTC247INHTTP/1.1 200 OK
                                                                  Server: cloudflare
                                                                  Date: Thu, 29 Aug 2024 22:15:05 GMT
                                                                  Content-Type: application/dns-message
                                                                  Connection: close
                                                                  Access-Control-Allow-Origin: *
                                                                  Content-Length: 468
                                                                  CF-RAY: 8bafe5d13f6e8c8f-EWR
                                                                  alt-svc: h3=":443"; ma=86400
                                                                  2024-08-29 22:15:05 UTC468INData Raw: 00 00 81 80 00 01 00 01 00 00 00 01 03 77 77 77 07 67 73 74 61 74 69 63 03 63 6f 6d 00 00 01 00 01 c0 0c 00 01 00 01 00 00 01 26 00 04 8e fa 41 a3 00 00 29 04 d0 00 00 00 00 01 98 00 0c 01 94 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                  Data Ascii: wwwgstaticcom&A)


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  11192.168.2.649744162.159.61.34433268C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-08-29 22:15:05 UTC245OUTPOST /dns-query HTTP/1.1
                                                                  Host: chrome.cloudflare-dns.com
                                                                  Connection: keep-alive
                                                                  Content-Length: 128
                                                                  Accept: application/dns-message
                                                                  Accept-Language: *
                                                                  User-Agent: Chrome
                                                                  Accept-Encoding: identity
                                                                  Content-Type: application/dns-message
                                                                  2024-08-29 22:15:05 UTC128OUTData Raw: 00 00 01 00 00 01 00 00 00 00 00 01 03 77 77 77 07 67 73 74 61 74 69 63 03 63 6f 6d 00 00 01 00 01 00 00 29 10 00 00 00 00 00 00 54 00 0c 00 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                  Data Ascii: wwwgstaticcom)TP
                                                                  2024-08-29 22:15:05 UTC247INHTTP/1.1 200 OK
                                                                  Server: cloudflare
                                                                  Date: Thu, 29 Aug 2024 22:15:05 GMT
                                                                  Content-Type: application/dns-message
                                                                  Connection: close
                                                                  Access-Control-Allow-Origin: *
                                                                  Content-Length: 468
                                                                  CF-RAY: 8bafe5d23b361809-EWR
                                                                  alt-svc: h3=":443"; ma=86400
                                                                  2024-08-29 22:15:05 UTC468INData Raw: 00 00 81 80 00 01 00 01 00 00 00 01 03 77 77 77 07 67 73 74 61 74 69 63 03 63 6f 6d 00 00 01 00 01 c0 0c 00 01 00 01 00 00 00 f0 00 04 8e fa 50 43 00 00 29 04 d0 00 00 00 00 01 98 00 0c 01 94 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                  Data Ascii: wwwgstaticcomPC)


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  12192.168.2.649748142.251.35.1744433268C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-08-29 22:15:08 UTC567OUTOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                                  Host: play.google.com
                                                                  Connection: keep-alive
                                                                  Accept: */*
                                                                  Access-Control-Request-Method: POST
                                                                  Access-Control-Request-Headers: x-goog-authuser
                                                                  Origin: https://accounts.google.com
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.55
                                                                  Sec-Fetch-Mode: cors
                                                                  Sec-Fetch-Site: same-site
                                                                  Sec-Fetch-Dest: empty
                                                                  Referer: https://accounts.google.com/
                                                                  Accept-Encoding: gzip, deflate, br
                                                                  Accept-Language: en-GB,en;q=0.9
                                                                  2024-08-29 22:15:08 UTC520INHTTP/1.1 200 OK
                                                                  Access-Control-Allow-Origin: https://accounts.google.com
                                                                  Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                  Access-Control-Max-Age: 86400
                                                                  Access-Control-Allow-Credentials: true
                                                                  Access-Control-Allow-Headers: X-Playlog-Web,authorization,origin,x-goog-authuser
                                                                  Content-Type: text/plain; charset=UTF-8
                                                                  Date: Thu, 29 Aug 2024 22:15:08 GMT
                                                                  Server: Playlog
                                                                  Content-Length: 0
                                                                  X-XSS-Protection: 0
                                                                  X-Frame-Options: SAMEORIGIN
                                                                  Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                  Connection: close


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  13192.168.2.649747142.251.35.1744433268C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-08-29 22:15:08 UTC567OUTOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                                  Host: play.google.com
                                                                  Connection: keep-alive
                                                                  Accept: */*
                                                                  Access-Control-Request-Method: POST
                                                                  Access-Control-Request-Headers: x-goog-authuser
                                                                  Origin: https://accounts.google.com
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.55
                                                                  Sec-Fetch-Mode: cors
                                                                  Sec-Fetch-Site: same-site
                                                                  Sec-Fetch-Dest: empty
                                                                  Referer: https://accounts.google.com/
                                                                  Accept-Encoding: gzip, deflate, br
                                                                  Accept-Language: en-GB,en;q=0.9
                                                                  2024-08-29 22:15:08 UTC520INHTTP/1.1 200 OK
                                                                  Access-Control-Allow-Origin: https://accounts.google.com
                                                                  Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                  Access-Control-Max-Age: 86400
                                                                  Access-Control-Allow-Credentials: true
                                                                  Access-Control-Allow-Headers: X-Playlog-Web,authorization,origin,x-goog-authuser
                                                                  Content-Type: text/plain; charset=UTF-8
                                                                  Date: Thu, 29 Aug 2024 22:15:08 GMT
                                                                  Server: Playlog
                                                                  Content-Length: 0
                                                                  X-XSS-Protection: 0
                                                                  X-Frame-Options: SAMEORIGIN
                                                                  Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                  Connection: close


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  14192.168.2.649749142.250.65.1644433268C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-08-29 22:15:08 UTC887OUTGET /favicon.ico HTTP/1.1
                                                                  Host: www.google.com
                                                                  Connection: keep-alive
                                                                  sec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                                  sec-ch-ua-mobile: ?0
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.55
                                                                  sec-ch-ua-arch: "x86"
                                                                  sec-ch-ua-full-version: "117.0.2045.55"
                                                                  sec-ch-ua-platform-version: "10.0.0"
                                                                  sec-ch-ua-full-version-list: "Microsoft Edge";v="117.0.2045.55", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.150"
                                                                  sec-ch-ua-bitness: "64"
                                                                  sec-ch-ua-model: ""
                                                                  sec-ch-ua-wow64: ?0
                                                                  sec-ch-ua-platform: "Windows"
                                                                  Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
                                                                  Sec-Fetch-Site: same-site
                                                                  Sec-Fetch-Mode: no-cors
                                                                  Sec-Fetch-Dest: image
                                                                  Referer: https://accounts.google.com/
                                                                  Accept-Encoding: gzip, deflate, br
                                                                  Accept-Language: en-GB,en;q=0.9
                                                                  2024-08-29 22:15:08 UTC704INHTTP/1.1 200 OK
                                                                  Accept-Ranges: bytes
                                                                  Cross-Origin-Resource-Policy: cross-origin
                                                                  Cross-Origin-Opener-Policy-Report-Only: same-origin; report-to="static-on-bigtable"
                                                                  Report-To: {"group":"static-on-bigtable","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/static-on-bigtable"}]}
                                                                  Content-Length: 5430
                                                                  X-Content-Type-Options: nosniff
                                                                  Server: sffe
                                                                  X-XSS-Protection: 0
                                                                  Date: Thu, 29 Aug 2024 22:06:58 GMT
                                                                  Expires: Fri, 06 Sep 2024 22:06:58 GMT
                                                                  Cache-Control: public, max-age=691200
                                                                  Last-Modified: Tue, 22 Oct 2019 18:30:00 GMT
                                                                  Content-Type: image/x-icon
                                                                  Vary: Accept-Encoding
                                                                  Age: 490
                                                                  Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                  Connection: close
                                                                  2024-08-29 22:15:08 UTC686INData Raw: 00 00 01 00 02 00 10 10 00 00 01 00 20 00 68 04 00 00 26 00 00 00 20 20 00 00 01 00 20 00 a8 10 00 00 8e 04 00 00 28 00 00 00 10 00 00 00 20 00 00 00 01 00 20 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 30 fd fd fd 96 fd fd fd d8 fd fd fd f9 fd fd fd f9 fd fd fd d7 fd fd fd 94 fe fe fe 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd 99 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 95 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd c1 ff ff ff ff fa fd f9 ff b4 d9 a7 ff 76 ba 5d ff 58 ab 3a ff 58 aa 3a ff 72 b8 59 ff ac d5 9d ff f8 fb f6 ff ff
                                                                  Data Ascii: h& ( 0.v]X:X:rY
                                                                  2024-08-29 22:15:08 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d8 fd fd fd 99 ff ff ff ff 92 cf fb ff 37 52 ec ff 38 46 ea ff d0 d4 fa ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 96 fe fe fe 32 ff ff ff ff f9 f9 fe ff 56 62 ed ff 35 43 ea ff 3b 49 eb ff 95 9c f4 ff cf d2 fa ff d1 d4 fa ff 96 9d f4 ff 52 5e ed ff e1 e3 fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 30 00 00 00 00 fd fd fd 9d ff ff ff ff e8 ea fd ff 58 63 ee ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 6c 76 f0 ff ff ff ff ff ff ff ff ff fd fd fd 98 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd c3 ff ff ff ff f9 f9 fe ff a5 ac f6 ff 5d 69 ee ff 3c 4a eb
                                                                  Data Ascii: 7R8F2Vb5C;IR^0Xc5C5C5C5C5C5Clv]i<J
                                                                  2024-08-29 22:15:08 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff fd fd fd d0 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fd fd fd 8b ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff b1 d8 a3 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 60 a5 35 ff ca 8e 3e ff f9 c1 9f ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 87 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 25 fd fd fd fb ff ff ff ff ff ff ff ff ff ff ff ff c2 e0 b7 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 6e b6 54 ff 9f ce 8d ff b7 da aa ff b8 db ab ff a5 d2 95 ff 7b bc 64 ff 54 a8 35 ff 53 a8 34 ff 77 a0 37 ff e3 89 41 ff f4 85 42 ff f4 85 42 ff fc
                                                                  Data Ascii: S4S4S4S4S4S4S4S4S4S4S4S4S4S4`5>%S4S4S4S4S4S4nT{dT5S4w7ABB
                                                                  2024-08-29 22:15:08 UTC1390INData Raw: f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff fb d5 bf ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd ea fd fd fd cb ff ff ff ff ff ff ff ff ff ff ff ff 46 cd fc ff 05 bc fb ff 05 bc fb ff 05 bc fb ff 21 ae f9 ff fb fb ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd c8 fd fd fd 9c ff ff ff ff ff ff ff ff ff ff ff ff 86 df fd ff 05 bc fb ff 05 bc fb ff 15 93 f5 ff 34 49 eb ff b3 b8 f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                                  Data Ascii: BBBBBBF!4I
                                                                  2024-08-29 22:15:08 UTC574INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d2 fe fe fe 24 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd 8d fd fd fd fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd fb fd fd fd 8b fe fe fe 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 27 fd fd fd 9f fd fd fd f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                                  Data Ascii: $'


                                                                  Session IDSource IPSource PortDestination IPDestination Port
                                                                  15192.168.2.64975040.113.110.67443
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-08-29 22:15:09 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 2b 67 59 2b 47 45 78 68 57 55 57 39 58 69 65 70 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 39 37 39 38 37 66 31 33 62 34 34 30 64 64 64 0d 0a 0d 0a
                                                                  Data Ascii: CNT 1 CON 305MS-CV: +gY+GExhWUW9Xiep.1Context: a97987f13b440ddd
                                                                  2024-08-29 22:15:09 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                                                  2024-08-29 22:15:09 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 2b 67 59 2b 47 45 78 68 57 55 57 39 58 69 65 70 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 39 37 39 38 37 66 31 33 62 34 34 30 64 64 64 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 57 77 41 4e 2f 69 2f 4f 2f 4f 53 4b 48 2b 67 32 2b 51 57 4b 51 5a 36 41 37 38 49 66 58 63 6a 33 5a 66 4c 4f 32 75 49 72 63 2f 4d 77 51 6d 6d 31 41 6a 41 45 6f 2f 66 68 68 78 69 46 39 41 76 5a 68 46 76 61 4b 47 75 52 32 4d 61 6b 77 48 58 7a 6a 65 41 61 34 52 7a 54 57 39 4f 79 6c 4e 69 6a 6a 49 6b 6f 41 6d 36 33 59 35 61 44 70
                                                                  Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: +gY+GExhWUW9Xiep.2Context: a97987f13b440ddd<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAWwAN/i/O/OSKH+g2+QWKQZ6A78IfXcj3ZfLO2uIrc/MwQmm1AjAEo/fhhxiF9AvZhFvaKGuR2MakwHXzjeAa4RzTW9OylNijjIkoAm63Y5aDp
                                                                  2024-08-29 22:15:09 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 2b 67 59 2b 47 45 78 68 57 55 57 39 58 69 65 70 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 61 39 37 39 38 37 66 31 33 62 34 34 30 64 64 64 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                                                  Data Ascii: BND 3 CON\WNS 0 197MS-CV: +gY+GExhWUW9Xiep.3Context: a97987f13b440ddd<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                                                  2024-08-29 22:15:09 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                                                  Data Ascii: 202 1 CON 58
                                                                  2024-08-29 22:15:09 UTC58INData Raw: 4d 53 2d 43 56 3a 20 76 34 35 78 70 48 33 34 37 30 79 42 41 55 79 62 2b 31 37 6d 41 41 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                                                  Data Ascii: MS-CV: v45xpH3470yBAUyb+17mAA.0Payload parsing failed.


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  16192.168.2.64975320.114.59.183443
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-08-29 22:15:14 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=mEZEmrzEwgSy9mf&MD=4pmgEpFh HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                                                  Host: slscr.update.microsoft.com
                                                                  2024-08-29 22:15:14 UTC560INHTTP/1.1 200 OK
                                                                  Cache-Control: no-cache
                                                                  Pragma: no-cache
                                                                  Content-Type: application/octet-stream
                                                                  Expires: -1
                                                                  Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                                                  ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
                                                                  MS-CorrelationId: 7ad55365-2cb8-48d5-a5db-2d5a7e6c2f53
                                                                  MS-RequestId: b8f460f3-8234-49ee-9dcc-3012fb7d0c3e
                                                                  MS-CV: odUuDggppkSF8+JL.0
                                                                  X-Microsoft-SLSClientCache: 2880
                                                                  Content-Disposition: attachment; filename=environment.cab
                                                                  X-Content-Type-Options: nosniff
                                                                  Date: Thu, 29 Aug 2024 22:15:13 GMT
                                                                  Connection: close
                                                                  Content-Length: 24490
                                                                  2024-08-29 22:15:14 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
                                                                  Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
                                                                  2024-08-29 22:15:14 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
                                                                  Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


                                                                  Session IDSource IPSource PortDestination IPDestination Port
                                                                  17192.168.2.64975640.113.110.67443
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-08-29 22:15:16 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 57 6f 35 58 71 32 76 73 63 55 4f 67 4e 78 55 58 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 65 30 65 66 65 65 39 32 39 31 33 34 32 30 39 64 0d 0a 0d 0a
                                                                  Data Ascii: CNT 1 CON 305MS-CV: Wo5Xq2vscUOgNxUX.1Context: e0efee929134209d
                                                                  2024-08-29 22:15:16 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                                                  2024-08-29 22:15:16 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 57 6f 35 58 71 32 76 73 63 55 4f 67 4e 78 55 58 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 65 30 65 66 65 65 39 32 39 31 33 34 32 30 39 64 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 57 77 41 4e 2f 69 2f 4f 2f 4f 53 4b 48 2b 67 32 2b 51 57 4b 51 5a 36 41 37 38 49 66 58 63 6a 33 5a 66 4c 4f 32 75 49 72 63 2f 4d 77 51 6d 6d 31 41 6a 41 45 6f 2f 66 68 68 78 69 46 39 41 76 5a 68 46 76 61 4b 47 75 52 32 4d 61 6b 77 48 58 7a 6a 65 41 61 34 52 7a 54 57 39 4f 79 6c 4e 69 6a 6a 49 6b 6f 41 6d 36 33 59 35 61 44 70
                                                                  Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: Wo5Xq2vscUOgNxUX.2Context: e0efee929134209d<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAWwAN/i/O/OSKH+g2+QWKQZ6A78IfXcj3ZfLO2uIrc/MwQmm1AjAEo/fhhxiF9AvZhFvaKGuR2MakwHXzjeAa4RzTW9OylNijjIkoAm63Y5aDp
                                                                  2024-08-29 22:15:16 UTC74OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 51 4f 53 20 35 36 0d 0a 4d 53 2d 43 56 3a 20 57 6f 35 58 71 32 76 73 63 55 4f 67 4e 78 55 58 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 65 30 65 66 65 65 39 32 39 31 33 34 32 30 39 64 0d 0a 0d 0a
                                                                  Data Ascii: BND 3 CON\QOS 56MS-CV: Wo5Xq2vscUOgNxUX.3Context: e0efee929134209d
                                                                  2024-08-29 22:15:17 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                                                  Data Ascii: 202 1 CON 58
                                                                  2024-08-29 22:15:17 UTC58INData Raw: 4d 53 2d 43 56 3a 20 50 39 49 53 70 51 6b 4d 38 55 4b 7a 39 36 5a 43 77 7a 45 74 30 67 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                                                  Data Ascii: MS-CV: P9ISpQkM8UKz96ZCwzEt0g.0Payload parsing failed.


                                                                  Session IDSource IPSource PortDestination IPDestination Port
                                                                  18192.168.2.64975840.113.110.67443
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-08-29 22:15:21 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 46 52 39 41 6b 46 77 58 2f 6b 69 6b 53 33 47 70 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 34 65 66 32 36 62 34 33 38 36 35 63 33 61 62 39 0d 0a 0d 0a
                                                                  Data Ascii: CNT 1 CON 305MS-CV: FR9AkFwX/kikS3Gp.1Context: 4ef26b43865c3ab9
                                                                  2024-08-29 22:15:21 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                                                  2024-08-29 22:15:21 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 46 52 39 41 6b 46 77 58 2f 6b 69 6b 53 33 47 70 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 34 65 66 32 36 62 34 33 38 36 35 63 33 61 62 39 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 57 77 41 4e 2f 69 2f 4f 2f 4f 53 4b 48 2b 67 32 2b 51 57 4b 51 5a 36 41 37 38 49 66 58 63 6a 33 5a 66 4c 4f 32 75 49 72 63 2f 4d 77 51 6d 6d 31 41 6a 41 45 6f 2f 66 68 68 78 69 46 39 41 76 5a 68 46 76 61 4b 47 75 52 32 4d 61 6b 77 48 58 7a 6a 65 41 61 34 52 7a 54 57 39 4f 79 6c 4e 69 6a 6a 49 6b 6f 41 6d 36 33 59 35 61 44 70
                                                                  Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: FR9AkFwX/kikS3Gp.2Context: 4ef26b43865c3ab9<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAWwAN/i/O/OSKH+g2+QWKQZ6A78IfXcj3ZfLO2uIrc/MwQmm1AjAEo/fhhxiF9AvZhFvaKGuR2MakwHXzjeAa4RzTW9OylNijjIkoAm63Y5aDp
                                                                  2024-08-29 22:15:21 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 46 52 39 41 6b 46 77 58 2f 6b 69 6b 53 33 47 70 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 34 65 66 32 36 62 34 33 38 36 35 63 33 61 62 39 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                                                  Data Ascii: BND 3 CON\WNS 0 197MS-CV: FR9AkFwX/kikS3Gp.3Context: 4ef26b43865c3ab9<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                                                  2024-08-29 22:15:21 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                                                  Data Ascii: 202 1 CON 58
                                                                  2024-08-29 22:15:21 UTC58INData Raw: 4d 53 2d 43 56 3a 20 66 65 55 39 38 45 58 69 41 55 71 63 64 54 63 6f 34 4f 55 76 61 51 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                                                  Data Ascii: MS-CV: feU98EXiAUqcdTco4OUvaQ.0Payload parsing failed.


                                                                  Session IDSource IPSource PortDestination IPDestination Port
                                                                  19192.168.2.64975940.113.110.67443
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-08-29 22:15:34 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 38 2b 32 69 74 74 52 6b 69 45 4b 53 74 4f 64 67 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 38 65 33 30 32 36 36 35 64 65 32 36 61 37 34 38 0d 0a 0d 0a
                                                                  Data Ascii: CNT 1 CON 305MS-CV: 8+2ittRkiEKStOdg.1Context: 8e302665de26a748
                                                                  2024-08-29 22:15:34 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                                                  2024-08-29 22:15:34 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 38 2b 32 69 74 74 52 6b 69 45 4b 53 74 4f 64 67 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 38 65 33 30 32 36 36 35 64 65 32 36 61 37 34 38 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 57 77 41 4e 2f 69 2f 4f 2f 4f 53 4b 48 2b 67 32 2b 51 57 4b 51 5a 36 41 37 38 49 66 58 63 6a 33 5a 66 4c 4f 32 75 49 72 63 2f 4d 77 51 6d 6d 31 41 6a 41 45 6f 2f 66 68 68 78 69 46 39 41 76 5a 68 46 76 61 4b 47 75 52 32 4d 61 6b 77 48 58 7a 6a 65 41 61 34 52 7a 54 57 39 4f 79 6c 4e 69 6a 6a 49 6b 6f 41 6d 36 33 59 35 61 44 70
                                                                  Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: 8+2ittRkiEKStOdg.2Context: 8e302665de26a748<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAWwAN/i/O/OSKH+g2+QWKQZ6A78IfXcj3ZfLO2uIrc/MwQmm1AjAEo/fhhxiF9AvZhFvaKGuR2MakwHXzjeAa4RzTW9OylNijjIkoAm63Y5aDp
                                                                  2024-08-29 22:15:34 UTC74OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 51 4f 53 20 35 36 0d 0a 4d 53 2d 43 56 3a 20 38 2b 32 69 74 74 52 6b 69 45 4b 53 74 4f 64 67 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 38 65 33 30 32 36 36 35 64 65 32 36 61 37 34 38 0d 0a 0d 0a
                                                                  Data Ascii: BND 3 CON\QOS 56MS-CV: 8+2ittRkiEKStOdg.3Context: 8e302665de26a748
                                                                  2024-08-29 22:15:34 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                                                  Data Ascii: 202 1 CON 58
                                                                  2024-08-29 22:15:34 UTC58INData Raw: 4d 53 2d 43 56 3a 20 6a 53 6f 51 79 6b 6b 4e 74 55 61 49 41 6b 34 4b 6e 6d 32 77 7a 77 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                                                  Data Ascii: MS-CV: jSoQykkNtUaIAk4Knm2wzw.0Payload parsing failed.


                                                                  Session IDSource IPSource PortDestination IPDestination Port
                                                                  20192.168.2.64976040.113.110.67443
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-08-29 22:15:40 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 65 41 35 53 78 79 79 42 6d 30 65 68 65 42 42 31 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 66 32 65 61 37 64 62 61 36 39 39 33 36 38 32 35 0d 0a 0d 0a
                                                                  Data Ascii: CNT 1 CON 305MS-CV: eA5SxyyBm0eheBB1.1Context: f2ea7dba69936825
                                                                  2024-08-29 22:15:40 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                                                  2024-08-29 22:15:40 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 65 41 35 53 78 79 79 42 6d 30 65 68 65 42 42 31 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 66 32 65 61 37 64 62 61 36 39 39 33 36 38 32 35 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 57 77 41 4e 2f 69 2f 4f 2f 4f 53 4b 48 2b 67 32 2b 51 57 4b 51 5a 36 41 37 38 49 66 58 63 6a 33 5a 66 4c 4f 32 75 49 72 63 2f 4d 77 51 6d 6d 31 41 6a 41 45 6f 2f 66 68 68 78 69 46 39 41 76 5a 68 46 76 61 4b 47 75 52 32 4d 61 6b 77 48 58 7a 6a 65 41 61 34 52 7a 54 57 39 4f 79 6c 4e 69 6a 6a 49 6b 6f 41 6d 36 33 59 35 61 44 70
                                                                  Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: eA5SxyyBm0eheBB1.2Context: f2ea7dba69936825<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAWwAN/i/O/OSKH+g2+QWKQZ6A78IfXcj3ZfLO2uIrc/MwQmm1AjAEo/fhhxiF9AvZhFvaKGuR2MakwHXzjeAa4RzTW9OylNijjIkoAm63Y5aDp
                                                                  2024-08-29 22:15:40 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 65 41 35 53 78 79 79 42 6d 30 65 68 65 42 42 31 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 66 32 65 61 37 64 62 61 36 39 39 33 36 38 32 35 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                                                  Data Ascii: BND 3 CON\WNS 0 197MS-CV: eA5SxyyBm0eheBB1.3Context: f2ea7dba69936825<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                                                  2024-08-29 22:15:40 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                                                  Data Ascii: 202 1 CON 58
                                                                  2024-08-29 22:15:40 UTC58INData Raw: 4d 53 2d 43 56 3a 20 37 32 69 6e 33 35 64 49 36 45 4b 37 54 49 58 64 58 67 49 76 55 51 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                                                  Data Ascii: MS-CV: 72in35dI6EK7TIXdXgIvUQ.0Payload parsing failed.


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  21192.168.2.65794040.127.169.103443
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-08-29 22:15:42 UTC306OUTGET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=mEZEmrzEwgSy9mf&MD=4pmgEpFh HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Accept: */*
                                                                  User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                                                  Host: slscr.update.microsoft.com
                                                                  2024-08-29 22:15:43 UTC560INHTTP/1.1 200 OK
                                                                  Cache-Control: no-cache
                                                                  Pragma: no-cache
                                                                  Content-Type: application/octet-stream
                                                                  Expires: -1
                                                                  Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                                                  ETag: "vic+p1MiJJ+/WMnK08jaWnCBGDfvkGRzPk9f8ZadQHg=_1440"
                                                                  MS-CorrelationId: d3e42407-e573-401d-aaa7-fb7a2a708e8d
                                                                  MS-RequestId: a5c69e06-0fd5-4102-b955-0630dc129563
                                                                  MS-CV: DZHlqhwenkKahJSb.0
                                                                  X-Microsoft-SLSClientCache: 1440
                                                                  Content-Disposition: attachment; filename=environment.cab
                                                                  X-Content-Type-Options: nosniff
                                                                  Date: Thu, 29 Aug 2024 22:15:42 GMT
                                                                  Connection: close
                                                                  Content-Length: 30005
                                                                  2024-08-29 22:15:43 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 8d 2b 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 5b 49 00 00 14 00 00 00 00 00 10 00 8d 2b 00 00 a8 49 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 72 4d 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 fe f6 51 be 21 2b 72 4d 43 4b ed 7c 05 58 54 eb da f6 14 43 49 37 0a 02 d2 b9 86 0e 41 52 a4 1b 24 a5 bb 43 24 44 18 94 90 92 52 41 3a 05 09 95 ee 54 b0 00 91 2e e9 12 10 04 11 c9 6f 10 b7 a2 67 9f bd cf 3e ff b7 ff b3 bf 73 ed e1 9a 99 f5 c6 7a d7 bb de f5 3e cf fd 3c f7 dc 17 4a 1a 52 e7 41 a8 97 1e 14 f4 e5 25 7d f4 05 82 82 c1 20 30 08 06 ba c3 05 02 11 7f a9 c1 ff d2 87 5c 1e f4 ed 65 8e 7a 1f f6 0a 40 03 1d 7b f9 83 2c 1c 2f db b8 3a 39 3a 58 38 ba 73 5e
                                                                  Data Ascii: MSCF+D[I+IdrMenvironment.cabQ!+rMCK|XTCI7AR$C$DRA:T.og>sz><JRA%} 0\ez@{,/:9:X8s^
                                                                  2024-08-29 22:15:43 UTC14181INData Raw: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 26 30 24 06 03 55 04 03 13 1d 4d 69 63 72 6f 73 6f 66 74 20 54 69 6d 65 2d 53 74 61 6d 70 20 50 43 41 20 32 30 31 30 30 1e 17 0d 32 33 31 30 31 32 31 39 30 37 32 35 5a 17 0d 32 35 30 31 31 30 31 39 30 37 32 35 5a 30 81 d2 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 2d 30 2b 06 03 55 04 0b 13 24 4d 69 63 72 6f
                                                                  Data Ascii: UUS10UWashington10URedmond10UMicrosoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100231012190725Z250110190725Z010UUS10UWashington10URedmond10UMicrosoft Corporation1-0+U$Micro


                                                                  Session IDSource IPSource PortDestination IPDestination Port
                                                                  22192.168.2.65794440.113.110.67443
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-08-29 22:16:00 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 6c 6f 50 4d 30 64 56 47 44 30 71 48 49 70 65 67 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 65 33 65 35 34 65 39 34 34 34 35 30 65 30 66 33 0d 0a 0d 0a
                                                                  Data Ascii: CNT 1 CON 305MS-CV: loPM0dVGD0qHIpeg.1Context: e3e54e944450e0f3
                                                                  2024-08-29 22:16:00 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                                                  2024-08-29 22:16:00 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 6c 6f 50 4d 30 64 56 47 44 30 71 48 49 70 65 67 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 65 33 65 35 34 65 39 34 34 34 35 30 65 30 66 33 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 57 77 41 4e 2f 69 2f 4f 2f 4f 53 4b 48 2b 67 32 2b 51 57 4b 51 5a 36 41 37 38 49 66 58 63 6a 33 5a 66 4c 4f 32 75 49 72 63 2f 4d 77 51 6d 6d 31 41 6a 41 45 6f 2f 66 68 68 78 69 46 39 41 76 5a 68 46 76 61 4b 47 75 52 32 4d 61 6b 77 48 58 7a 6a 65 41 61 34 52 7a 54 57 39 4f 79 6c 4e 69 6a 6a 49 6b 6f 41 6d 36 33 59 35 61 44 70
                                                                  Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: loPM0dVGD0qHIpeg.2Context: e3e54e944450e0f3<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAWwAN/i/O/OSKH+g2+QWKQZ6A78IfXcj3ZfLO2uIrc/MwQmm1AjAEo/fhhxiF9AvZhFvaKGuR2MakwHXzjeAa4RzTW9OylNijjIkoAm63Y5aDp
                                                                  2024-08-29 22:16:00 UTC74OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 51 4f 53 20 35 36 0d 0a 4d 53 2d 43 56 3a 20 6c 6f 50 4d 30 64 56 47 44 30 71 48 49 70 65 67 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 65 33 65 35 34 65 39 34 34 34 35 30 65 30 66 33 0d 0a 0d 0a
                                                                  Data Ascii: BND 3 CON\QOS 56MS-CV: loPM0dVGD0qHIpeg.3Context: e3e54e944450e0f3
                                                                  2024-08-29 22:16:00 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                                                  Data Ascii: 202 1 CON 58
                                                                  2024-08-29 22:16:00 UTC58INData Raw: 4d 53 2d 43 56 3a 20 4a 44 56 74 6b 6c 7a 53 2f 45 43 55 6f 4e 36 79 6a 66 6a 72 54 67 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                                                  Data Ascii: MS-CV: JDVtklzS/ECUoN6yjfjrTg.0Payload parsing failed.


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  23192.168.2.65794723.44.133.384433268C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-08-29 22:16:01 UTC442OUTOPTIONS /api/report?cat=bingbusiness HTTP/1.1
                                                                  Host: bzib.nelreports.net
                                                                  Connection: keep-alive
                                                                  Origin: https://business.bing.com
                                                                  Access-Control-Request-Method: POST
                                                                  Access-Control-Request-Headers: content-type
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.55
                                                                  Accept-Encoding: gzip, deflate, br
                                                                  Accept-Language: en-GB,en;q=0.9,en-US;q=0.8
                                                                  2024-08-29 22:16:02 UTC360INHTTP/1.1 200 OK
                                                                  Content-Length: 0
                                                                  Access-Control-Allow-Headers: content-type
                                                                  Date: Thu, 29 Aug 2024 22:16:02 GMT
                                                                  Connection: close
                                                                  PMUSER_FORMAT_QS:
                                                                  X-CDN-TraceId: 0.26862c17.1724969761.8c2f575
                                                                  Access-Control-Allow-Credentials: false
                                                                  Access-Control-Allow-Methods: *
                                                                  Access-Control-Allow-Methods: GET, OPTIONS, POST
                                                                  Access-Control-Allow-Origin: *


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  24192.168.2.65794823.44.133.384433268C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-08-29 22:16:02 UTC382OUTPOST /api/report?cat=bingbusiness HTTP/1.1
                                                                  Host: bzib.nelreports.net
                                                                  Connection: keep-alive
                                                                  Content-Length: 465
                                                                  Content-Type: application/reports+json
                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.55
                                                                  Accept-Encoding: gzip, deflate, br
                                                                  Accept-Language: en-GB,en;q=0.9,en-US;q=0.8
                                                                  2024-08-29 22:16:02 UTC465OUTData Raw: 5b 7b 22 61 67 65 22 3a 36 30 30 30 37 2c 22 62 6f 64 79 22 3a 7b 22 65 6c 61 70 73 65 64 5f 74 69 6d 65 22 3a 37 35 33 2c 22 6d 65 74 68 6f 64 22 3a 22 47 45 54 22 2c 22 70 68 61 73 65 22 3a 22 61 70 70 6c 69 63 61 74 69 6f 6e 22 2c 22 70 72 6f 74 6f 63 6f 6c 22 3a 22 68 74 74 70 2f 31 2e 31 22 2c 22 72 65 66 65 72 72 65 72 22 3a 22 22 2c 22 73 61 6d 70 6c 69 6e 67 5f 66 72 61 63 74 69 6f 6e 22 3a 31 2e 30 2c 22 73 65 72 76 65 72 5f 69 70 22 3a 22 31 33 2e 31 30 37 2e 36 2e 31 35 38 22 2c 22 73 74 61 74 75 73 5f 63 6f 64 65 22 3a 34 30 31 2c 22 74 79 70 65 22 3a 22 68 74 74 70 2e 65 72 72 6f 72 22 7d 2c 22 74 79 70 65 22 3a 22 6e 65 74 77 6f 72 6b 2d 65 72 72 6f 72 22 2c 22 75 72 6c 22 3a 22 68 74 74 70 73 3a 2f 2f 62 75 73 69 6e 65 73 73 2e 62 69 6e 67
                                                                  Data Ascii: [{"age":60007,"body":{"elapsed_time":753,"method":"GET","phase":"application","protocol":"http/1.1","referrer":"","sampling_fraction":1.0,"server_ip":"13.107.6.158","status_code":401,"type":"http.error"},"type":"network-error","url":"https://business.bing
                                                                  2024-08-29 22:16:02 UTC358INHTTP/1.1 200 OK
                                                                  Content-Length: 21
                                                                  Content-Type: text/plain; charset=utf-8
                                                                  Date: Thu, 29 Aug 2024 22:16:02 GMT
                                                                  Connection: close
                                                                  PMUSER_FORMAT_QS:
                                                                  X-CDN-TraceId: 0.26862c17.1724969762.8c2fe96
                                                                  Access-Control-Allow-Credentials: false
                                                                  Access-Control-Allow-Methods: *
                                                                  Access-Control-Allow-Methods: GET, OPTIONS, POST
                                                                  Access-Control-Allow-Origin: *
                                                                  2024-08-29 22:16:02 UTC21INData Raw: 50 72 6f 63 65 73 73 65 64 20 74 68 65 20 72 65 71 75 65 73 74
                                                                  Data Ascii: Processed the request


                                                                  Session IDSource IPSource PortDestination IPDestination Port
                                                                  25192.168.2.65794940.113.110.67443
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-08-29 22:16:04 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 6b 2f 48 70 2b 58 39 67 39 30 6d 59 2f 54 61 4d 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 64 36 66 33 32 36 33 33 35 37 61 66 66 34 63 65 0d 0a 0d 0a
                                                                  Data Ascii: CNT 1 CON 305MS-CV: k/Hp+X9g90mY/TaM.1Context: d6f3263357aff4ce
                                                                  2024-08-29 22:16:04 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                                                  2024-08-29 22:16:04 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 6b 2f 48 70 2b 58 39 67 39 30 6d 59 2f 54 61 4d 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 64 36 66 33 32 36 33 33 35 37 61 66 66 34 63 65 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 57 77 41 4e 2f 69 2f 4f 2f 4f 53 4b 48 2b 67 32 2b 51 57 4b 51 5a 36 41 37 38 49 66 58 63 6a 33 5a 66 4c 4f 32 75 49 72 63 2f 4d 77 51 6d 6d 31 41 6a 41 45 6f 2f 66 68 68 78 69 46 39 41 76 5a 68 46 76 61 4b 47 75 52 32 4d 61 6b 77 48 58 7a 6a 65 41 61 34 52 7a 54 57 39 4f 79 6c 4e 69 6a 6a 49 6b 6f 41 6d 36 33 59 35 61 44 70
                                                                  Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: k/Hp+X9g90mY/TaM.2Context: d6f3263357aff4ce<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAWwAN/i/O/OSKH+g2+QWKQZ6A78IfXcj3ZfLO2uIrc/MwQmm1AjAEo/fhhxiF9AvZhFvaKGuR2MakwHXzjeAa4RzTW9OylNijjIkoAm63Y5aDp
                                                                  2024-08-29 22:16:04 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 6b 2f 48 70 2b 58 39 67 39 30 6d 59 2f 54 61 4d 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 64 36 66 33 32 36 33 33 35 37 61 66 66 34 63 65 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                                                  Data Ascii: BND 3 CON\WNS 0 197MS-CV: k/Hp+X9g90mY/TaM.3Context: d6f3263357aff4ce<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                                                  2024-08-29 22:16:04 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                                                  Data Ascii: 202 1 CON 58
                                                                  2024-08-29 22:16:04 UTC58INData Raw: 4d 53 2d 43 56 3a 20 30 74 70 71 47 46 52 55 41 30 65 5a 33 2b 39 71 70 67 30 50 32 51 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                                                  Data Ascii: MS-CV: 0tpqGFRUA0eZ3+9qpg0P2Q.0Payload parsing failed.


                                                                  Session IDSource IPSource PortDestination IPDestination Port
                                                                  26192.168.2.65795140.113.110.67443
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-08-29 22:16:32 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 30 52 64 49 49 68 51 46 34 6b 65 47 6e 72 74 4b 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 39 31 32 36 37 32 36 66 31 35 62 38 62 30 66 61 0d 0a 0d 0a
                                                                  Data Ascii: CNT 1 CON 305MS-CV: 0RdIIhQF4keGnrtK.1Context: 9126726f15b8b0fa
                                                                  2024-08-29 22:16:32 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                                                  2024-08-29 22:16:32 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 30 52 64 49 49 68 51 46 34 6b 65 47 6e 72 74 4b 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 39 31 32 36 37 32 36 66 31 35 62 38 62 30 66 61 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 57 77 41 4e 2f 69 2f 4f 2f 4f 53 4b 48 2b 67 32 2b 51 57 4b 51 5a 36 41 37 38 49 66 58 63 6a 33 5a 66 4c 4f 32 75 49 72 63 2f 4d 77 51 6d 6d 31 41 6a 41 45 6f 2f 66 68 68 78 69 46 39 41 76 5a 68 46 76 61 4b 47 75 52 32 4d 61 6b 77 48 58 7a 6a 65 41 61 34 52 7a 54 57 39 4f 79 6c 4e 69 6a 6a 49 6b 6f 41 6d 36 33 59 35 61 44 70
                                                                  Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: 0RdIIhQF4keGnrtK.2Context: 9126726f15b8b0fa<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAWwAN/i/O/OSKH+g2+QWKQZ6A78IfXcj3ZfLO2uIrc/MwQmm1AjAEo/fhhxiF9AvZhFvaKGuR2MakwHXzjeAa4RzTW9OylNijjIkoAm63Y5aDp
                                                                  2024-08-29 22:16:32 UTC74OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 51 4f 53 20 35 36 0d 0a 4d 53 2d 43 56 3a 20 30 52 64 49 49 68 51 46 34 6b 65 47 6e 72 74 4b 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 39 31 32 36 37 32 36 66 31 35 62 38 62 30 66 61 0d 0a 0d 0a
                                                                  Data Ascii: BND 3 CON\QOS 56MS-CV: 0RdIIhQF4keGnrtK.3Context: 9126726f15b8b0fa
                                                                  2024-08-29 22:16:32 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                                                  Data Ascii: 202 1 CON 58
                                                                  2024-08-29 22:16:32 UTC58INData Raw: 4d 53 2d 43 56 3a 20 4b 4d 35 6e 35 2f 6e 45 4a 45 4b 4e 36 63 6c 44 34 50 35 45 68 51 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                                                  Data Ascii: MS-CV: KM5n5/nEJEKN6clD4P5EhQ.0Payload parsing failed.


                                                                  Session IDSource IPSource PortDestination IPDestination Port
                                                                  27192.168.2.65795240.113.110.67443
                                                                  TimestampBytes transferredDirectionData
                                                                  2024-08-29 22:16:37 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 44 7a 77 2f 78 66 7a 58 45 30 4b 72 68 71 37 6a 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 62 36 32 63 38 64 63 38 65 65 39 62 34 33 36 31 0d 0a 0d 0a
                                                                  Data Ascii: CNT 1 CON 305MS-CV: Dzw/xfzXE0Krhq7j.1Context: b62c8dc8ee9b4361
                                                                  2024-08-29 22:16:37 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                                                  Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                                                  2024-08-29 22:16:37 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 44 7a 77 2f 78 66 7a 58 45 30 4b 72 68 71 37 6a 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 62 36 32 63 38 64 63 38 65 65 39 62 34 33 36 31 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 57 77 41 4e 2f 69 2f 4f 2f 4f 53 4b 48 2b 67 32 2b 51 57 4b 51 5a 36 41 37 38 49 66 58 63 6a 33 5a 66 4c 4f 32 75 49 72 63 2f 4d 77 51 6d 6d 31 41 6a 41 45 6f 2f 66 68 68 78 69 46 39 41 76 5a 68 46 76 61 4b 47 75 52 32 4d 61 6b 77 48 58 7a 6a 65 41 61 34 52 7a 54 57 39 4f 79 6c 4e 69 6a 6a 49 6b 6f 41 6d 36 33 59 35 61 44 70
                                                                  Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: Dzw/xfzXE0Krhq7j.2Context: b62c8dc8ee9b4361<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAWwAN/i/O/OSKH+g2+QWKQZ6A78IfXcj3ZfLO2uIrc/MwQmm1AjAEo/fhhxiF9AvZhFvaKGuR2MakwHXzjeAa4RzTW9OylNijjIkoAm63Y5aDp
                                                                  2024-08-29 22:16:37 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 44 7a 77 2f 78 66 7a 58 45 30 4b 72 68 71 37 6a 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 62 36 32 63 38 64 63 38 65 65 39 62 34 33 36 31 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                                                  Data Ascii: BND 3 CON\WNS 0 197MS-CV: Dzw/xfzXE0Krhq7j.3Context: b62c8dc8ee9b4361<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                                                  2024-08-29 22:16:37 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                                                  Data Ascii: 202 1 CON 58
                                                                  2024-08-29 22:16:37 UTC58INData Raw: 4d 53 2d 43 56 3a 20 53 49 78 66 45 55 41 61 71 6b 47 71 50 7a 57 57 31 30 5a 74 66 67 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                                                  Data Ascii: MS-CV: SIxfEUAaqkGqPzWW10Ztfg.0Payload parsing failed.


                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Click to dive into process behavior distribution

                                                                  Click to jump to process

                                                                  Target ID:0
                                                                  Start time:18:14:55
                                                                  Start date:29/08/2024
                                                                  Path:C:\Users\user\Desktop\file.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\Desktop\file.exe"
                                                                  Imagebase:0xe0000
                                                                  File size:917'504 bytes
                                                                  MD5 hash:10954D86B01D1F67F98A43858063B3DC
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:low
                                                                  Has exited:false

                                                                  Target ID:1
                                                                  Start time:18:14:55
                                                                  Start date:29/08/2024
                                                                  Path:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --kiosk --edge-kiosk-type=fullscreen --no-first-run --disable-features=TranslateUI --disable-popup-blocking --disable-extensions --no-default-browser-check --app=https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password
                                                                  Imagebase:0x7ff715da0000
                                                                  File size:4'210'216 bytes
                                                                  MD5 hash:BF154738460E4AB1D388970E1AB13FAB
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:moderate
                                                                  Has exited:true

                                                                  Target ID:4
                                                                  Start time:18:14:56
                                                                  Start date:29/08/2024
                                                                  Path:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2180 --field-trial-handle=2092,i,14388813608333966908,189234157427795217,262144 --disable-features=TranslateUI /prefetch:3
                                                                  Imagebase:0x7ff715da0000
                                                                  File size:4'210'216 bytes
                                                                  MD5 hash:BF154738460E4AB1D388970E1AB13FAB
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:moderate
                                                                  Has exited:true

                                                                  Target ID:5
                                                                  Start time:18:14:55
                                                                  Start date:29/08/2024
                                                                  Path:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --kiosk --edge-kiosk-type=fullscreen --no-first-run --disable-features=TranslateUI --disable-popup-blocking --disable-extensions --no-default-browser-check --app=https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
                                                                  Imagebase:0x7ff715da0000
                                                                  File size:4'210'216 bytes
                                                                  MD5 hash:BF154738460E4AB1D388970E1AB13FAB
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:moderate
                                                                  Has exited:false

                                                                  Target ID:6
                                                                  Start time:18:14:56
                                                                  Start date:29/08/2024
                                                                  Path:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2080 --field-trial-handle=2000,i,3838580931908670159,11230650748107795701,262144 --disable-features=TranslateUI /prefetch:3
                                                                  Imagebase:0x7ff715da0000
                                                                  File size:4'210'216 bytes
                                                                  MD5 hash:BF154738460E4AB1D388970E1AB13FAB
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:moderate
                                                                  Has exited:false

                                                                  Target ID:9
                                                                  Start time:18:15:00
                                                                  Start date:29/08/2024
                                                                  Path:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=7432 --field-trial-handle=2000,i,3838580931908670159,11230650748107795701,262144 --disable-features=TranslateUI /prefetch:8
                                                                  Imagebase:0x7ff715da0000
                                                                  File size:4'210'216 bytes
                                                                  MD5 hash:BF154738460E4AB1D388970E1AB13FAB
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:moderate
                                                                  Has exited:true

                                                                  Target ID:10
                                                                  Start time:18:15:00
                                                                  Start date:29/08/2024
                                                                  Path:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=6324 --field-trial-handle=2000,i,3838580931908670159,11230650748107795701,262144 --disable-features=TranslateUI /prefetch:8
                                                                  Imagebase:0x7ff715da0000
                                                                  File size:4'210'216 bytes
                                                                  MD5 hash:BF154738460E4AB1D388970E1AB13FAB
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:moderate
                                                                  Has exited:true

                                                                  Target ID:11
                                                                  Start time:18:15:01
                                                                  Start date:29/08/2024
                                                                  Path:C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.55\identity_helper.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.55\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=7292 --field-trial-handle=2000,i,3838580931908670159,11230650748107795701,262144 --disable-features=TranslateUI /prefetch:8
                                                                  Imagebase:0x7ff6f2da0000
                                                                  File size:1'255'976 bytes
                                                                  MD5 hash:F8CEC3E43A6305AC9BA3700131594306
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:moderate
                                                                  Has exited:true

                                                                  Target ID:12
                                                                  Start time:18:15:01
                                                                  Start date:29/08/2024
                                                                  Path:C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.55\identity_helper.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.55\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=7292 --field-trial-handle=2000,i,3838580931908670159,11230650748107795701,262144 --disable-features=TranslateUI /prefetch:8
                                                                  Imagebase:0x7ff6f2da0000
                                                                  File size:1'255'976 bytes
                                                                  MD5 hash:F8CEC3E43A6305AC9BA3700131594306
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:moderate
                                                                  Has exited:true

                                                                  Target ID:16
                                                                  Start time:18:15:13
                                                                  Start date:29/08/2024
                                                                  Path:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5
                                                                  Imagebase:0x7ff715da0000
                                                                  File size:4'210'216 bytes
                                                                  MD5 hash:BF154738460E4AB1D388970E1AB13FAB
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:moderate
                                                                  Has exited:true

                                                                  Target ID:17
                                                                  Start time:18:15:15
                                                                  Start date:29/08/2024
                                                                  Path:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=3512 --field-trial-handle=2312,i,17093364806606948359,8260213145340532299,262144 /prefetch:3
                                                                  Imagebase:0x7ff715da0000
                                                                  File size:4'210'216 bytes
                                                                  MD5 hash:BF154738460E4AB1D388970E1AB13FAB
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:moderate
                                                                  Has exited:true

                                                                  Target ID:18
                                                                  Start time:18:15:15
                                                                  Start date:29/08/2024
                                                                  Path:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=4028 --field-trial-handle=2312,i,17093364806606948359,8260213145340532299,262144 /prefetch:8
                                                                  Imagebase:0x7ff715da0000
                                                                  File size:4'210'216 bytes
                                                                  MD5 hash:BF154738460E4AB1D388970E1AB13FAB
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:moderate
                                                                  Has exited:true

                                                                  Target ID:19
                                                                  Start time:18:15:22
                                                                  Start date:29/08/2024
                                                                  Path:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5
                                                                  Imagebase:0x7ff715da0000
                                                                  File size:4'210'216 bytes
                                                                  MD5 hash:BF154738460E4AB1D388970E1AB13FAB
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:moderate
                                                                  Has exited:true

                                                                  Target ID:20
                                                                  Start time:18:15:22
                                                                  Start date:29/08/2024
                                                                  Path:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=3344 --field-trial-handle=2584,i,13064354698451549742,8210782241735153549,262144 /prefetch:3
                                                                  Imagebase:0x7ff715da0000
                                                                  File size:4'210'216 bytes
                                                                  MD5 hash:BF154738460E4AB1D388970E1AB13FAB
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Target ID:21
                                                                  Start time:18:15:22
                                                                  Start date:29/08/2024
                                                                  Path:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=1460 --field-trial-handle=2584,i,13064354698451549742,8210782241735153549,262144 /prefetch:8
                                                                  Imagebase:0x7ff715da0000
                                                                  File size:4'210'216 bytes
                                                                  MD5 hash:BF154738460E4AB1D388970E1AB13FAB
                                                                  Has elevated privileges:false
                                                                  Has administrator privileges:false
                                                                  Programmed in:C, C++ or other language
                                                                  Has exited:true

                                                                  Reset < >

                                                                    Execution Graph

                                                                    Execution Coverage:1.6%
                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                    Signature Coverage:5.2%
                                                                    Total number of Nodes:1359
                                                                    Total number of Limit Nodes:48
                                                                    execution_graph 95669 172a55 95677 151ebc 95669->95677 95672 172a87 95673 172a70 95679 1439c0 22 API calls 95673->95679 95675 172a7c 95680 14417d 22 API calls __fread_nolock 95675->95680 95678 151ec3 IsWindow 95677->95678 95678->95672 95678->95673 95679->95675 95680->95672 95681 e1cad SystemParametersInfoW 95682 e1044 95687 e10f3 95682->95687 95684 e104a 95723 1000a3 29 API calls __onexit 95684->95723 95686 e1054 95724 e1398 95687->95724 95691 e116a 95734 ea961 95691->95734 95694 ea961 22 API calls 95695 e117e 95694->95695 95696 ea961 22 API calls 95695->95696 95697 e1188 95696->95697 95698 ea961 22 API calls 95697->95698 95699 e11c6 95698->95699 95700 ea961 22 API calls 95699->95700 95701 e1292 95700->95701 95739 e171c 95701->95739 95705 e12c4 95706 ea961 22 API calls 95705->95706 95707 e12ce 95706->95707 95760 f1940 95707->95760 95709 e12f9 95770 e1aab 95709->95770 95711 e1315 95712 e1325 GetStdHandle 95711->95712 95713 e137a 95712->95713 95714 122485 95712->95714 95717 e1387 OleInitialize 95713->95717 95714->95713 95715 12248e 95714->95715 95777 ffddb 95715->95777 95717->95684 95718 122495 95787 15011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 95718->95787 95720 12249e 95788 150944 CreateThread 95720->95788 95722 1224aa CloseHandle 95722->95713 95723->95686 95789 e13f1 95724->95789 95727 e13f1 22 API calls 95728 e13d0 95727->95728 95729 ea961 22 API calls 95728->95729 95730 e13dc 95729->95730 95796 e6b57 95730->95796 95732 e1129 95733 e1bc3 6 API calls 95732->95733 95733->95691 95735 ffe0b 22 API calls 95734->95735 95736 ea976 95735->95736 95737 ffddb 22 API calls 95736->95737 95738 e1174 95737->95738 95738->95694 95740 ea961 22 API calls 95739->95740 95741 e172c 95740->95741 95742 ea961 22 API calls 95741->95742 95743 e1734 95742->95743 95744 ea961 22 API calls 95743->95744 95745 e174f 95744->95745 95746 ffddb 22 API calls 95745->95746 95747 e129c 95746->95747 95748 e1b4a 95747->95748 95749 e1b58 95748->95749 95750 ea961 22 API calls 95749->95750 95751 e1b63 95750->95751 95752 ea961 22 API calls 95751->95752 95753 e1b6e 95752->95753 95754 ea961 22 API calls 95753->95754 95755 e1b79 95754->95755 95756 ea961 22 API calls 95755->95756 95757 e1b84 95756->95757 95758 ffddb 22 API calls 95757->95758 95759 e1b96 RegisterWindowMessageW 95758->95759 95759->95705 95761 f1981 95760->95761 95765 f195d 95760->95765 95841 100242 5 API calls __Init_thread_wait 95761->95841 95764 f8727 95769 f196e 95764->95769 95844 1001f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95764->95844 95765->95769 95843 100242 5 API calls __Init_thread_wait 95765->95843 95766 f198b 95766->95765 95842 1001f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95766->95842 95769->95709 95771 e1abb 95770->95771 95772 12272d 95770->95772 95773 ffddb 22 API calls 95771->95773 95845 153209 23 API calls 95772->95845 95776 e1ac3 95773->95776 95775 122738 95776->95711 95780 ffde0 95777->95780 95778 10ea0c ___std_exception_copy 21 API calls 95778->95780 95779 ffdfa 95779->95718 95780->95778 95780->95779 95783 ffdfc 95780->95783 95846 104ead 7 API calls 2 library calls 95780->95846 95782 10066d 95848 1032a4 RaiseException 95782->95848 95783->95782 95847 1032a4 RaiseException 95783->95847 95786 10068a 95786->95718 95787->95720 95788->95722 95849 15092a 28 API calls 95788->95849 95790 ea961 22 API calls 95789->95790 95791 e13fc 95790->95791 95792 ea961 22 API calls 95791->95792 95793 e1404 95792->95793 95794 ea961 22 API calls 95793->95794 95795 e13c6 95794->95795 95795->95727 95797 124ba1 95796->95797 95799 e6b67 _wcslen 95796->95799 95819 e93b2 95797->95819 95801 e6b7d 95799->95801 95802 e6ba2 95799->95802 95800 124baa 95800->95800 95808 e6f34 22 API calls 95801->95808 95803 ffddb 22 API calls 95802->95803 95806 e6bae 95803->95806 95805 e6b85 __fread_nolock 95805->95732 95809 ffe0b 95806->95809 95808->95805 95811 ffddb 95809->95811 95812 ffdfa 95811->95812 95815 ffdfc 95811->95815 95823 10ea0c 95811->95823 95830 104ead 7 API calls 2 library calls 95811->95830 95812->95805 95814 10066d 95832 1032a4 RaiseException 95814->95832 95815->95814 95831 1032a4 RaiseException 95815->95831 95818 10068a 95818->95805 95820 e93c0 95819->95820 95822 e93c9 __fread_nolock 95819->95822 95820->95822 95835 eaec9 95820->95835 95822->95800 95829 113820 __dosmaperr 95823->95829 95824 11385e 95834 10f2d9 20 API calls __dosmaperr 95824->95834 95826 113849 RtlAllocateHeap 95827 11385c 95826->95827 95826->95829 95827->95811 95829->95824 95829->95826 95833 104ead 7 API calls 2 library calls 95829->95833 95830->95811 95831->95814 95832->95818 95833->95829 95834->95827 95836 eaedc 95835->95836 95840 eaed9 __fread_nolock 95835->95840 95837 ffddb 22 API calls 95836->95837 95838 eaee7 95837->95838 95839 ffe0b 22 API calls 95838->95839 95839->95840 95840->95822 95841->95766 95842->95765 95843->95764 95844->95769 95845->95775 95846->95780 95847->95782 95848->95786 95850 1003fb 95851 100407 ___BuildCatchObject 95850->95851 95879 ffeb1 95851->95879 95853 10040e 95854 100561 95853->95854 95857 100438 95853->95857 95906 10083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 95854->95906 95856 100568 95907 104e52 28 API calls _abort 95856->95907 95868 100477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 95857->95868 95890 11247d 95857->95890 95859 10056e 95908 104e04 28 API calls _abort 95859->95908 95863 100576 95864 100457 95867 1004de 95871 1004f3 95867->95871 95870 1004d8 95868->95870 95902 104e1a 38 API calls 3 library calls 95868->95902 95898 100959 95870->95898 95903 100992 GetModuleHandleW 95871->95903 95873 1004fa 95873->95856 95874 1004fe 95873->95874 95875 100507 95874->95875 95904 104df5 28 API calls _abort 95874->95904 95905 100040 13 API calls 2 library calls 95875->95905 95878 10050f 95878->95864 95880 ffeba 95879->95880 95909 100698 IsProcessorFeaturePresent 95880->95909 95882 ffec6 95910 102c94 10 API calls 3 library calls 95882->95910 95884 ffecb 95885 ffecf 95884->95885 95911 112317 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 95884->95911 95885->95853 95887 ffed8 95888 ffee6 95887->95888 95912 102cbd 8 API calls 3 library calls 95887->95912 95888->95853 95891 112494 95890->95891 95913 100a8c 95891->95913 95893 100451 95893->95864 95894 112421 95893->95894 95897 112450 95894->95897 95895 100a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 95896 112479 95895->95896 95896->95868 95897->95895 95921 102340 95898->95921 95901 10097f 95901->95867 95902->95870 95903->95873 95904->95875 95905->95878 95906->95856 95907->95859 95908->95863 95909->95882 95910->95884 95911->95887 95912->95885 95914 100a95 95913->95914 95915 100a97 IsProcessorFeaturePresent 95913->95915 95914->95893 95917 100c5d 95915->95917 95920 100c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 95917->95920 95919 100d40 95919->95893 95920->95919 95922 10096c GetStartupInfoW 95921->95922 95922->95901 95923 e2de3 95924 e2df0 __wsopen_s 95923->95924 95925 e2e09 95924->95925 95926 122c2b ___scrt_fastfail 95924->95926 95939 e3aa2 95925->95939 95928 122c47 GetOpenFileNameW 95926->95928 95930 122c96 95928->95930 95932 e6b57 22 API calls 95930->95932 95934 122cab 95932->95934 95934->95934 95936 e2e27 95967 e44a8 95936->95967 95996 121f50 95939->95996 95942 e3ace 95945 e6b57 22 API calls 95942->95945 95943 e3ae9 96002 ea6c3 95943->96002 95946 e3ada 95945->95946 95998 e37a0 95946->95998 95949 e2da5 95950 121f50 __wsopen_s 95949->95950 95951 e2db2 GetLongPathNameW 95950->95951 95952 e6b57 22 API calls 95951->95952 95953 e2dda 95952->95953 95954 e3598 95953->95954 95955 ea961 22 API calls 95954->95955 95956 e35aa 95955->95956 95957 e3aa2 23 API calls 95956->95957 95958 e35b5 95957->95958 95959 e35c0 95958->95959 95964 1232eb 95958->95964 96008 e515f 95959->96008 95963 12330d 95964->95963 96020 fce60 41 API calls 95964->96020 95966 e35df 95966->95936 96021 e4ecb 95967->96021 95970 123833 96043 152cf9 95970->96043 95971 e4ecb 94 API calls 95973 e44e1 95971->95973 95973->95970 95975 e44e9 95973->95975 95974 123848 95976 123869 95974->95976 95977 12384c 95974->95977 95979 123854 95975->95979 95980 e44f5 95975->95980 95978 ffe0b 22 API calls 95976->95978 96070 e4f39 95977->96070 95995 1238ae 95978->95995 96076 14da5a 82 API calls 95979->96076 96069 e940c 136 API calls 2 library calls 95980->96069 95984 123862 95984->95976 95985 e2e31 95986 e4f39 68 API calls 95989 123a5f 95986->95989 95989->95986 96082 14989b 82 API calls __wsopen_s 95989->96082 95992 e9cb3 22 API calls 95992->95995 95995->95989 95995->95992 96077 14967e 22 API calls __fread_nolock 95995->96077 96078 1495ad 42 API calls _wcslen 95995->96078 96079 150b5a 22 API calls 95995->96079 96080 ea4a1 22 API calls __fread_nolock 95995->96080 96081 e3ff7 22 API calls 95995->96081 95997 e3aaf GetFullPathNameW 95996->95997 95997->95942 95997->95943 95999 e37ae 95998->95999 96000 e93b2 22 API calls 95999->96000 96001 e2e12 96000->96001 96001->95949 96003 ea6dd 96002->96003 96004 ea6d0 96002->96004 96005 ffddb 22 API calls 96003->96005 96004->95946 96006 ea6e7 96005->96006 96007 ffe0b 22 API calls 96006->96007 96007->96004 96009 e516e 96008->96009 96013 e518f __fread_nolock 96008->96013 96011 ffe0b 22 API calls 96009->96011 96010 ffddb 22 API calls 96012 e35cc 96010->96012 96011->96013 96014 e35f3 96012->96014 96013->96010 96015 e3605 96014->96015 96019 e3624 __fread_nolock 96014->96019 96017 ffe0b 22 API calls 96015->96017 96016 ffddb 22 API calls 96018 e363b 96016->96018 96017->96019 96018->95966 96019->96016 96020->95964 96083 e4e90 LoadLibraryA 96021->96083 96026 e4ef6 LoadLibraryExW 96091 e4e59 LoadLibraryA 96026->96091 96027 123ccf 96029 e4f39 68 API calls 96027->96029 96031 123cd6 96029->96031 96033 e4e59 3 API calls 96031->96033 96035 123cde 96033->96035 96034 e4f20 96034->96035 96036 e4f2c 96034->96036 96113 e50f5 40 API calls __fread_nolock 96035->96113 96038 e4f39 68 API calls 96036->96038 96040 e44cd 96038->96040 96039 123cf5 96114 1528fe 27 API calls 96039->96114 96040->95970 96040->95971 96042 123d05 96044 152d15 96043->96044 96184 e511f 64 API calls 96044->96184 96046 152d29 96185 152e66 75 API calls 96046->96185 96048 152d3b 96067 152d3f 96048->96067 96186 e50f5 40 API calls __fread_nolock 96048->96186 96050 152d56 96187 e50f5 40 API calls __fread_nolock 96050->96187 96052 152d66 96188 e50f5 40 API calls __fread_nolock 96052->96188 96054 152d81 96189 e50f5 40 API calls __fread_nolock 96054->96189 96056 152d9c 96190 e511f 64 API calls 96056->96190 96058 152db3 96059 10ea0c ___std_exception_copy 21 API calls 96058->96059 96060 152dba 96059->96060 96061 10ea0c ___std_exception_copy 21 API calls 96060->96061 96062 152dc4 96061->96062 96191 e50f5 40 API calls __fread_nolock 96062->96191 96064 152dd8 96192 1528fe 27 API calls 96064->96192 96066 152dee 96066->96067 96193 1522ce 96066->96193 96067->95974 96069->95985 96071 e4f43 96070->96071 96073 e4f4a 96070->96073 96072 10e678 67 API calls 96071->96072 96072->96073 96074 e4f6a FreeLibrary 96073->96074 96075 e4f59 96073->96075 96074->96075 96075->95979 96076->95984 96077->95995 96078->95995 96079->95995 96080->95995 96081->95995 96082->95989 96084 e4ea8 GetProcAddress 96083->96084 96085 e4ec6 96083->96085 96086 e4eb8 96084->96086 96088 10e5eb 96085->96088 96086->96085 96087 e4ebf FreeLibrary 96086->96087 96087->96085 96115 10e52a 96088->96115 96090 e4eea 96090->96026 96090->96027 96092 e4e6e GetProcAddress 96091->96092 96093 e4e8d 96091->96093 96094 e4e7e 96092->96094 96096 e4f80 96093->96096 96094->96093 96095 e4e86 FreeLibrary 96094->96095 96095->96093 96097 ffe0b 22 API calls 96096->96097 96098 e4f95 96097->96098 96170 e5722 96098->96170 96100 e4fa1 __fread_nolock 96101 e50a5 96100->96101 96102 123d1d 96100->96102 96112 e4fdc 96100->96112 96173 e42a2 CreateStreamOnHGlobal 96101->96173 96181 15304d 74 API calls 96102->96181 96105 123d22 96182 e511f 64 API calls 96105->96182 96108 123d45 96183 e50f5 40 API calls __fread_nolock 96108->96183 96110 e506e messages 96110->96034 96112->96105 96112->96110 96179 e50f5 40 API calls __fread_nolock 96112->96179 96180 e511f 64 API calls 96112->96180 96113->96039 96114->96042 96118 10e536 ___BuildCatchObject 96115->96118 96116 10e544 96140 10f2d9 20 API calls __dosmaperr 96116->96140 96118->96116 96120 10e574 96118->96120 96119 10e549 96141 1127ec 26 API calls _strftime 96119->96141 96122 10e586 96120->96122 96123 10e579 96120->96123 96132 118061 96122->96132 96142 10f2d9 20 API calls __dosmaperr 96123->96142 96126 10e58f 96128 10e5a2 96126->96128 96129 10e595 96126->96129 96127 10e554 __fread_nolock 96127->96090 96144 10e5d4 LeaveCriticalSection __fread_nolock 96128->96144 96143 10f2d9 20 API calls __dosmaperr 96129->96143 96133 11806d ___BuildCatchObject 96132->96133 96145 112f5e EnterCriticalSection 96133->96145 96135 11807b 96146 1180fb 96135->96146 96139 1180ac __fread_nolock 96139->96126 96140->96119 96141->96127 96142->96127 96143->96127 96144->96127 96145->96135 96154 11811e 96146->96154 96147 118088 96160 1180b7 96147->96160 96148 118177 96165 114c7d 20 API calls __dosmaperr 96148->96165 96150 118180 96166 1129c8 20 API calls __dosmaperr 96150->96166 96153 118189 96153->96147 96167 113405 11 API calls 2 library calls 96153->96167 96154->96147 96154->96148 96154->96154 96163 10918d EnterCriticalSection 96154->96163 96164 1091a1 LeaveCriticalSection 96154->96164 96156 1181a8 96168 10918d EnterCriticalSection 96156->96168 96159 1181bb 96159->96147 96169 112fa6 LeaveCriticalSection 96160->96169 96162 1180be 96162->96139 96163->96154 96164->96154 96165->96150 96166->96153 96167->96156 96168->96159 96169->96162 96171 ffddb 22 API calls 96170->96171 96172 e5734 96171->96172 96172->96100 96174 e42bc FindResourceExW 96173->96174 96178 e42d9 96173->96178 96175 1235ba LoadResource 96174->96175 96174->96178 96176 1235cf SizeofResource 96175->96176 96175->96178 96177 1235e3 LockResource 96176->96177 96176->96178 96177->96178 96178->96112 96179->96112 96180->96112 96181->96105 96182->96108 96183->96110 96184->96046 96185->96048 96186->96050 96187->96052 96188->96054 96189->96056 96190->96058 96191->96064 96192->96066 96194 1522d9 96193->96194 96195 1522e7 96193->96195 96196 10e5eb 29 API calls 96194->96196 96197 15232c 96195->96197 96198 10e5eb 29 API calls 96195->96198 96217 1522f0 96195->96217 96196->96195 96222 152557 40 API calls __fread_nolock 96197->96222 96200 152311 96198->96200 96200->96197 96202 15231a 96200->96202 96201 152370 96203 152395 96201->96203 96204 152374 96201->96204 96202->96217 96230 10e678 96202->96230 96223 152171 96203->96223 96205 152381 96204->96205 96208 10e678 67 API calls 96204->96208 96210 10e678 67 API calls 96205->96210 96205->96217 96208->96205 96209 15239d 96211 1523c3 96209->96211 96212 1523a3 96209->96212 96210->96217 96243 1523f3 74 API calls 96211->96243 96214 1523b0 96212->96214 96215 10e678 67 API calls 96212->96215 96216 10e678 67 API calls 96214->96216 96214->96217 96215->96214 96216->96217 96217->96067 96218 1523ca 96219 1523de 96218->96219 96220 10e678 67 API calls 96218->96220 96219->96217 96221 10e678 67 API calls 96219->96221 96220->96219 96221->96217 96222->96201 96224 10ea0c ___std_exception_copy 21 API calls 96223->96224 96225 15217f 96224->96225 96226 10ea0c ___std_exception_copy 21 API calls 96225->96226 96227 152190 96226->96227 96228 10ea0c ___std_exception_copy 21 API calls 96227->96228 96229 15219c 96228->96229 96229->96209 96231 10e684 ___BuildCatchObject 96230->96231 96232 10e695 96231->96232 96233 10e6aa 96231->96233 96261 10f2d9 20 API calls __dosmaperr 96232->96261 96242 10e6a5 __fread_nolock 96233->96242 96244 10918d EnterCriticalSection 96233->96244 96236 10e69a 96262 1127ec 26 API calls _strftime 96236->96262 96237 10e6c6 96245 10e602 96237->96245 96240 10e6d1 96263 10e6ee LeaveCriticalSection __fread_nolock 96240->96263 96242->96217 96243->96218 96244->96237 96246 10e624 96245->96246 96247 10e60f 96245->96247 96253 10e61f 96246->96253 96264 10dc0b 96246->96264 96296 10f2d9 20 API calls __dosmaperr 96247->96296 96250 10e614 96297 1127ec 26 API calls _strftime 96250->96297 96253->96240 96257 10e646 96281 11862f 96257->96281 96261->96236 96262->96242 96263->96242 96265 10dc23 96264->96265 96269 10dc1f 96264->96269 96266 10d955 __fread_nolock 26 API calls 96265->96266 96265->96269 96267 10dc43 96266->96267 96299 1159be 62 API calls 5 library calls 96267->96299 96270 114d7a 96269->96270 96271 114d90 96270->96271 96272 10e640 96270->96272 96271->96272 96300 1129c8 20 API calls __dosmaperr 96271->96300 96274 10d955 96272->96274 96275 10d961 96274->96275 96276 10d976 96274->96276 96301 10f2d9 20 API calls __dosmaperr 96275->96301 96276->96257 96278 10d966 96302 1127ec 26 API calls _strftime 96278->96302 96280 10d971 96280->96257 96282 118653 96281->96282 96283 11863e 96281->96283 96284 11868e 96282->96284 96288 11867a 96282->96288 96306 10f2c6 20 API calls __dosmaperr 96283->96306 96308 10f2c6 20 API calls __dosmaperr 96284->96308 96287 118643 96307 10f2d9 20 API calls __dosmaperr 96287->96307 96303 118607 96288->96303 96289 118693 96309 10f2d9 20 API calls __dosmaperr 96289->96309 96293 10e64c 96293->96253 96298 1129c8 20 API calls __dosmaperr 96293->96298 96294 11869b 96310 1127ec 26 API calls _strftime 96294->96310 96296->96250 96297->96253 96298->96253 96299->96269 96300->96272 96301->96278 96302->96280 96311 118585 96303->96311 96305 11862b 96305->96293 96306->96287 96307->96293 96308->96289 96309->96294 96310->96293 96312 118591 ___BuildCatchObject 96311->96312 96322 115147 EnterCriticalSection 96312->96322 96314 11859f 96315 1185d1 96314->96315 96316 1185c6 96314->96316 96338 10f2d9 20 API calls __dosmaperr 96315->96338 96323 1186ae 96316->96323 96319 1185cc 96339 1185fb LeaveCriticalSection __wsopen_s 96319->96339 96321 1185ee __fread_nolock 96321->96305 96322->96314 96340 1153c4 96323->96340 96325 1186c4 96353 115333 21 API calls 2 library calls 96325->96353 96327 1186be 96327->96325 96329 1153c4 __wsopen_s 26 API calls 96327->96329 96337 1186f6 96327->96337 96328 11871c 96335 11873e 96328->96335 96354 10f2a3 20 API calls __dosmaperr 96328->96354 96332 1186ed 96329->96332 96330 1153c4 __wsopen_s 26 API calls 96331 118702 FindCloseChangeNotification 96330->96331 96331->96325 96333 11870e GetLastError 96331->96333 96336 1153c4 __wsopen_s 26 API calls 96332->96336 96333->96325 96335->96319 96336->96337 96337->96325 96337->96330 96338->96319 96339->96321 96341 1153d1 96340->96341 96343 1153e6 96340->96343 96342 10f2c6 __dosmaperr 20 API calls 96341->96342 96345 1153d6 96342->96345 96344 10f2c6 __dosmaperr 20 API calls 96343->96344 96346 11540b 96343->96346 96347 115416 96344->96347 96348 10f2d9 __dosmaperr 20 API calls 96345->96348 96346->96327 96350 10f2d9 __dosmaperr 20 API calls 96347->96350 96349 1153de 96348->96349 96349->96327 96351 11541e 96350->96351 96352 1127ec _strftime 26 API calls 96351->96352 96352->96349 96353->96328 96354->96335 96355 ef7bf 96356 efcb6 96355->96356 96357 ef7d3 96355->96357 96448 eaceb 96356->96448 96359 efcc2 96357->96359 96360 ffddb 22 API calls 96357->96360 96361 eaceb 23 API calls 96359->96361 96362 ef7e5 96360->96362 96364 efd3d 96361->96364 96362->96359 96363 ef83e 96362->96363 96362->96364 96388 eed9d messages 96363->96388 96390 f1310 96363->96390 96458 151155 22 API calls 96364->96458 96368 efef7 96368->96388 96460 ea8c7 22 API calls __fread_nolock 96368->96460 96370 ffddb 22 API calls 96387 eec76 messages 96370->96387 96371 134600 96371->96388 96459 ea8c7 22 API calls __fread_nolock 96371->96459 96372 134b0b 96462 15359c 82 API calls __wsopen_s 96372->96462 96378 ea8c7 22 API calls 96378->96387 96379 efbe3 96381 134bdc 96379->96381 96379->96388 96389 ef3ae messages 96379->96389 96380 ea961 22 API calls 96380->96387 96463 15359c 82 API calls __wsopen_s 96381->96463 96383 1000a3 29 API calls pre_c_initialization 96383->96387 96384 100242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96384->96387 96385 134beb 96464 15359c 82 API calls __wsopen_s 96385->96464 96386 1001f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96386->96387 96387->96368 96387->96370 96387->96371 96387->96372 96387->96378 96387->96379 96387->96380 96387->96383 96387->96384 96387->96385 96387->96386 96387->96388 96387->96389 96446 f01e0 377 API calls 2 library calls 96387->96446 96447 f06a0 41 API calls messages 96387->96447 96389->96388 96461 15359c 82 API calls __wsopen_s 96389->96461 96391 f1376 96390->96391 96392 f17b0 96390->96392 96393 136331 96391->96393 96396 f1940 9 API calls 96391->96396 96539 100242 5 API calls __Init_thread_wait 96392->96539 96549 16709c 377 API calls 96393->96549 96399 f13a0 96396->96399 96397 f17ba 96400 f17fb 96397->96400 96540 e9cb3 96397->96540 96398 13633d 96398->96387 96401 f1940 9 API calls 96399->96401 96404 136346 96400->96404 96406 f182c 96400->96406 96403 f13b6 96401->96403 96403->96400 96405 f13ec 96403->96405 96550 15359c 82 API calls __wsopen_s 96404->96550 96405->96404 96430 f1408 __fread_nolock 96405->96430 96408 eaceb 23 API calls 96406->96408 96410 f1839 96408->96410 96409 f17d4 96546 1001f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96409->96546 96547 fd217 377 API calls 96410->96547 96413 13636e 96551 15359c 82 API calls __wsopen_s 96413->96551 96414 f152f 96416 1363d1 96414->96416 96417 f153c 96414->96417 96553 165745 54 API calls _wcslen 96416->96553 96419 f1940 9 API calls 96417->96419 96420 f1549 96419->96420 96426 f1940 9 API calls 96420->96426 96436 f15c7 messages 96420->96436 96421 ffddb 22 API calls 96421->96430 96422 f1872 96422->96393 96548 ffaeb 23 API calls 96422->96548 96423 ffe0b 22 API calls 96423->96430 96424 f171d 96424->96387 96434 f1563 96426->96434 96429 f167b messages 96429->96424 96538 fce17 22 API calls messages 96429->96538 96430->96410 96430->96413 96430->96414 96430->96421 96430->96423 96431 1363b2 96430->96431 96430->96436 96514 eec40 96430->96514 96552 15359c 82 API calls __wsopen_s 96431->96552 96433 f1940 9 API calls 96433->96436 96434->96436 96554 ea8c7 22 API calls __fread_nolock 96434->96554 96436->96422 96436->96429 96436->96433 96465 16ab67 96436->96465 96468 1713b7 96436->96468 96479 17149e 96436->96479 96486 1729bf 96436->96486 96490 1719bc 96436->96490 96493 ff645 96436->96493 96500 155c5a 96436->96500 96505 172598 96436->96505 96555 15359c 82 API calls __wsopen_s 96436->96555 96446->96387 96447->96387 96449 eacf9 96448->96449 96457 ead2a messages 96448->96457 96450 ead55 96449->96450 96452 ead01 messages 96449->96452 96450->96457 96744 ea8c7 22 API calls __fread_nolock 96450->96744 96453 12fa48 96452->96453 96454 ead21 96452->96454 96452->96457 96453->96457 96745 fce17 22 API calls messages 96453->96745 96455 12fa3a VariantClear 96454->96455 96454->96457 96455->96457 96457->96359 96458->96388 96459->96388 96460->96388 96461->96388 96462->96388 96463->96385 96464->96388 96556 16aff9 96465->96556 96696 172ad8 96468->96696 96470 1713cb 96471 171418 GetForegroundWindow 96470->96471 96476 1713da 96470->96476 96472 171435 96471->96472 96473 17142a 96471->96473 96716 ff98e GetForegroundWindow 96472->96716 96706 14e97b 96473->96706 96476->96436 96477 171442 96478 14e97b 5 API calls 96477->96478 96478->96476 96480 172ad8 54 API calls 96479->96480 96481 1714ae 96480->96481 96482 1729bf GetForegroundWindow 96481->96482 96483 1714b5 96482->96483 96484 1714eb GetForegroundWindow 96483->96484 96485 1714b9 96483->96485 96484->96485 96485->96436 96487 1729cb 96486->96487 96488 172a01 GetForegroundWindow 96487->96488 96489 1729d1 96487->96489 96488->96489 96489->96436 96491 172ad8 54 API calls 96490->96491 96492 1719cb 96491->96492 96492->96436 96494 eb567 39 API calls 96493->96494 96495 ff659 96494->96495 96496 ff661 timeGetTime 96495->96496 96497 13f2dc Sleep 96495->96497 96498 eb567 39 API calls 96496->96498 96499 ff677 96498->96499 96499->96436 96501 e7510 53 API calls 96500->96501 96502 155c6d 96501->96502 96730 14dbbe lstrlenW 96502->96730 96504 155c77 96504->96436 96506 172ad8 54 API calls 96505->96506 96507 1725a9 96506->96507 96510 1725b8 96507->96510 96735 143d03 SendMessageTimeoutW 96507->96735 96509 172607 96509->96510 96511 eb567 39 API calls 96509->96511 96510->96436 96512 172630 SetWindowPos 96511->96512 96512->96510 96532 eec76 messages 96514->96532 96515 1000a3 29 API calls pre_c_initialization 96515->96532 96516 134beb 96743 15359c 82 API calls __wsopen_s 96516->96743 96517 ffddb 22 API calls 96517->96532 96519 efef7 96531 eed9d messages 96519->96531 96739 ea8c7 22 API calls __fread_nolock 96519->96739 96520 ef3ae messages 96520->96531 96740 15359c 82 API calls __wsopen_s 96520->96740 96522 134600 96522->96531 96738 ea8c7 22 API calls __fread_nolock 96522->96738 96523 134b0b 96741 15359c 82 API calls __wsopen_s 96523->96741 96524 ea8c7 22 API calls 96524->96532 96530 100242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96530->96532 96531->96430 96532->96515 96532->96516 96532->96517 96532->96519 96532->96520 96532->96522 96532->96523 96532->96524 96532->96530 96532->96531 96533 efbe3 96532->96533 96534 ea961 22 API calls 96532->96534 96537 1001f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96532->96537 96736 f01e0 377 API calls 2 library calls 96532->96736 96737 f06a0 41 API calls messages 96532->96737 96533->96520 96533->96531 96535 134bdc 96533->96535 96534->96532 96742 15359c 82 API calls __wsopen_s 96535->96742 96537->96532 96538->96429 96539->96397 96541 e9cc2 _wcslen 96540->96541 96542 ffe0b 22 API calls 96541->96542 96543 e9cea __fread_nolock 96542->96543 96544 ffddb 22 API calls 96543->96544 96545 e9d00 96544->96545 96545->96409 96546->96400 96547->96422 96548->96422 96549->96398 96550->96436 96551->96436 96552->96436 96553->96434 96554->96436 96555->96436 96557 16b01d ___scrt_fastfail 96556->96557 96558 16b094 96557->96558 96559 16b058 96557->96559 96563 eb567 39 API calls 96558->96563 96565 16b08b 96558->96565 96674 eb567 96559->96674 96561 16b063 96561->96565 96569 eb567 39 API calls 96561->96569 96562 16b0ed 96647 e7510 96562->96647 96564 16b0a5 96563->96564 96568 eb567 39 API calls 96564->96568 96565->96562 96570 eb567 39 API calls 96565->96570 96568->96565 96572 16b078 96569->96572 96570->96562 96574 eb567 39 API calls 96572->96574 96573 16b115 96575 16b11f 96573->96575 96576 16b1d8 96573->96576 96574->96565 96577 e7510 53 API calls 96575->96577 96578 16b20a GetCurrentDirectoryW 96576->96578 96581 e7510 53 API calls 96576->96581 96579 16b130 96577->96579 96580 ffe0b 22 API calls 96578->96580 96582 e7620 22 API calls 96579->96582 96583 16b22f GetCurrentDirectoryW 96580->96583 96584 16b1ef 96581->96584 96585 16b13a 96582->96585 96586 16b23c 96583->96586 96587 e7620 22 API calls 96584->96587 96589 e7510 53 API calls 96585->96589 96591 16b275 96586->96591 96679 e9c6e 22 API calls 96586->96679 96588 16b1f9 _wcslen 96587->96588 96588->96578 96588->96591 96590 16b14b 96589->96590 96592 e7620 22 API calls 96590->96592 96596 16b287 96591->96596 96597 16b28b 96591->96597 96594 16b155 96592->96594 96598 e7510 53 API calls 96594->96598 96595 16b255 96680 e9c6e 22 API calls 96595->96680 96604 16b39a CreateProcessW 96596->96604 96605 16b2f8 96596->96605 96682 1507c0 10 API calls 96597->96682 96601 16b166 96598->96601 96606 e7620 22 API calls 96601->96606 96602 16b265 96681 e9c6e 22 API calls 96602->96681 96603 16b294 96683 1506e6 10 API calls 96603->96683 96626 16b32f _wcslen 96604->96626 96685 1411c8 39 API calls 96605->96685 96610 16b170 96606->96610 96611 16b1a6 GetSystemDirectoryW 96610->96611 96614 e7510 53 API calls 96610->96614 96616 ffe0b 22 API calls 96611->96616 96612 16b2aa 96684 1505a7 8 API calls 96612->96684 96613 16b2fd 96617 16b323 96613->96617 96618 16b32a 96613->96618 96620 16b187 96614->96620 96623 16b1cb GetSystemDirectoryW 96616->96623 96686 141201 128 API calls 2 library calls 96617->96686 96687 1414ce 6 API calls 96618->96687 96625 e7620 22 API calls 96620->96625 96622 16b2d0 96622->96596 96623->96586 96624 16b328 96624->96626 96627 16b191 _wcslen 96625->96627 96628 16b3d6 GetLastError 96626->96628 96629 16b42f CloseHandle 96626->96629 96627->96586 96627->96611 96637 16b41a 96628->96637 96630 16b43f 96629->96630 96638 16b49a 96629->96638 96632 16b446 CloseHandle 96630->96632 96633 16b451 96630->96633 96632->96633 96635 16b463 96633->96635 96636 16b458 CloseHandle 96633->96636 96634 16b4a6 96634->96637 96639 16b475 96635->96639 96640 16b46a CloseHandle 96635->96640 96636->96635 96690 150175 6 API calls 96637->96690 96638->96634 96643 16b4d2 CloseHandle 96638->96643 96688 1509d9 34 API calls 96639->96688 96640->96639 96643->96637 96644 16ab79 96644->96436 96645 16b486 96689 16b536 25 API calls 96645->96689 96648 e7525 96647->96648 96664 e7522 96647->96664 96649 e752d 96648->96649 96650 e755b 96648->96650 96691 1051c6 26 API calls 96649->96691 96651 1250f6 96650->96651 96653 e756d 96650->96653 96661 12500f 96650->96661 96694 105183 26 API calls 96651->96694 96692 ffb21 51 API calls 96653->96692 96654 e753d 96659 ffddb 22 API calls 96654->96659 96657 12510e 96657->96657 96662 e7547 96659->96662 96660 125088 96693 ffb21 51 API calls 96660->96693 96661->96660 96665 ffe0b 22 API calls 96661->96665 96663 e9cb3 22 API calls 96662->96663 96663->96664 96670 e7620 96664->96670 96666 125058 96665->96666 96667 ffddb 22 API calls 96666->96667 96668 12507f 96667->96668 96669 e9cb3 22 API calls 96668->96669 96669->96660 96671 e762a _wcslen 96670->96671 96672 ffe0b 22 API calls 96671->96672 96673 e763f 96672->96673 96673->96573 96675 eb578 96674->96675 96676 eb57f 96674->96676 96675->96676 96695 1062d1 39 API calls _strftime 96675->96695 96676->96561 96678 eb5c2 96678->96561 96679->96595 96680->96602 96681->96591 96682->96603 96683->96612 96684->96622 96685->96613 96686->96624 96687->96626 96688->96645 96689->96638 96690->96644 96691->96654 96692->96654 96693->96651 96694->96657 96695->96678 96697 eaceb 23 API calls 96696->96697 96698 172af3 96697->96698 96699 172aff 96698->96699 96700 172b1d 96698->96700 96701 e7510 53 API calls 96699->96701 96702 e6b57 22 API calls 96700->96702 96704 172b0c 96701->96704 96703 172b1b 96702->96703 96703->96470 96704->96703 96729 ea8c7 22 API calls __fread_nolock 96704->96729 96707 14e9f9 96706->96707 96708 14e988 96706->96708 96707->96472 96709 14e98a Sleep 96708->96709 96711 14e993 QueryPerformanceCounter 96708->96711 96709->96707 96711->96709 96712 14e9a1 QueryPerformanceFrequency 96711->96712 96713 14e9ab Sleep QueryPerformanceCounter 96712->96713 96714 14e9ec 96713->96714 96714->96713 96715 14e9f0 96714->96715 96715->96707 96717 13f467 96716->96717 96718 ff9a8 96716->96718 96719 13f46e FindWindowW 96717->96719 96720 13f47c IsIconic 96717->96720 96718->96477 96719->96720 96721 13f490 SetForegroundWindow 96720->96721 96722 13f487 ShowWindow 96720->96722 96723 13f4a2 7 API calls 96721->96723 96724 13f56b 96721->96724 96722->96721 96725 13f547 96723->96725 96726 13f4eb 9 API calls 96723->96726 96728 13f54f AttachThreadInput AttachThreadInput AttachThreadInput 96725->96728 96727 13f543 96726->96727 96727->96725 96727->96728 96728->96724 96729->96703 96731 14dc06 96730->96731 96732 14dbdc GetFileAttributesW 96730->96732 96731->96504 96732->96731 96733 14dbe8 FindFirstFileW 96732->96733 96733->96731 96734 14dbf9 FindClose 96733->96734 96734->96731 96735->96509 96736->96532 96737->96532 96738->96531 96739->96531 96740->96531 96741->96531 96742->96516 96743->96531 96744->96457 96745->96457 96746 edddc 96749 eb710 96746->96749 96750 eb72b 96749->96750 96751 130146 96750->96751 96752 1300f8 96750->96752 96778 eb750 96750->96778 96791 1658a2 377 API calls 2 library calls 96751->96791 96755 130102 96752->96755 96756 13010f 96752->96756 96752->96778 96789 165d33 377 API calls 96755->96789 96775 eba20 96756->96775 96790 1661d0 377 API calls 2 library calls 96756->96790 96759 fd336 40 API calls 96759->96778 96762 1303d9 96762->96762 96764 ebbe0 40 API calls 96764->96778 96767 eba4e 96768 130322 96794 165c0c 82 API calls 96768->96794 96772 eaceb 23 API calls 96772->96778 96775->96767 96795 15359c 82 API calls __wsopen_s 96775->96795 96776 eec40 377 API calls 96776->96778 96778->96759 96778->96764 96778->96767 96778->96768 96778->96772 96778->96775 96778->96776 96780 ea81b 41 API calls 96778->96780 96781 fd2f0 40 API calls 96778->96781 96782 fa01b 377 API calls 96778->96782 96783 100242 5 API calls __Init_thread_wait 96778->96783 96784 fedcd 22 API calls 96778->96784 96785 1000a3 29 API calls __onexit 96778->96785 96786 1001f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96778->96786 96787 fee53 82 API calls 96778->96787 96788 fe5ca 377 API calls 96778->96788 96792 13f6bf 23 API calls 96778->96792 96793 ea8c7 22 API calls __fread_nolock 96778->96793 96780->96778 96781->96778 96782->96778 96783->96778 96784->96778 96785->96778 96786->96778 96787->96778 96788->96778 96789->96756 96790->96775 96791->96778 96792->96778 96793->96778 96794->96775 96795->96762 96796 118402 96801 1181be 96796->96801 96799 11842a 96806 1181ef try_get_first_available_module 96801->96806 96803 1183ee 96820 1127ec 26 API calls _strftime 96803->96820 96805 118343 96805->96799 96813 120984 96805->96813 96812 118338 96806->96812 96816 108e0b 40 API calls 2 library calls 96806->96816 96808 11838c 96808->96812 96817 108e0b 40 API calls 2 library calls 96808->96817 96810 1183ab 96810->96812 96818 108e0b 40 API calls 2 library calls 96810->96818 96812->96805 96819 10f2d9 20 API calls __dosmaperr 96812->96819 96821 120081 96813->96821 96815 12099f 96815->96799 96816->96808 96817->96810 96818->96812 96819->96803 96820->96805 96823 12008d ___BuildCatchObject 96821->96823 96822 12009b 96879 10f2d9 20 API calls __dosmaperr 96822->96879 96823->96822 96825 1200d4 96823->96825 96832 12065b 96825->96832 96826 1200a0 96880 1127ec 26 API calls _strftime 96826->96880 96831 1200aa __fread_nolock 96831->96815 96882 12042f 96832->96882 96835 1206a6 96900 115221 96835->96900 96836 12068d 96914 10f2c6 20 API calls __dosmaperr 96836->96914 96839 1206ab 96841 1206b4 96839->96841 96842 1206cb 96839->96842 96840 120692 96915 10f2d9 20 API calls __dosmaperr 96840->96915 96916 10f2c6 20 API calls __dosmaperr 96841->96916 96913 12039a CreateFileW 96842->96913 96846 1206b9 96917 10f2d9 20 API calls __dosmaperr 96846->96917 96848 120781 GetFileType 96849 1207d3 96848->96849 96850 12078c GetLastError 96848->96850 96922 11516a 21 API calls 2 library calls 96849->96922 96920 10f2a3 20 API calls __dosmaperr 96850->96920 96851 120756 GetLastError 96919 10f2a3 20 API calls __dosmaperr 96851->96919 96853 120704 96853->96848 96853->96851 96918 12039a CreateFileW 96853->96918 96855 12079a CloseHandle 96855->96840 96857 1207c3 96855->96857 96921 10f2d9 20 API calls __dosmaperr 96857->96921 96859 120749 96859->96848 96859->96851 96861 1207f4 96865 120840 96861->96865 96923 1205ab 72 API calls 3 library calls 96861->96923 96862 1207c8 96862->96840 96867 12086d 96865->96867 96924 12014d 72 API calls 4 library calls 96865->96924 96866 120866 96866->96867 96868 12087e 96866->96868 96869 1186ae __wsopen_s 29 API calls 96867->96869 96870 1200f8 96868->96870 96871 1208fc CloseHandle 96868->96871 96869->96870 96881 120121 LeaveCriticalSection __wsopen_s 96870->96881 96925 12039a CreateFileW 96871->96925 96873 120927 96874 12095d 96873->96874 96875 120931 GetLastError 96873->96875 96874->96870 96926 10f2a3 20 API calls __dosmaperr 96875->96926 96877 12093d 96927 115333 21 API calls 2 library calls 96877->96927 96879->96826 96880->96831 96881->96831 96883 120450 96882->96883 96884 12046a 96882->96884 96883->96884 96935 10f2d9 20 API calls __dosmaperr 96883->96935 96928 1203bf 96884->96928 96887 12045f 96936 1127ec 26 API calls _strftime 96887->96936 96889 1204a2 96890 1204d1 96889->96890 96937 10f2d9 20 API calls __dosmaperr 96889->96937 96895 120524 96890->96895 96939 10d70d 26 API calls 2 library calls 96890->96939 96893 12051f 96893->96895 96896 12059e 96893->96896 96894 1204c6 96938 1127ec 26 API calls _strftime 96894->96938 96895->96835 96895->96836 96940 1127fc 11 API calls _abort 96896->96940 96899 1205aa 96901 11522d ___BuildCatchObject 96900->96901 96943 112f5e EnterCriticalSection 96901->96943 96903 115259 96947 115000 21 API calls 3 library calls 96903->96947 96904 115234 96904->96903 96909 1152c7 EnterCriticalSection 96904->96909 96912 11527b 96904->96912 96907 1152a4 __fread_nolock 96907->96839 96908 11525e 96908->96912 96948 115147 EnterCriticalSection 96908->96948 96910 1152d4 LeaveCriticalSection 96909->96910 96909->96912 96910->96904 96944 11532a 96912->96944 96913->96853 96914->96840 96915->96870 96916->96846 96917->96840 96918->96859 96919->96840 96920->96855 96921->96862 96922->96861 96923->96865 96924->96866 96925->96873 96926->96877 96927->96874 96929 1203d7 96928->96929 96930 1203f2 96929->96930 96941 10f2d9 20 API calls __dosmaperr 96929->96941 96930->96889 96932 120416 96942 1127ec 26 API calls _strftime 96932->96942 96934 120421 96934->96889 96935->96887 96936->96884 96937->96894 96938->96890 96939->96893 96940->96899 96941->96932 96942->96934 96943->96904 96949 112fa6 LeaveCriticalSection 96944->96949 96946 115331 96946->96907 96947->96908 96948->96912 96949->96946 96950 132a00 96966 ed7b0 messages 96950->96966 96951 edb11 PeekMessageW 96951->96966 96952 ed807 GetInputState 96952->96951 96952->96966 96953 131cbe TranslateAcceleratorW 96953->96966 96955 edb8f PeekMessageW 96955->96966 96956 eda04 timeGetTime 96956->96966 96957 edb73 TranslateMessage DispatchMessageW 96957->96955 96958 edbaf Sleep 96958->96966 96959 132b74 Sleep 96972 132b85 96959->96972 96961 131dda timeGetTime 96997 fe300 23 API calls 96961->96997 96965 132c0b GetExitCodeProcess 96970 132c21 WaitForSingleObject 96965->96970 96971 132c37 CloseHandle 96965->96971 96966->96951 96966->96952 96966->96953 96966->96955 96966->96956 96966->96957 96966->96958 96966->96959 96966->96961 96967 1729bf GetForegroundWindow 96966->96967 96968 ed9d5 96966->96968 96975 14e97b 5 API calls 96966->96975 96978 eec40 377 API calls 96966->96978 96980 f1310 377 API calls 96966->96980 96982 edd50 96966->96982 96989 fedf6 96966->96989 96994 edfd0 377 API calls 3 library calls 96966->96994 96995 ebf40 377 API calls 2 library calls 96966->96995 96996 fe551 timeGetTime 96966->96996 96998 153a2a 23 API calls 96966->96998 96999 15359c 82 API calls __wsopen_s 96966->96999 97000 165658 23 API calls 96966->97000 96967->96966 96970->96966 96970->96971 96971->96972 96972->96965 96972->96966 96972->96968 96973 132ca9 Sleep 96972->96973 97001 fe551 timeGetTime 96972->97001 97002 14d4dc 47 API calls 96972->97002 96973->96966 96975->96966 96978->96966 96980->96966 96983 edd6f 96982->96983 96984 edd83 96982->96984 97003 ed260 96983->97003 97035 15359c 82 API calls __wsopen_s 96984->97035 96986 edd7a 96986->96966 96988 132f75 96988->96988 96990 fee09 96989->96990 96991 fee12 96989->96991 96990->96966 96991->96990 96992 fee36 IsDialogMessageW 96991->96992 96993 13efaf GetClassLongW 96991->96993 96992->96990 96992->96991 96993->96991 96993->96992 96994->96966 96995->96966 96996->96966 96997->96966 96998->96966 96999->96966 97000->96966 97001->96972 97002->96972 97004 eec40 377 API calls 97003->97004 97024 ed29d 97004->97024 97005 131bc4 97042 15359c 82 API calls __wsopen_s 97005->97042 97007 ed30b messages 97007->96986 97008 ed6d5 97008->97007 97017 ffe0b 22 API calls 97008->97017 97009 ed3c3 97009->97008 97011 ed3ce 97009->97011 97010 ed5ff 97013 131bb5 97010->97013 97014 ed614 97010->97014 97012 ffddb 22 API calls 97011->97012 97021 ed3d5 __fread_nolock 97012->97021 97041 165705 23 API calls 97013->97041 97019 ffddb 22 API calls 97014->97019 97015 ed4b8 97020 ffe0b 22 API calls 97015->97020 97016 ffddb 22 API calls 97016->97024 97017->97021 97026 ed46a 97019->97026 97030 ed429 __fread_nolock messages 97020->97030 97022 ffddb 22 API calls 97021->97022 97023 ed3f6 97021->97023 97022->97023 97023->97030 97036 ebec0 377 API calls 97023->97036 97024->97005 97024->97007 97024->97008 97024->97009 97024->97015 97024->97016 97024->97030 97026->96986 97027 131ba4 97040 15359c 82 API calls __wsopen_s 97027->97040 97030->97010 97030->97026 97030->97027 97031 131b7f 97030->97031 97033 131b5d 97030->97033 97037 e1f6f 377 API calls 97030->97037 97039 15359c 82 API calls __wsopen_s 97031->97039 97038 15359c 82 API calls __wsopen_s 97033->97038 97035->96988 97036->97030 97037->97030 97038->97026 97039->97026 97040->97026 97041->97005 97042->97007 97043 e105b 97048 e344d 97043->97048 97045 e106a 97079 1000a3 29 API calls __onexit 97045->97079 97047 e1074 97049 e345d __wsopen_s 97048->97049 97050 ea961 22 API calls 97049->97050 97051 e3513 97050->97051 97080 e3a5a 97051->97080 97053 e351c 97087 e3357 97053->97087 97058 e515f 22 API calls 97059 e3544 97058->97059 97060 ea961 22 API calls 97059->97060 97061 e354d 97060->97061 97062 ea6c3 22 API calls 97061->97062 97063 e3556 RegOpenKeyExW 97062->97063 97064 123176 RegQueryValueExW 97063->97064 97068 e3578 97063->97068 97065 123193 97064->97065 97066 12320c RegCloseKey 97064->97066 97067 ffe0b 22 API calls 97065->97067 97066->97068 97078 12321e _wcslen 97066->97078 97069 1231ac 97067->97069 97068->97045 97070 e5722 22 API calls 97069->97070 97071 1231b7 RegQueryValueExW 97070->97071 97073 1231d4 97071->97073 97075 1231ee messages 97071->97075 97072 e4c6d 22 API calls 97072->97078 97074 e6b57 22 API calls 97073->97074 97074->97075 97075->97066 97076 e9cb3 22 API calls 97076->97078 97077 e515f 22 API calls 97077->97078 97078->97068 97078->97072 97078->97076 97078->97077 97079->97047 97081 121f50 __wsopen_s 97080->97081 97082 e3a67 GetModuleFileNameW 97081->97082 97083 e9cb3 22 API calls 97082->97083 97084 e3a8d 97083->97084 97085 e3aa2 23 API calls 97084->97085 97086 e3a97 97085->97086 97086->97053 97088 121f50 __wsopen_s 97087->97088 97089 e3364 GetFullPathNameW 97088->97089 97090 e3386 97089->97090 97091 e6b57 22 API calls 97090->97091 97092 e33a4 97091->97092 97093 e33c6 97092->97093 97094 e33dd 97093->97094 97095 1230bb 97093->97095 97102 e33ee 97094->97102 97097 ffddb 22 API calls 97095->97097 97099 1230c5 _wcslen 97097->97099 97098 e33e8 97098->97058 97100 ffe0b 22 API calls 97099->97100 97101 1230fe __fread_nolock 97100->97101 97103 e33fe _wcslen 97102->97103 97104 12311d 97103->97104 97105 e3411 97103->97105 97107 ffddb 22 API calls 97104->97107 97112 ea587 97105->97112 97109 123127 97107->97109 97108 e341e __fread_nolock 97108->97098 97110 ffe0b 22 API calls 97109->97110 97111 123157 __fread_nolock 97110->97111 97113 ea59d 97112->97113 97116 ea598 __fread_nolock 97112->97116 97114 12f80f 97113->97114 97115 ffe0b 22 API calls 97113->97115 97115->97116 97116->97108 97117 e1098 97122 e42de 97117->97122 97121 e10a7 97123 ea961 22 API calls 97122->97123 97124 e42f5 GetVersionExW 97123->97124 97125 e6b57 22 API calls 97124->97125 97126 e4342 97125->97126 97127 e93b2 22 API calls 97126->97127 97132 e4378 97126->97132 97128 e436c 97127->97128 97130 e37a0 22 API calls 97128->97130 97129 e441b GetCurrentProcess IsWow64Process 97131 e4437 97129->97131 97130->97132 97134 e444f LoadLibraryA 97131->97134 97135 123824 GetSystemInfo 97131->97135 97132->97129 97133 1237df 97132->97133 97136 e449c GetSystemInfo 97134->97136 97137 e4460 GetProcAddress 97134->97137 97138 e4476 97136->97138 97137->97136 97139 e4470 GetNativeSystemInfo 97137->97139 97140 e447a FreeLibrary 97138->97140 97141 e109d 97138->97141 97139->97138 97140->97141 97142 1000a3 29 API calls __onexit 97141->97142 97142->97121 97143 122ba5 97144 e2b25 97143->97144 97145 122baf 97143->97145 97171 e2b83 7 API calls 97144->97171 97147 e3a5a 24 API calls 97145->97147 97149 122bb8 97147->97149 97151 e9cb3 22 API calls 97149->97151 97153 122bc6 97151->97153 97152 e2b2f 97162 e2b44 97152->97162 97175 e3837 97152->97175 97154 122bf5 97153->97154 97155 122bce 97153->97155 97158 e33c6 22 API calls 97154->97158 97157 e33c6 22 API calls 97155->97157 97159 122bd9 97157->97159 97169 122bf1 GetForegroundWindow ShellExecuteW 97158->97169 97186 e6350 22 API calls 97159->97186 97161 e2b5f 97168 e2b66 SetCurrentDirectoryW 97161->97168 97162->97161 97185 e30f2 Shell_NotifyIconW ___scrt_fastfail 97162->97185 97164 122c26 97164->97161 97166 122be7 97167 e33c6 22 API calls 97166->97167 97167->97169 97170 e2b7a 97168->97170 97169->97164 97187 e2cd4 7 API calls 97171->97187 97173 e2b2a 97174 e2c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 97173->97174 97174->97152 97176 e3862 ___scrt_fastfail 97175->97176 97188 e4212 97176->97188 97179 e38e8 97181 123386 Shell_NotifyIconW 97179->97181 97182 e3906 Shell_NotifyIconW 97179->97182 97192 e3923 97182->97192 97184 e391c 97184->97162 97185->97161 97186->97166 97187->97173 97189 1235a4 97188->97189 97190 e38b7 97188->97190 97189->97190 97191 1235ad DestroyIcon 97189->97191 97190->97179 97214 14c874 42 API calls _strftime 97190->97214 97191->97190 97193 e393f 97192->97193 97212 e3a13 97192->97212 97215 e6270 97193->97215 97196 123393 LoadStringW 97199 1233ad 97196->97199 97197 e395a 97198 e6b57 22 API calls 97197->97198 97200 e396f 97198->97200 97208 e3994 ___scrt_fastfail 97199->97208 97221 ea8c7 22 API calls __fread_nolock 97199->97221 97201 e397c 97200->97201 97202 1233c9 97200->97202 97201->97199 97204 e3986 97201->97204 97222 e6350 22 API calls 97202->97222 97220 e6350 22 API calls 97204->97220 97207 1233d7 97207->97208 97209 e33c6 22 API calls 97207->97209 97210 e39f9 Shell_NotifyIconW 97208->97210 97211 1233f9 97209->97211 97210->97212 97213 e33c6 22 API calls 97211->97213 97212->97184 97213->97208 97214->97179 97216 ffe0b 22 API calls 97215->97216 97217 e6295 97216->97217 97218 ffddb 22 API calls 97217->97218 97219 e394d 97218->97219 97219->97196 97219->97197 97220->97208 97221->97208 97222->97207 97223 e3156 97226 e3170 97223->97226 97227 e3187 97226->97227 97228 e318c 97227->97228 97229 e31eb 97227->97229 97264 e31e9 97227->97264 97230 e3199 97228->97230 97231 e3265 PostQuitMessage 97228->97231 97233 122dfb 97229->97233 97234 e31f1 97229->97234 97236 e31a4 97230->97236 97237 122e7c 97230->97237 97267 e316a 97231->97267 97232 e31d0 DefWindowProcW 97232->97267 97282 e18e2 10 API calls 97233->97282 97238 e321d SetTimer RegisterWindowMessageW 97234->97238 97239 e31f8 97234->97239 97243 e31ae 97236->97243 97244 122e68 97236->97244 97286 14bf30 34 API calls ___scrt_fastfail 97237->97286 97245 e3246 CreatePopupMenu 97238->97245 97238->97267 97240 122d9c 97239->97240 97241 e3201 KillTimer 97239->97241 97252 122da1 97240->97252 97253 122dd7 MoveWindow 97240->97253 97278 e30f2 Shell_NotifyIconW ___scrt_fastfail 97241->97278 97242 122e1c 97283 fe499 42 API calls 97242->97283 97250 e31b9 97243->97250 97251 122e4d 97243->97251 97271 14c161 97244->97271 97245->97267 97255 e3253 97250->97255 97262 e31c4 97250->97262 97251->97232 97285 140ad7 22 API calls 97251->97285 97257 122dc6 SetFocus 97252->97257 97258 122da7 97252->97258 97253->97267 97254 e3214 97279 e3c50 DeleteObject DestroyWindow 97254->97279 97280 e326f 44 API calls ___scrt_fastfail 97255->97280 97256 122e8e 97256->97232 97256->97267 97257->97267 97258->97262 97263 122db0 97258->97263 97262->97232 97284 e30f2 Shell_NotifyIconW ___scrt_fastfail 97262->97284 97281 e18e2 10 API calls 97263->97281 97264->97232 97265 e3263 97265->97267 97269 122e41 97270 e3837 49 API calls 97269->97270 97270->97264 97272 14c276 97271->97272 97273 14c179 ___scrt_fastfail 97271->97273 97272->97267 97274 e3923 24 API calls 97273->97274 97276 14c1a0 97274->97276 97275 14c25f KillTimer SetTimer 97275->97272 97276->97275 97277 14c251 Shell_NotifyIconW 97276->97277 97277->97275 97278->97254 97279->97267 97280->97265 97281->97267 97282->97242 97283->97262 97284->97269 97285->97264 97286->97256 97287 e2e37 97288 ea961 22 API calls 97287->97288 97289 e2e4d 97288->97289 97366 e4ae3 97289->97366 97291 e2e6b 97292 e3a5a 24 API calls 97291->97292 97293 e2e7f 97292->97293 97294 e9cb3 22 API calls 97293->97294 97295 e2e8c 97294->97295 97296 e4ecb 94 API calls 97295->97296 97297 e2ea5 97296->97297 97298 122cb0 97297->97298 97299 e2ead 97297->97299 97300 152cf9 80 API calls 97298->97300 97380 ea8c7 22 API calls __fread_nolock 97299->97380 97301 122cc3 97300->97301 97302 122ccf 97301->97302 97304 e4f39 68 API calls 97301->97304 97307 e4f39 68 API calls 97302->97307 97304->97302 97305 e2ec3 97381 e6f88 22 API calls 97305->97381 97310 122ce5 97307->97310 97308 e2ecf 97309 e9cb3 22 API calls 97308->97309 97311 e2edc 97309->97311 97398 e3084 22 API calls 97310->97398 97382 ea81b 41 API calls 97311->97382 97313 e2eec 97316 e9cb3 22 API calls 97313->97316 97315 122d02 97399 e3084 22 API calls 97315->97399 97318 e2f12 97316->97318 97383 ea81b 41 API calls 97318->97383 97319 122d1e 97321 e3a5a 24 API calls 97319->97321 97322 122d44 97321->97322 97400 e3084 22 API calls 97322->97400 97323 e2f21 97326 ea961 22 API calls 97323->97326 97325 122d50 97401 ea8c7 22 API calls __fread_nolock 97325->97401 97328 e2f3f 97326->97328 97384 e3084 22 API calls 97328->97384 97330 122d5e 97402 e3084 22 API calls 97330->97402 97331 e2f4b 97385 104a28 40 API calls 2 library calls 97331->97385 97334 e2f59 97334->97310 97335 e2f63 97334->97335 97386 104a28 40 API calls 2 library calls 97335->97386 97336 122d6d 97403 ea8c7 22 API calls __fread_nolock 97336->97403 97339 122d83 97404 e3084 22 API calls 97339->97404 97340 e2f6e 97340->97315 97342 e2f78 97340->97342 97387 104a28 40 API calls 2 library calls 97342->97387 97343 122d90 97345 e2f83 97345->97319 97346 e2f8d 97345->97346 97388 104a28 40 API calls 2 library calls 97346->97388 97348 e2f98 97349 e2fdc 97348->97349 97389 e3084 22 API calls 97348->97389 97349->97336 97350 e2fe8 97349->97350 97350->97343 97392 e63eb 22 API calls 97350->97392 97352 e2fbf 97390 ea8c7 22 API calls __fread_nolock 97352->97390 97355 e2ff8 97393 e6a50 22 API calls 97355->97393 97356 e2fcd 97391 e3084 22 API calls 97356->97391 97359 e3006 97394 e70b0 23 API calls 97359->97394 97363 e3021 97364 e3065 97363->97364 97395 e6f88 22 API calls 97363->97395 97396 e70b0 23 API calls 97363->97396 97397 e3084 22 API calls 97363->97397 97367 e4af0 __wsopen_s 97366->97367 97368 e6b57 22 API calls 97367->97368 97369 e4b22 97367->97369 97368->97369 97377 e4b58 97369->97377 97405 e4c6d 97369->97405 97371 e9cb3 22 API calls 97373 e4c52 97371->97373 97372 e9cb3 22 API calls 97372->97377 97375 e515f 22 API calls 97373->97375 97374 e4c6d 22 API calls 97374->97377 97376 e4c5e 97375->97376 97376->97291 97377->97372 97377->97374 97378 e515f 22 API calls 97377->97378 97379 e4c29 97377->97379 97378->97377 97379->97371 97379->97376 97380->97305 97381->97308 97382->97313 97383->97323 97384->97331 97385->97334 97386->97340 97387->97345 97388->97348 97389->97352 97390->97356 97391->97349 97392->97355 97393->97359 97394->97363 97395->97363 97396->97363 97397->97363 97398->97315 97399->97319 97400->97325 97401->97330 97402->97336 97403->97339 97404->97343 97406 eaec9 22 API calls 97405->97406 97407 e4c78 97406->97407 97407->97369 97408 e1033 97413 e4c91 97408->97413 97412 e1042 97414 ea961 22 API calls 97413->97414 97415 e4cff 97414->97415 97421 e3af0 97415->97421 97417 e4d9c 97419 e1038 97417->97419 97424 e51f7 22 API calls __fread_nolock 97417->97424 97420 1000a3 29 API calls __onexit 97419->97420 97420->97412 97425 e3b1c 97421->97425 97424->97417 97426 e3b0f 97425->97426 97427 e3b29 97425->97427 97426->97417 97427->97426 97428 e3b30 RegOpenKeyExW 97427->97428 97428->97426 97429 e3b4a RegQueryValueExW 97428->97429 97430 e3b6b 97429->97430 97431 e3b80 RegCloseKey 97429->97431 97430->97431 97431->97426

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 389 e42de-e434d call ea961 GetVersionExW call e6b57 394 123617-12362a 389->394 395 e4353 389->395 396 12362b-12362f 394->396 397 e4355-e4357 395->397 398 123632-12363e 396->398 399 123631 396->399 400 e435d-e43bc call e93b2 call e37a0 397->400 401 123656 397->401 398->396 402 123640-123642 398->402 399->398 418 e43c2-e43c4 400->418 419 1237df-1237e6 400->419 405 12365d-123660 401->405 402->397 404 123648-12364f 402->404 404->394 407 123651 404->407 408 123666-1236a8 405->408 409 e441b-e4435 GetCurrentProcess IsWow64Process 405->409 407->401 408->409 413 1236ae-1236b1 408->413 411 e4437 409->411 412 e4494-e449a 409->412 415 e443d-e4449 411->415 412->415 416 1236b3-1236bd 413->416 417 1236db-1236e5 413->417 425 e444f-e445e LoadLibraryA 415->425 426 123824-123828 GetSystemInfo 415->426 427 1236ca-1236d6 416->427 428 1236bf-1236c5 416->428 421 1236e7-1236f3 417->421 422 1236f8-123702 417->422 418->405 420 e43ca-e43dd 418->420 423 123806-123809 419->423 424 1237e8 419->424 429 123726-12372f 420->429 430 e43e3-e43e5 420->430 421->409 432 123704-123710 422->432 433 123715-123721 422->433 434 1237f4-1237fc 423->434 435 12380b-12381a 423->435 431 1237ee 424->431 436 e449c-e44a6 GetSystemInfo 425->436 437 e4460-e446e GetProcAddress 425->437 427->409 428->409 441 123731-123737 429->441 442 12373c-123748 429->442 439 e43eb-e43ee 430->439 440 12374d-123762 430->440 431->434 432->409 433->409 434->423 435->431 443 12381c-123822 435->443 438 e4476-e4478 436->438 437->436 444 e4470-e4474 GetNativeSystemInfo 437->444 449 e447a-e447b FreeLibrary 438->449 450 e4481-e4493 438->450 445 123791-123794 439->445 446 e43f4-e440f 439->446 447 123764-12376a 440->447 448 12376f-12377b 440->448 441->409 442->409 443->434 444->438 445->409 453 12379a-1237c1 445->453 451 123780-12378c 446->451 452 e4415 446->452 447->409 448->409 449->450 451->409 452->409 454 1237c3-1237c9 453->454 455 1237ce-1237da 453->455 454->409 455->409
                                                                    APIs
                                                                    • GetVersionExW.KERNEL32(?), ref: 000E430D
                                                                      • Part of subcall function 000E6B57: _wcslen.LIBCMT ref: 000E6B6A
                                                                    • GetCurrentProcess.KERNEL32(?,0017CB64,00000000,?,?), ref: 000E4422
                                                                    • IsWow64Process.KERNEL32(00000000,?,?), ref: 000E4429
                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 000E4454
                                                                    • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 000E4466
                                                                    • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 000E4474
                                                                    • FreeLibrary.KERNEL32(00000000,?,?), ref: 000E447B
                                                                    • GetSystemInfo.KERNEL32(?,?,?), ref: 000E44A0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                                    • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                                    • API String ID: 3290436268-3101561225
                                                                    • Opcode ID: 15fa7b3a5f3f2b8f763e8a2a68e85e3192b3dbc00293bae5a84f9207a781e855
                                                                    • Instruction ID: de9305d697821f3594e13a5629bcbaa7b79e8b227f43828f2d6726f4219b4a97
                                                                    • Opcode Fuzzy Hash: 15fa7b3a5f3f2b8f763e8a2a68e85e3192b3dbc00293bae5a84f9207a781e855
                                                                    • Instruction Fuzzy Hash: 1CA1956291A3D0FFCB11C76A7C611997FE47B26360B9A46A9D041A3F72F32446C4CB61

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 654 e42a2-e42ba CreateStreamOnHGlobal 655 e42bc-e42d3 FindResourceExW 654->655 656 e42da-e42dd 654->656 657 e42d9 655->657 658 1235ba-1235c9 LoadResource 655->658 657->656 658->657 659 1235cf-1235dd SizeofResource 658->659 659->657 660 1235e3-1235ee LockResource 659->660 660->657 661 1235f4-123612 660->661 661->657
                                                                    APIs
                                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,000E50AA,?,?,00000000,00000000), ref: 000E42B2
                                                                    • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,000E50AA,?,?,00000000,00000000), ref: 000E42C9
                                                                    • LoadResource.KERNEL32(?,00000000,?,?,000E50AA,?,?,00000000,00000000,?,?,?,?,?,?,000E4F20), ref: 001235BE
                                                                    • SizeofResource.KERNEL32(?,00000000,?,?,000E50AA,?,?,00000000,00000000,?,?,?,?,?,?,000E4F20), ref: 001235D3
                                                                    • LockResource.KERNEL32(000E50AA,?,?,000E50AA,?,?,00000000,00000000,?,?,?,?,?,?,000E4F20,?), ref: 001235E6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                    • String ID: SCRIPT
                                                                    • API String ID: 3051347437-3967369404
                                                                    • Opcode ID: 3ea487a523da234fa6736711130a50a79d248f190d85455630d409e3670de950
                                                                    • Instruction ID: 1a6aa8d13f4a16a7d41f6f73cd18b1f126527fa20aff40dfed62c5357f19d95f
                                                                    • Opcode Fuzzy Hash: 3ea487a523da234fa6736711130a50a79d248f190d85455630d409e3670de950
                                                                    • Instruction Fuzzy Hash: FD118E70600700BFD7218B66DC48F277BB9EBC5B51F14816DF506E6660DB71DC408A60

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 000E2B6B
                                                                      • Part of subcall function 000E3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,001B1418,?,000E2E7F,?,?,?,00000000), ref: 000E3A78
                                                                      • Part of subcall function 000E9CB3: _wcslen.LIBCMT ref: 000E9CBD
                                                                    • GetForegroundWindow.USER32(runas,?,?,?,?,?,001A2224), ref: 00122C10
                                                                    • ShellExecuteW.SHELL32(00000000,?,?,001A2224), ref: 00122C17
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                                    • String ID: runas
                                                                    • API String ID: 448630720-4000483414
                                                                    • Opcode ID: 8b36e4e6e7e9c2a4dfdcb2c0a4b768c68fd71c40e01ee5393db660ef3fc8d774
                                                                    • Instruction ID: bf9a648a32e917885a911498b37979d16044dc18d6d27d090f53c98d92bc9d66
                                                                    • Opcode Fuzzy Hash: 8b36e4e6e7e9c2a4dfdcb2c0a4b768c68fd71c40e01ee5393db660ef3fc8d774
                                                                    • Instruction Fuzzy Hash: 0211B4312083C16EC718FF62D855DEEBBA99B95740F94142DF086370A3DF318A898752

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 839 14dbbe-14dbda lstrlenW 840 14dc06 839->840 841 14dbdc-14dbe6 GetFileAttributesW 839->841 843 14dc09-14dc0d 840->843 842 14dbe8-14dbf7 FindFirstFileW 841->842 841->843 842->840 844 14dbf9-14dc04 FindClose 842->844 844->843
                                                                    APIs
                                                                    • lstrlenW.KERNEL32(?,00125222), ref: 0014DBCE
                                                                    • GetFileAttributesW.KERNELBASE(?), ref: 0014DBDD
                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 0014DBEE
                                                                    • FindClose.KERNEL32(00000000), ref: 0014DBFA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: FileFind$AttributesCloseFirstlstrlen
                                                                    • String ID:
                                                                    • API String ID: 2695905019-0
                                                                    • Opcode ID: a1d3ce39fe46d2b0d2f514d0a0e7bf1445fa7011f5a09c35e376e9c152675aa7
                                                                    • Instruction ID: 0a24957b546937bc56db1fcf5d05dbeb0b2946d164cc211f3d57f7f5a5ea5ba6
                                                                    • Opcode Fuzzy Hash: a1d3ce39fe46d2b0d2f514d0a0e7bf1445fa7011f5a09c35e376e9c152675aa7
                                                                    • Instruction Fuzzy Hash: F2F0A9B0810910A786216BB8AC4D8AA37BD9F03334B50471AF83AC24F0EBB099D486D6

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 0 16aff9-16b056 call 102340 3 16b094-16b098 0->3 4 16b058-16b06b call eb567 0->4 6 16b0dd-16b0e0 3->6 7 16b09a-16b0bb call eb567 * 2 3->7 13 16b06d-16b092 call eb567 * 2 4->13 14 16b0c8 4->14 9 16b0f5-16b119 call e7510 call e7620 6->9 10 16b0e2-16b0e5 6->10 29 16b0bf-16b0c4 7->29 31 16b11f-16b178 call e7510 call e7620 call e7510 call e7620 call e7510 call e7620 9->31 32 16b1d8-16b1e0 9->32 15 16b0e8-16b0ed call eb567 10->15 13->29 19 16b0cb-16b0cf 14->19 15->9 24 16b0d1-16b0d7 19->24 25 16b0d9-16b0db 19->25 24->15 25->6 25->9 29->6 33 16b0c6 29->33 79 16b1a6-16b1d6 GetSystemDirectoryW call ffe0b GetSystemDirectoryW 31->79 80 16b17a-16b195 call e7510 call e7620 31->80 36 16b1e2-16b1fd call e7510 call e7620 32->36 37 16b20a-16b238 GetCurrentDirectoryW call ffe0b GetCurrentDirectoryW 32->37 33->19 36->37 50 16b1ff-16b208 call 104963 36->50 45 16b23c 37->45 49 16b240-16b244 45->49 52 16b246-16b270 call e9c6e * 3 49->52 53 16b275-16b285 call 1500d9 49->53 50->37 50->53 52->53 62 16b287-16b289 53->62 63 16b28b-16b2e1 call 1507c0 call 1506e6 call 1505a7 53->63 66 16b2ee-16b2f2 62->66 63->66 99 16b2e3 63->99 71 16b39a-16b3be CreateProcessW 66->71 72 16b2f8-16b321 call 1411c8 66->72 76 16b3c1-16b3d4 call ffe14 * 2 71->76 88 16b323-16b328 call 141201 72->88 89 16b32a call 1414ce 72->89 103 16b3d6-16b3e8 76->103 104 16b42f-16b43d CloseHandle 76->104 79->45 80->79 105 16b197-16b1a0 call 104963 80->105 98 16b32f-16b33c call 104963 88->98 89->98 115 16b347-16b357 call 104963 98->115 116 16b33e-16b345 98->116 99->66 109 16b3ed-16b3fc 103->109 110 16b3ea 103->110 107 16b43f-16b444 104->107 108 16b49c 104->108 105->49 105->79 117 16b446-16b44c CloseHandle 107->117 118 16b451-16b456 107->118 113 16b4a0-16b4a4 108->113 111 16b401-16b42a GetLastError call e630c call ecfa0 109->111 112 16b3fe 109->112 110->109 127 16b4e5-16b4f6 call 150175 111->127 112->111 120 16b4a6-16b4b0 113->120 121 16b4b2-16b4bc 113->121 136 16b362-16b372 call 104963 115->136 137 16b359-16b360 115->137 116->115 116->116 117->118 124 16b463-16b468 118->124 125 16b458-16b45e CloseHandle 118->125 120->127 128 16b4c4-16b4e3 call ecfa0 CloseHandle 121->128 129 16b4be 121->129 131 16b475-16b49a call 1509d9 call 16b536 124->131 132 16b46a-16b470 CloseHandle 124->132 125->124 128->127 129->128 131->113 132->131 147 16b374-16b37b 136->147 148 16b37d-16b398 call ffe14 * 3 136->148 137->136 137->137 147->147 147->148 148->76
                                                                    APIs
                                                                    • _wcslen.LIBCMT ref: 0016B198
                                                                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0016B1B0
                                                                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0016B1D4
                                                                    • _wcslen.LIBCMT ref: 0016B200
                                                                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0016B214
                                                                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0016B236
                                                                    • _wcslen.LIBCMT ref: 0016B332
                                                                      • Part of subcall function 001505A7: GetStdHandle.KERNEL32(000000F6), ref: 001505C6
                                                                    • _wcslen.LIBCMT ref: 0016B34B
                                                                    • _wcslen.LIBCMT ref: 0016B366
                                                                    • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0016B3B6
                                                                    • GetLastError.KERNEL32(00000000), ref: 0016B407
                                                                    • CloseHandle.KERNEL32(?), ref: 0016B439
                                                                    • CloseHandle.KERNEL32(00000000), ref: 0016B44A
                                                                    • CloseHandle.KERNEL32(00000000), ref: 0016B45C
                                                                    • CloseHandle.KERNEL32(00000000), ref: 0016B46E
                                                                    • CloseHandle.KERNEL32(?), ref: 0016B4E3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                                    • String ID:
                                                                    • API String ID: 2178637699-0
                                                                    • Opcode ID: 6a9270ad4a11ab6aeb18542038f5920a86bde0e1892fba618bfa384f2232d5a0
                                                                    • Instruction ID: 553b57247031e4f75649cfac474f4afa8a24a14a803be5f95ef0a60ea4045185
                                                                    • Opcode Fuzzy Hash: 6a9270ad4a11ab6aeb18542038f5920a86bde0e1892fba618bfa384f2232d5a0
                                                                    • Instruction Fuzzy Hash: 59F19C316083409FC714EF25C891B6EBBE5BF85314F14855DF99A9B2A2DB31EC84CB52
                                                                    APIs
                                                                    • GetInputState.USER32 ref: 000ED807
                                                                    • timeGetTime.WINMM ref: 000EDA07
                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 000EDB28
                                                                    • TranslateMessage.USER32(?), ref: 000EDB7B
                                                                    • DispatchMessageW.USER32(?), ref: 000EDB89
                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 000EDB9F
                                                                    • Sleep.KERNELBASE(0000000A), ref: 000EDBB1
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                                    • String ID:
                                                                    • API String ID: 2189390790-0
                                                                    • Opcode ID: bd2753031f23150d7718d86e80c84ef13e065309082054aa33f87dc94b9f187d
                                                                    • Instruction ID: 3770b86be4f16ef1cd91eed690568192a93400b391929c7121a08ac8684bbfd1
                                                                    • Opcode Fuzzy Hash: bd2753031f23150d7718d86e80c84ef13e065309082054aa33f87dc94b9f187d
                                                                    • Instruction Fuzzy Hash: 3542F330608381EFD738DF25C894BAAB7E1FF45314F54462EE4959B692D774E884CB82

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • GetSysColorBrush.USER32(0000000F), ref: 000E2D07
                                                                    • RegisterClassExW.USER32(00000030), ref: 000E2D31
                                                                    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 000E2D42
                                                                    • InitCommonControlsEx.COMCTL32(?), ref: 000E2D5F
                                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 000E2D6F
                                                                    • LoadIconW.USER32(000000A9), ref: 000E2D85
                                                                    • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 000E2D94
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                    • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                    • API String ID: 2914291525-1005189915
                                                                    • Opcode ID: a523e1803811daf719b2c4f5d722cccb56fceccbcd2ac916978b9bfbea161170
                                                                    • Instruction ID: 5ce4c870f5ab5daa8fde393e20ad20d151f44b46caef8a88d478ee00a13d3d58
                                                                    • Opcode Fuzzy Hash: a523e1803811daf719b2c4f5d722cccb56fceccbcd2ac916978b9bfbea161170
                                                                    • Instruction Fuzzy Hash: ED21F2B5901348AFDB00DFA4EC99BDDBBB4FB08705F10821AF615A66A0D7B10584CF91

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 457 12065b-12068b call 12042f 460 1206a6-1206b2 call 115221 457->460 461 12068d-120698 call 10f2c6 457->461 466 1206b4-1206c9 call 10f2c6 call 10f2d9 460->466 467 1206cb-120714 call 12039a 460->467 468 12069a-1206a1 call 10f2d9 461->468 466->468 476 120781-12078a GetFileType 467->476 477 120716-12071f 467->477 478 12097d-120983 468->478 479 1207d3-1207d6 476->479 480 12078c-1207bd GetLastError call 10f2a3 CloseHandle 476->480 482 120721-120725 477->482 483 120756-12077c GetLastError call 10f2a3 477->483 485 1207d8-1207dd 479->485 486 1207df-1207e5 479->486 480->468 494 1207c3-1207ce call 10f2d9 480->494 482->483 487 120727-120754 call 12039a 482->487 483->468 491 1207e9-120837 call 11516a 485->491 486->491 492 1207e7 486->492 487->476 487->483 500 120847-12086b call 12014d 491->500 501 120839-120845 call 1205ab 491->501 492->491 494->468 507 12087e-1208c1 500->507 508 12086d 500->508 501->500 506 12086f-120879 call 1186ae 501->506 506->478 510 1208e2-1208f0 507->510 511 1208c3-1208c7 507->511 508->506 514 1208f6-1208fa 510->514 515 12097b 510->515 511->510 513 1208c9-1208dd 511->513 513->510 514->515 516 1208fc-12092f CloseHandle call 12039a 514->516 515->478 519 120963-120977 516->519 520 120931-12095d GetLastError call 10f2a3 call 115333 516->520 519->515 520->519
                                                                    APIs
                                                                      • Part of subcall function 0012039A: CreateFileW.KERNELBASE(00000000,00000000,?,00120704,?,?,00000000,?,00120704,00000000,0000000C), ref: 001203B7
                                                                    • GetLastError.KERNEL32 ref: 0012076F
                                                                    • __dosmaperr.LIBCMT ref: 00120776
                                                                    • GetFileType.KERNELBASE(00000000), ref: 00120782
                                                                    • GetLastError.KERNEL32 ref: 0012078C
                                                                    • __dosmaperr.LIBCMT ref: 00120795
                                                                    • CloseHandle.KERNEL32(00000000), ref: 001207B5
                                                                    • CloseHandle.KERNEL32(?), ref: 001208FF
                                                                    • GetLastError.KERNEL32 ref: 00120931
                                                                    • __dosmaperr.LIBCMT ref: 00120938
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                    • String ID: H
                                                                    • API String ID: 4237864984-2852464175
                                                                    • Opcode ID: 682475f32f79990e3f55d56647a2f11804e140684ddf5216d2bc29f0b82a68e2
                                                                    • Instruction ID: 6ad633e4d8e4fb5f4b69b38eaa75c3b540831cd1151298511d5f75bd22ef393f
                                                                    • Opcode Fuzzy Hash: 682475f32f79990e3f55d56647a2f11804e140684ddf5216d2bc29f0b82a68e2
                                                                    • Instruction Fuzzy Hash: 8FA10732A041188FDF1AEF68E8517AE7BB0AB4A320F14025DF8559B3D2D7319D63CB91

                                                                    Control-flow Graph

                                                                    APIs
                                                                      • Part of subcall function 000E3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,001B1418,?,000E2E7F,?,?,?,00000000), ref: 000E3A78
                                                                      • Part of subcall function 000E3357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 000E3379
                                                                    • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 000E356A
                                                                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0012318D
                                                                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 001231CE
                                                                    • RegCloseKey.ADVAPI32(?), ref: 00123210
                                                                    • _wcslen.LIBCMT ref: 00123277
                                                                    • _wcslen.LIBCMT ref: 00123286
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                                    • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                    • API String ID: 98802146-2727554177
                                                                    • Opcode ID: 8d10b85a1f0ad3953d7dea91793ca79f6620e08a43f6c026747b3b4ba3c0f42c
                                                                    • Instruction ID: b010fc5605dc9a80f80057e2c18662476fed96291775c90aaf8db13e96064622
                                                                    • Opcode Fuzzy Hash: 8d10b85a1f0ad3953d7dea91793ca79f6620e08a43f6c026747b3b4ba3c0f42c
                                                                    • Instruction Fuzzy Hash: D171A2715043419EC314EF26EC858ABBBE8FF99740F404A2EF555931B1EB749A88CB62

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • GetSysColorBrush.USER32(0000000F), ref: 000E2B8E
                                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 000E2B9D
                                                                    • LoadIconW.USER32(00000063), ref: 000E2BB3
                                                                    • LoadIconW.USER32(000000A4), ref: 000E2BC5
                                                                    • LoadIconW.USER32(000000A2), ref: 000E2BD7
                                                                    • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 000E2BEF
                                                                    • RegisterClassExW.USER32(?), ref: 000E2C40
                                                                      • Part of subcall function 000E2CD4: GetSysColorBrush.USER32(0000000F), ref: 000E2D07
                                                                      • Part of subcall function 000E2CD4: RegisterClassExW.USER32(00000030), ref: 000E2D31
                                                                      • Part of subcall function 000E2CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 000E2D42
                                                                      • Part of subcall function 000E2CD4: InitCommonControlsEx.COMCTL32(?), ref: 000E2D5F
                                                                      • Part of subcall function 000E2CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 000E2D6F
                                                                      • Part of subcall function 000E2CD4: LoadIconW.USER32(000000A9), ref: 000E2D85
                                                                      • Part of subcall function 000E2CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 000E2D94
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                    • String ID: #$0$AutoIt v3
                                                                    • API String ID: 423443420-4155596026
                                                                    • Opcode ID: 4a2aa5ef948934f0c1c5d12359921e10e9f25f2177a83c07f1a0b0ec1efc2039
                                                                    • Instruction ID: 533c9428abad1b694f9ce4e34632a865a5413e6a12b186dc797b90d396c6191d
                                                                    • Opcode Fuzzy Hash: 4a2aa5ef948934f0c1c5d12359921e10e9f25f2177a83c07f1a0b0ec1efc2039
                                                                    • Instruction Fuzzy Hash: 28212C71E00354BFDB109FA6EC65AAD7FF4FB48B60F55411AE504A6AB0E7B10580CF90

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 598 e3170-e3185 599 e3187-e318a 598->599 600 e31e5-e31e7 598->600 601 e318c-e3193 599->601 602 e31eb 599->602 600->599 603 e31e9 600->603 604 e3199-e319e 601->604 605 e3265-e326d PostQuitMessage 601->605 607 122dfb-122e23 call e18e2 call fe499 602->607 608 e31f1-e31f6 602->608 606 e31d0-e31d8 DefWindowProcW 603->606 610 e31a4-e31a8 604->610 611 122e7c-122e90 call 14bf30 604->611 613 e3219-e321b 605->613 612 e31de-e31e4 606->612 643 122e28-122e2f 607->643 614 e321d-e3244 SetTimer RegisterWindowMessageW 608->614 615 e31f8-e31fb 608->615 619 e31ae-e31b3 610->619 620 122e68-122e72 call 14c161 610->620 611->613 637 122e96 611->637 613->612 614->613 621 e3246-e3251 CreatePopupMenu 614->621 616 122d9c-122d9f 615->616 617 e3201-e3214 KillTimer call e30f2 call e3c50 615->617 629 122da1-122da5 616->629 630 122dd7-122df6 MoveWindow 616->630 617->613 626 e31b9-e31be 619->626 627 122e4d-122e54 619->627 633 122e77 620->633 621->613 635 e31c4-e31ca 626->635 636 e3253-e3263 call e326f 626->636 627->606 631 122e5a-122e63 call 140ad7 627->631 638 122dc6-122dd2 SetFocus 629->638 639 122da7-122daa 629->639 630->613 631->606 633->613 635->606 635->643 636->613 637->606 638->613 639->635 644 122db0-122dc1 call e18e2 639->644 643->606 647 122e35-122e48 call e30f2 call e3837 643->647 644->613 647->606
                                                                    APIs
                                                                    • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,000E316A,?,?), ref: 000E31D8
                                                                    • KillTimer.USER32(?,00000001,?,?,?,?,?,000E316A,?,?), ref: 000E3204
                                                                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 000E3227
                                                                    • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,000E316A,?,?), ref: 000E3232
                                                                    • CreatePopupMenu.USER32 ref: 000E3246
                                                                    • PostQuitMessage.USER32(00000000), ref: 000E3267
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                    • String ID: TaskbarCreated
                                                                    • API String ID: 129472671-2362178303
                                                                    • Opcode ID: 022dde7e067626818132b1bfd0b1b177475318d249415da4687565e8c8e01f2c
                                                                    • Instruction ID: e15c5af08c2acff9a071e7a0ec8beab98d1627cd054cff1fa5f18af2280651f3
                                                                    • Opcode Fuzzy Hash: 022dde7e067626818132b1bfd0b1b177475318d249415da4687565e8c8e01f2c
                                                                    • Instruction Fuzzy Hash: 08417C31204284BFDB281B799D2DBFD3EA6E745340F44026DFA45B75A2DB718AC097A1

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 664 e2c63-e2cd3 CreateWindowExW * 2 ShowWindow * 2
                                                                    APIs
                                                                    • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 000E2C91
                                                                    • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 000E2CB2
                                                                    • ShowWindow.USER32(00000000,?,?,?,?,?,?,000E1CAD,?), ref: 000E2CC6
                                                                    • ShowWindow.USER32(00000000,?,?,?,?,?,?,000E1CAD,?), ref: 000E2CCF
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Window$CreateShow
                                                                    • String ID: AutoIt v3$edit
                                                                    • API String ID: 1584632944-3779509399
                                                                    • Opcode ID: a5634807e16b2b3864752d711b9008d2d9269efc2f836c697fe55870bec81a9f
                                                                    • Instruction ID: 8aace35c873545533b96f8660e7ac14e683e39b126535b838a231af8da7f3fb6
                                                                    • Opcode Fuzzy Hash: a5634807e16b2b3864752d711b9008d2d9269efc2f836c697fe55870bec81a9f
                                                                    • Instruction Fuzzy Hash: FDF03A755402907AEB300727AC18E773EBDE7C6F60B56411EFA04A29B0E7610880DBB0

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 779 14e97b-14e986 780 14e988 779->780 781 14e9f9-14e9fb 779->781 782 14e98e-14e991 780->782 783 14e98a-14e98c 780->783 785 14e9f2 782->785 786 14e993-14e99f QueryPerformanceCounter 782->786 784 14e9f3 Sleep 783->784 784->781 785->784 786->785 787 14e9a1-14e9a5 QueryPerformanceFrequency 786->787 788 14e9ab-14e9ee Sleep QueryPerformanceCounter call 1220b0 787->788 791 14e9f0 788->791 791->781
                                                                    APIs
                                                                    • QueryPerformanceCounter.KERNEL32(?), ref: 0014E997
                                                                    • QueryPerformanceFrequency.KERNEL32(?), ref: 0014E9A5
                                                                    • Sleep.KERNEL32(00000000), ref: 0014E9AD
                                                                    • QueryPerformanceCounter.KERNEL32(?), ref: 0014E9B7
                                                                    • Sleep.KERNELBASE ref: 0014E9F3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                    • String ID:
                                                                    • API String ID: 2833360925-0
                                                                    • Opcode ID: 7de09f1a7cac8d17f66daaa9c72a19e1764c729641574919951ff312221a307f
                                                                    • Instruction ID: 3a7ecfa11c0f28e5dd9ee3fe9ae0c7bc704ab9e2b41d720797cb007a03e7ab3e
                                                                    • Opcode Fuzzy Hash: 7de09f1a7cac8d17f66daaa9c72a19e1764c729641574919951ff312221a307f
                                                                    • Instruction Fuzzy Hash: 9D014C31C0162DDBCF04AFE5DC69AEDBBB8FF09715F41055AE502B22A1DB309594CBA1

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 828 e3b1c-e3b27 829 e3b99-e3b9b 828->829 830 e3b29-e3b2e 828->830 832 e3b8c-e3b8f 829->832 830->829 831 e3b30-e3b48 RegOpenKeyExW 830->831 831->829 833 e3b4a-e3b69 RegQueryValueExW 831->833 834 e3b6b-e3b76 833->834 835 e3b80-e3b8b RegCloseKey 833->835 836 e3b78-e3b7a 834->836 837 e3b90-e3b97 834->837 835->832 838 e3b7e 836->838 837->838 838->835
                                                                    APIs
                                                                    • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,000E3B0F,SwapMouseButtons,00000004,?), ref: 000E3B40
                                                                    • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,000E3B0F,SwapMouseButtons,00000004,?), ref: 000E3B61
                                                                    • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,000E3B0F,SwapMouseButtons,00000004,?), ref: 000E3B83
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CloseOpenQueryValue
                                                                    • String ID: Control Panel\Mouse
                                                                    • API String ID: 3677997916-824357125
                                                                    • Opcode ID: c6c9623ee3b44351620aa980c59ce1e0fb6325c734e66e72aa7ae98ecc3c10a9
                                                                    • Instruction ID: 712a9717a63f9b2df711b774e90c61ae840cb3b339e8a6680eeace54cff4d22b
                                                                    • Opcode Fuzzy Hash: c6c9623ee3b44351620aa980c59ce1e0fb6325c734e66e72aa7ae98ecc3c10a9
                                                                    • Instruction Fuzzy Hash: D5112AB5510248FFDB608FA6DC48AAEBBBCEF84744B10455AFA06E7110D3319E8097A0

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 845 e3923-e3939 846 e393f-e3954 call e6270 845->846 847 e3a13-e3a17 845->847 850 123393-1233a2 LoadStringW 846->850 851 e395a-e3976 call e6b57 846->851 853 1233ad-1233b6 850->853 857 e397c-e3980 851->857 858 1233c9-1233e5 call e6350 call e3fcf 851->858 855 e3994-e3a0e call 102340 call e3a18 call 104983 Shell_NotifyIconW call e988f 853->855 856 1233bc-1233c4 call ea8c7 853->856 855->847 856->855 857->853 860 e3986-e398f call e6350 857->860 858->855 871 1233eb-123409 call e33c6 call e3fcf call e33c6 858->871 860->855 871->855
                                                                    APIs
                                                                    • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 001233A2
                                                                      • Part of subcall function 000E6B57: _wcslen.LIBCMT ref: 000E6B6A
                                                                    • Shell_NotifyIconW.SHELL32(00000001,?), ref: 000E3A04
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: IconLoadNotifyShell_String_wcslen
                                                                    • String ID: Line:
                                                                    • API String ID: 2289894680-1585850449
                                                                    • Opcode ID: 4a7e99b6af21361f21506709241ac7a00657bb6199bf31c6c74dfc6d1c9f92d2
                                                                    • Instruction ID: cfb5c25639a4b99e43a56184a4f8303d46e3e3fef0cf20173031872ba80d2597
                                                                    • Opcode Fuzzy Hash: 4a7e99b6af21361f21506709241ac7a00657bb6199bf31c6c74dfc6d1c9f92d2
                                                                    • Instruction Fuzzy Hash: 5631C671408384AEC325EB21DC49BDBB7D8AB44710F10492EF599A3492EF709788C7D2
                                                                    APIs
                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00100668
                                                                      • Part of subcall function 001032A4: RaiseException.KERNEL32(?,?,?,0010068A,?,001B1444,?,?,?,?,?,?,0010068A,000E1129,001A8738,000E1129), ref: 00103304
                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00100685
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Exception@8Throw$ExceptionRaise
                                                                    • String ID: Unknown exception
                                                                    • API String ID: 3476068407-410509341
                                                                    • Opcode ID: 77be39b427834d7f4abf3c253d139d34847c60374fbd82b5ff31cca6998546dc
                                                                    • Instruction ID: e508d28ed568cb3acc8a4abc370092efc549cd0636609b536fd7b338c7987066
                                                                    • Opcode Fuzzy Hash: 77be39b427834d7f4abf3c253d139d34847c60374fbd82b5ff31cca6998546dc
                                                                    • Instruction Fuzzy Hash: 53F0F63890020DB7CB01B6A5DC46EAE7BAE6F14350F604531B968D69D1EFF2EA66C5C0
                                                                    APIs
                                                                      • Part of subcall function 000E1BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 000E1BF4
                                                                      • Part of subcall function 000E1BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 000E1BFC
                                                                      • Part of subcall function 000E1BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 000E1C07
                                                                      • Part of subcall function 000E1BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 000E1C12
                                                                      • Part of subcall function 000E1BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 000E1C1A
                                                                      • Part of subcall function 000E1BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 000E1C22
                                                                      • Part of subcall function 000E1B4A: RegisterWindowMessageW.USER32(00000004,?,000E12C4), ref: 000E1BA2
                                                                    • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 000E136A
                                                                    • OleInitialize.OLE32 ref: 000E1388
                                                                    • CloseHandle.KERNEL32(00000000,00000000), ref: 001224AB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                    • String ID:
                                                                    • API String ID: 1986988660-0
                                                                    • Opcode ID: 144eb51398f37ef057ee0ae57d832de62849fc0b8b1bd926840931550a3ffe25
                                                                    • Instruction ID: fadb86ed8b935737f87b5bb03d7653cdd95d6944f9f863207ee212522e8f78e6
                                                                    • Opcode Fuzzy Hash: 144eb51398f37ef057ee0ae57d832de62849fc0b8b1bd926840931550a3ffe25
                                                                    • Instruction Fuzzy Hash: C971C4B5911340AFC3A4DF7AE9756953BE1FB8A3443D6832ED40AE7A62EB304481CF51
                                                                    APIs
                                                                      • Part of subcall function 000E3923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 000E3A04
                                                                    • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0014C259
                                                                    • KillTimer.USER32(?,00000001,?,?), ref: 0014C261
                                                                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0014C270
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: IconNotifyShell_Timer$Kill
                                                                    • String ID:
                                                                    • API String ID: 3500052701-0
                                                                    • Opcode ID: db4769b1ba83525fc151634c4bab0b64078d2c47a0161d92a33a9381d128a40b
                                                                    • Instruction ID: 37eb5736b5d4d031891fab25b10e7f3e5d077cc5dfe318e6a166fd15a02d8b0b
                                                                    • Opcode Fuzzy Hash: db4769b1ba83525fc151634c4bab0b64078d2c47a0161d92a33a9381d128a40b
                                                                    • Instruction Fuzzy Hash: 3A31C370905344AFEB629F648855BE7BBFCAB16308F00049EE2DEA7251C7B45AC4CB91
                                                                    APIs
                                                                    • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,001185CC,?,001A8CC8,0000000C), ref: 00118704
                                                                    • GetLastError.KERNEL32(?,001185CC,?,001A8CC8,0000000C), ref: 0011870E
                                                                    • __dosmaperr.LIBCMT ref: 00118739
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ChangeCloseErrorFindLastNotification__dosmaperr
                                                                    • String ID:
                                                                    • API String ID: 490808831-0
                                                                    • Opcode ID: 59daee6fb79374a969dcfa6a628fc1bb5510cc8640bac9b3efd7e3f957f284cc
                                                                    • Instruction ID: 84fa7c66c65681f407d9ae5b422ef8be19b3d142edf4e557b770eb71d76d3110
                                                                    • Opcode Fuzzy Hash: 59daee6fb79374a969dcfa6a628fc1bb5510cc8640bac9b3efd7e3f957f284cc
                                                                    • Instruction Fuzzy Hash: 98014E32A1562057D76D633468457FE675A5BD1774F39423EF8189B1D2DFA0CCC1C190
                                                                    APIs
                                                                    • TranslateMessage.USER32(?), ref: 000EDB7B
                                                                    • DispatchMessageW.USER32(?), ref: 000EDB89
                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 000EDB9F
                                                                    • Sleep.KERNELBASE(0000000A), ref: 000EDBB1
                                                                    • TranslateAcceleratorW.USER32(?,?,?), ref: 00131CC9
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                                                    • String ID:
                                                                    • API String ID: 3288985973-0
                                                                    • Opcode ID: 99a1a10d1577ab7ecc2c246c04a69ef3615496933f763cd33901dffb9854c11e
                                                                    • Instruction ID: bebab3d4a58fcc19d7914b151b36d4c415a3ca6914b44d17cd1c2c9370d64e91
                                                                    • Opcode Fuzzy Hash: 99a1a10d1577ab7ecc2c246c04a69ef3615496933f763cd33901dffb9854c11e
                                                                    • Instruction Fuzzy Hash: DAF05E30644380ABE734CB61DC99FEA73BCEB44310F504619E61ED34D0EB3094C89B65
                                                                    APIs
                                                                    • __Init_thread_footer.LIBCMT ref: 000F17F6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Init_thread_footer
                                                                    • String ID: CALL
                                                                    • API String ID: 1385522511-4196123274
                                                                    • Opcode ID: 1ebd34cac06f52261ba69986066678106af564f47e98d619a039fbea2ffb7e4c
                                                                    • Instruction ID: 03634cc1eae4aef171418d5c3841735f6aca29c1d36abc54a2995ae52c3bfc46
                                                                    • Opcode Fuzzy Hash: 1ebd34cac06f52261ba69986066678106af564f47e98d619a039fbea2ffb7e4c
                                                                    • Instruction Fuzzy Hash: 51228B70608305DFC724DF14C480ABABBF1BF89354F14892DF69A8B6A2D771E845DB92
                                                                    APIs
                                                                    • GetOpenFileNameW.COMDLG32(?), ref: 00122C8C
                                                                      • Part of subcall function 000E3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,000E3A97,?,?,000E2E7F,?,?,?,00000000), ref: 000E3AC2
                                                                      • Part of subcall function 000E2DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 000E2DC4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Name$Path$FileFullLongOpen
                                                                    • String ID: X
                                                                    • API String ID: 779396738-3081909835
                                                                    • Opcode ID: 81e146419b7e16342f639ac4c879fe4492149ab9edb2bcfcb19116abb5d19c25
                                                                    • Instruction ID: 90fa9671892b7aa4d998116dadd34948219113d6610b21e4deaec968835224c9
                                                                    • Opcode Fuzzy Hash: 81e146419b7e16342f639ac4c879fe4492149ab9edb2bcfcb19116abb5d19c25
                                                                    • Instruction Fuzzy Hash: 7321A571A00298AFCB01DF95D849BEE7BFCAF49314F044059E515B7241DBB45A898FA1
                                                                    APIs
                                                                    • Shell_NotifyIconW.SHELL32(00000000,?), ref: 000E3908
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: IconNotifyShell_
                                                                    • String ID:
                                                                    • API String ID: 1144537725-0
                                                                    • Opcode ID: 0f3e133bb487b00bc466d9a0430bb2b7ec3cdecb10fabda155d44606c31b1b5b
                                                                    • Instruction ID: 32778ae94ebaf9c7c01d5406724a8f7d2593261109de79321a9aea6e06636b0c
                                                                    • Opcode Fuzzy Hash: 0f3e133bb487b00bc466d9a0430bb2b7ec3cdecb10fabda155d44606c31b1b5b
                                                                    • Instruction Fuzzy Hash: 0C31E670504341DFD360DF25D8987A7BBF4FB49318F00092EF69A93650E771AA84CB52
                                                                    APIs
                                                                    • timeGetTime.WINMM ref: 000FF661
                                                                      • Part of subcall function 000ED730: GetInputState.USER32 ref: 000ED807
                                                                    • Sleep.KERNEL32(00000000), ref: 0013F2DE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: InputSleepStateTimetime
                                                                    • String ID:
                                                                    • API String ID: 4149333218-0
                                                                    • Opcode ID: d9a7a5c7f126b3b5776284c19aec132be519afd6297a95d52398e930698f3250
                                                                    • Instruction ID: c6eb13c5c03f8081255979b454fe323cb32a27d49e4d7bc52ab18e1aaef633cb
                                                                    • Opcode Fuzzy Hash: d9a7a5c7f126b3b5776284c19aec132be519afd6297a95d52398e930698f3250
                                                                    • Instruction Fuzzy Hash: 44F08C312406059FD324EF6AD449BAAB7E8EF45760F00002EE95ED77A1DB70A840CB90
                                                                    APIs
                                                                    • __Init_thread_footer.LIBCMT ref: 000EBB4E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Init_thread_footer
                                                                    • String ID:
                                                                    • API String ID: 1385522511-0
                                                                    • Opcode ID: d0a877ee118f4ba8c1b90348fc9252d91995c89f03e8a22f0f1b18c8e6231a0f
                                                                    • Instruction ID: a5d7936523a593e7c2cf851a77037a85b8298f887f7c1e69f65e3d37e8953acb
                                                                    • Opcode Fuzzy Hash: d0a877ee118f4ba8c1b90348fc9252d91995c89f03e8a22f0f1b18c8e6231a0f
                                                                    • Instruction Fuzzy Hash: 0232AC30A002499FDB25CF59C8A4ABEB7F9FF48310F198059E905BB662C774ED81CB91
                                                                    APIs
                                                                    • SetWindowPos.USER32(?,000000FE,00000000,00000000,00000000,00000000,00000013,00000001,?), ref: 00172649
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Window
                                                                    • String ID:
                                                                    • API String ID: 2353593579-0
                                                                    • Opcode ID: 07ccb44221d00c8f604225ab3a44e998dd84d892cebdd6d5558af28e34e22910
                                                                    • Instruction ID: a9950ea6174ce1c4c943da2f88a8a1ba49a10eef3864e5a51e976f073e406cc4
                                                                    • Opcode Fuzzy Hash: 07ccb44221d00c8f604225ab3a44e998dd84d892cebdd6d5558af28e34e22910
                                                                    • Instruction Fuzzy Hash: FF21C274200615AFE714DF15C8D0D76B7AAEB44368B64C06DF86A8B392C771ED82CB90
                                                                    APIs
                                                                    • GetForegroundWindow.USER32(00000001,?), ref: 00171420
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ForegroundWindow
                                                                    • String ID:
                                                                    • API String ID: 2020703349-0
                                                                    • Opcode ID: e1946e9b2fda6f984a2338f73b52430e31586fc09b4293f53be04f185ec49b9e
                                                                    • Instruction ID: 545576931b1d87c4803f9c5bd8e041918dc06907f4417c00b2b7bfe69b5a7c6c
                                                                    • Opcode Fuzzy Hash: e1946e9b2fda6f984a2338f73b52430e31586fc09b4293f53be04f185ec49b9e
                                                                    • Instruction Fuzzy Hash: A3319F30604242AFD714EF29C495B69F7B2FF45328F0481A8E82A4B292DB71EC41CBD0
                                                                    APIs
                                                                      • Part of subcall function 000E4E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,000E4EDD,?,001B1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 000E4E9C
                                                                      • Part of subcall function 000E4E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 000E4EAE
                                                                      • Part of subcall function 000E4E90: FreeLibrary.KERNEL32(00000000,?,?,000E4EDD,?,001B1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 000E4EC0
                                                                    • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,001B1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 000E4EFD
                                                                      • Part of subcall function 000E4E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00123CDE,?,001B1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 000E4E62
                                                                      • Part of subcall function 000E4E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 000E4E74
                                                                      • Part of subcall function 000E4E59: FreeLibrary.KERNEL32(00000000,?,?,00123CDE,?,001B1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 000E4E87
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Library$Load$AddressFreeProc
                                                                    • String ID:
                                                                    • API String ID: 2632591731-0
                                                                    • Opcode ID: b4e0be94c8812dbc7fd67513b10abab4061f0f2ad35cc70afdedde5aa6780b22
                                                                    • Instruction ID: a4a0d93819d8fbdeb736ed34e44c1466558dec4a17edd4b6e6d433598d590cf5
                                                                    • Opcode Fuzzy Hash: b4e0be94c8812dbc7fd67513b10abab4061f0f2ad35cc70afdedde5aa6780b22
                                                                    • Instruction Fuzzy Hash: 7E11E332600205AECB24BF62DC02FED77A5AF50B15F10882EF552BA2C2EF749A559790
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: __wsopen_s
                                                                    • String ID:
                                                                    • API String ID: 3347428461-0
                                                                    • Opcode ID: 1dfa1d8f0a849528e1794698c3c42984730321dc3985bff3c8d5c2c8f85cd218
                                                                    • Instruction ID: 71d7977eb53f41f603a9d70d1fcc497900633107530231514cbf32d5456283fe
                                                                    • Opcode Fuzzy Hash: 1dfa1d8f0a849528e1794698c3c42984730321dc3985bff3c8d5c2c8f85cd218
                                                                    • Instruction Fuzzy Hash: 9411487590410AAFCF09DF58E940ADA7BF5EF48304F108069F808AB312DB30DA21CBA4
                                                                    APIs
                                                                    • GetForegroundWindow.USER32(00000000,?,?,?,001714B5,?), ref: 00172A01
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ForegroundWindow
                                                                    • String ID:
                                                                    • API String ID: 2020703349-0
                                                                    • Opcode ID: 8e2ed933e35c1e0e7917e371a3aca7b1cc4f51029c6d8fe010459cec7bec8ec6
                                                                    • Instruction ID: 68965b54e06b6efe80d5f9e4b573989cb5f427cc602f7a06ec992e5db2c5369f
                                                                    • Opcode Fuzzy Hash: 8e2ed933e35c1e0e7917e371a3aca7b1cc4f51029c6d8fe010459cec7bec8ec6
                                                                    • Instruction Fuzzy Hash: 38019E36704A519FD3288A2CC454B2277B2EBC9318F29C468C14F8B651DB32EC43C7A0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                    • Instruction ID: d2620209213d7a6693f367208c4d638242aad345e86c555162caa7e08c23434a
                                                                    • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                    • Instruction Fuzzy Hash: 64F02832510E1497DB353AAAAC05B9B33D89F72335F110B29F4A1D31D2DFF1D8428AA5
                                                                    APIs
                                                                    • GetForegroundWindow.USER32(?), ref: 001714EB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ForegroundWindow
                                                                    • String ID:
                                                                    • API String ID: 2020703349-0
                                                                    • Opcode ID: 5a2518a73a817fb64f607bcc36c06810251f002742cecc85628ddbc7ca5a2d6a
                                                                    • Instruction ID: 7570e6926012013644d2ca3ae12a92cd30f610fcb044e54ecc2ba4ce6d70bb59
                                                                    • Opcode Fuzzy Hash: 5a2518a73a817fb64f607bcc36c06810251f002742cecc85628ddbc7ca5a2d6a
                                                                    • Instruction Fuzzy Hash: 3E01BC35208651AF9320CF6EC440826BBA5EB94328754C0A9E84E8B702E732DD82CB80
                                                                    APIs
                                                                    • RtlAllocateHeap.NTDLL(00000000,?,001B1444,?,000FFDF5,?,?,000EA976,00000010,001B1440,000E13FC,?,000E13C6,?,000E1129), ref: 00113852
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: AllocateHeap
                                                                    • String ID:
                                                                    • API String ID: 1279760036-0
                                                                    • Opcode ID: 93307d8b1e75a2b0e3bd630224c8965ba14dd97fe34f56c574dd244c8094d78e
                                                                    • Instruction ID: 9fca07d00f746f88232fb688b22e2daaa683fb135fe21ea40e7327404b57be16
                                                                    • Opcode Fuzzy Hash: 93307d8b1e75a2b0e3bd630224c8965ba14dd97fe34f56c574dd244c8094d78e
                                                                    • Instruction Fuzzy Hash: 1DE02231100224A7E7392B779C05BDB3788AF427B0F060338BD78928D8DB60EEC182E0
                                                                    APIs
                                                                    • FreeLibrary.KERNEL32(?,?,001B1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 000E4F6D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: FreeLibrary
                                                                    • String ID:
                                                                    • API String ID: 3664257935-0
                                                                    • Opcode ID: 3c0482f246547ce9ae28e5d2535740717eabb9f012e133b513bbcadc8984b45f
                                                                    • Instruction ID: 4b26e404e029dfa0ae1e8facc78af9a5ea0f665ab751f7ecd18cfae2608c900b
                                                                    • Opcode Fuzzy Hash: 3c0482f246547ce9ae28e5d2535740717eabb9f012e133b513bbcadc8984b45f
                                                                    • Instruction Fuzzy Hash: 6EF03071105791CFDB349F66D494816B7F4BF14719310897EE1EA93911C7359C84DF50
                                                                    APIs
                                                                    • IsWindow.USER32(00000000), ref: 00172A66
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Window
                                                                    • String ID:
                                                                    • API String ID: 2353593579-0
                                                                    • Opcode ID: bfda5f1ecdd1e35ded71971d2b26d0b4719da09ae16316adb3721e43c67f3ca3
                                                                    • Instruction ID: 952117c747fea28f4aa0f5fe72b42e559131321d00f4e16c3919dda774a71d2c
                                                                    • Opcode Fuzzy Hash: bfda5f1ecdd1e35ded71971d2b26d0b4719da09ae16316adb3721e43c67f3ca3
                                                                    • Instruction Fuzzy Hash: 12E04F36350116ABC714EA30EC809FA736CEB60395B10853AFC2AD7510DB3099D686E0
                                                                    APIs
                                                                    • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 000E2DC4
                                                                      • Part of subcall function 000E6B57: _wcslen.LIBCMT ref: 000E6B6A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: LongNamePath_wcslen
                                                                    • String ID:
                                                                    • API String ID: 541455249-0
                                                                    • Opcode ID: 483f2945dec248446273f3af509207e46dfc64187cf98dfdde97a1beb009645e
                                                                    • Instruction ID: 242a0333014ffa3de6380677a091ac7beb224ceec8ba0fccdbe9e9333e366522
                                                                    • Opcode Fuzzy Hash: 483f2945dec248446273f3af509207e46dfc64187cf98dfdde97a1beb009645e
                                                                    • Instruction Fuzzy Hash: 4AE0CD726001246BC710D258AC05FDA77EDDFC87D0F040075FD09E7259DA60ADC48590
                                                                    APIs
                                                                      • Part of subcall function 000E3837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 000E3908
                                                                      • Part of subcall function 000ED730: GetInputState.USER32 ref: 000ED807
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 000E2B6B
                                                                      • Part of subcall function 000E30F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 000E314E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                                    • String ID:
                                                                    • API String ID: 3667716007-0
                                                                    • Opcode ID: 33b01327ec3fce1976c66cd2ba17cfc2c3654febf32fe29f788da417d462318b
                                                                    • Instruction ID: 4b455fa54bdde84d70b3aa663f8008ab3b7458c67ffcc36eead66e26213681c9
                                                                    • Opcode Fuzzy Hash: 33b01327ec3fce1976c66cd2ba17cfc2c3654febf32fe29f788da417d462318b
                                                                    • Instruction Fuzzy Hash: 4BE026213042C41FC608BB32A86A4EDBB599BD1311F80053EF08273163CF2089854351
                                                                    APIs
                                                                    • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00143D18
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSendTimeout
                                                                    • String ID:
                                                                    • API String ID: 1599653421-0
                                                                    • Opcode ID: 8f3b4f027378a487f827f45df419db9841c3eebec4f9ae79a34708c0aa2e9278
                                                                    • Instruction ID: 973926c86bc00bbcfbeb3f7363ef65e67b77706276896723d287cf68d88e5e54
                                                                    • Opcode Fuzzy Hash: 8f3b4f027378a487f827f45df419db9841c3eebec4f9ae79a34708c0aa2e9278
                                                                    • Instruction Fuzzy Hash: B4D08CF06A03087EFB0083718C0BEBB33ACC316E81F004BA87E02D69C1E9A0DE080170
                                                                    APIs
                                                                    • CreateFileW.KERNELBASE(00000000,00000000,?,00120704,?,?,00000000,?,00120704,00000000,0000000C), ref: 001203B7
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CreateFile
                                                                    • String ID:
                                                                    • API String ID: 823142352-0
                                                                    • Opcode ID: 24a04cfc24865ee13f04003916b64027eeda2cf5750df433686c2c6920333d64
                                                                    • Instruction ID: 86ac1e53c0dec05b2591d057e9542579eb3b9b194cd6863d17bcd95a800418ca
                                                                    • Opcode Fuzzy Hash: 24a04cfc24865ee13f04003916b64027eeda2cf5750df433686c2c6920333d64
                                                                    • Instruction Fuzzy Hash: 98D06C3204010DFBDF029F84DD06EDA3BAAFB48714F014050BE1856020C732E8A1AB90
                                                                    APIs
                                                                    • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 000E1CBC
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: InfoParametersSystem
                                                                    • String ID:
                                                                    • API String ID: 3098949447-0
                                                                    • Opcode ID: e7273f9e2104c3c4178c5afa2e9d50bb2772ca15ea080fc457e00e4f478bb1e0
                                                                    • Instruction ID: e8f532daeef6f2bded6372a7aa16c6c0b521c00f34aaddd44af665d477328e52
                                                                    • Opcode Fuzzy Hash: e7273f9e2104c3c4178c5afa2e9d50bb2772ca15ea080fc457e00e4f478bb1e0
                                                                    • Instruction Fuzzy Hash: 5EC09236380305AFF2248B80BC5AF5077A4B348B10F488101F60DA9DF3D3B228E0EB90
                                                                    APIs
                                                                      • Part of subcall function 000F9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 000F9BB2
                                                                    • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0017961A
                                                                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0017965B
                                                                    • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 0017969F
                                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 001796C9
                                                                    • SendMessageW.USER32 ref: 001796F2
                                                                    • GetKeyState.USER32(00000011), ref: 0017978B
                                                                    • GetKeyState.USER32(00000009), ref: 00179798
                                                                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 001797AE
                                                                    • GetKeyState.USER32(00000010), ref: 001797B8
                                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 001797E9
                                                                    • SendMessageW.USER32 ref: 00179810
                                                                    • SendMessageW.USER32(?,00001030,?,00177E95), ref: 00179918
                                                                    • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0017992E
                                                                    • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00179941
                                                                    • SetCapture.USER32(?), ref: 0017994A
                                                                    • ClientToScreen.USER32(?,?), ref: 001799AF
                                                                    • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 001799BC
                                                                    • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 001799D6
                                                                    • ReleaseCapture.USER32 ref: 001799E1
                                                                    • GetCursorPos.USER32(?), ref: 00179A19
                                                                    • ScreenToClient.USER32(?,?), ref: 00179A26
                                                                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 00179A80
                                                                    • SendMessageW.USER32 ref: 00179AAE
                                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00179AEB
                                                                    • SendMessageW.USER32 ref: 00179B1A
                                                                    • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00179B3B
                                                                    • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00179B4A
                                                                    • GetCursorPos.USER32(?), ref: 00179B68
                                                                    • ScreenToClient.USER32(?,?), ref: 00179B75
                                                                    • GetParent.USER32(?), ref: 00179B93
                                                                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 00179BFA
                                                                    • SendMessageW.USER32 ref: 00179C2B
                                                                    • ClientToScreen.USER32(?,?), ref: 00179C84
                                                                    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00179CB4
                                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00179CDE
                                                                    • SendMessageW.USER32 ref: 00179D01
                                                                    • ClientToScreen.USER32(?,?), ref: 00179D4E
                                                                    • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00179D82
                                                                      • Part of subcall function 000F9944: GetWindowLongW.USER32(?,000000EB), ref: 000F9952
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00179E05
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                                    • String ID: @GUI_DRAGID$F
                                                                    • API String ID: 3429851547-4164748364
                                                                    • Opcode ID: ccf67c747331e33b0be9c9b092d860ee6d27fd74067774cc4812c971d035fd2c
                                                                    • Instruction ID: 1268ddb51f96535b40e6e7e03519d52c9f2f9f07aecb04be9ef1fa0cd5a86f89
                                                                    • Opcode Fuzzy Hash: ccf67c747331e33b0be9c9b092d860ee6d27fd74067774cc4812c971d035fd2c
                                                                    • Instruction Fuzzy Hash: FD429C74204241AFDB24CF24CC84AAABBF5FF49314F11861DF69D976A1D731A898CF91
                                                                    APIs
                                                                    • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 001748F3
                                                                    • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00174908
                                                                    • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00174927
                                                                    • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 0017494B
                                                                    • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 0017495C
                                                                    • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 0017497B
                                                                    • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 001749AE
                                                                    • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 001749D4
                                                                    • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00174A0F
                                                                    • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00174A56
                                                                    • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00174A7E
                                                                    • IsMenu.USER32(?), ref: 00174A97
                                                                    • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00174AF2
                                                                    • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00174B20
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00174B94
                                                                    • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00174BE3
                                                                    • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00174C82
                                                                    • wsprintfW.USER32 ref: 00174CAE
                                                                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00174CC9
                                                                    • GetWindowTextW.USER32(?,00000000,00000001), ref: 00174CF1
                                                                    • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00174D13
                                                                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00174D33
                                                                    • GetWindowTextW.USER32(?,00000000,00000001), ref: 00174D5A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                                    • String ID: %d/%02d/%02d
                                                                    • API String ID: 4054740463-328681919
                                                                    • Opcode ID: bd271060682a7edb22567e142ac07c0696c359f4cfd033599fcd9d29e7acafc6
                                                                    • Instruction ID: b54e21ba96acb3fa94f4023aab3a46688be63e7040f8d7c32820e4e6c3d16cd1
                                                                    • Opcode Fuzzy Hash: bd271060682a7edb22567e142ac07c0696c359f4cfd033599fcd9d29e7acafc6
                                                                    • Instruction Fuzzy Hash: 9E12A071600259ABEB258F68CC49FEE7BF8AF45710F108129F51AEB2E1DB749981CB50
                                                                    APIs
                                                                    • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 000FF998
                                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0013F474
                                                                    • IsIconic.USER32(00000000), ref: 0013F47D
                                                                    • ShowWindow.USER32(00000000,00000009), ref: 0013F48A
                                                                    • SetForegroundWindow.USER32(00000000), ref: 0013F494
                                                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0013F4AA
                                                                    • GetCurrentThreadId.KERNEL32 ref: 0013F4B1
                                                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0013F4BD
                                                                    • AttachThreadInput.USER32(?,00000000,00000001), ref: 0013F4CE
                                                                    • AttachThreadInput.USER32(?,00000000,00000001), ref: 0013F4D6
                                                                    • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 0013F4DE
                                                                    • SetForegroundWindow.USER32(00000000), ref: 0013F4E1
                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 0013F4F6
                                                                    • keybd_event.USER32(00000012,00000000), ref: 0013F501
                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 0013F50B
                                                                    • keybd_event.USER32(00000012,00000000), ref: 0013F510
                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 0013F519
                                                                    • keybd_event.USER32(00000012,00000000), ref: 0013F51E
                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 0013F528
                                                                    • keybd_event.USER32(00000012,00000000), ref: 0013F52D
                                                                    • SetForegroundWindow.USER32(00000000), ref: 0013F530
                                                                    • AttachThreadInput.USER32(?,000000FF,00000000), ref: 0013F557
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                    • String ID: Shell_TrayWnd
                                                                    • API String ID: 4125248594-2988720461
                                                                    • Opcode ID: e17466215dc916c9c8e62d444e02f3fd76a3515793eff1e3ea1ed551fc7879d8
                                                                    • Instruction ID: ffd468cce9b8557516ccd6b325a060b8006b9e009f33e8aea7ee2e9d5acac2a6
                                                                    • Opcode Fuzzy Hash: e17466215dc916c9c8e62d444e02f3fd76a3515793eff1e3ea1ed551fc7879d8
                                                                    • Instruction Fuzzy Hash: 95313071B40218BBEB206BB55C4AFBF7E7CEB44B50F104069FA05EA1D1D7B15D81AEA0
                                                                    APIs
                                                                      • Part of subcall function 001416C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0014170D
                                                                      • Part of subcall function 001416C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0014173A
                                                                      • Part of subcall function 001416C3: GetLastError.KERNEL32 ref: 0014174A
                                                                    • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00141286
                                                                    • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 001412A8
                                                                    • CloseHandle.KERNEL32(?), ref: 001412B9
                                                                    • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 001412D1
                                                                    • GetProcessWindowStation.USER32 ref: 001412EA
                                                                    • SetProcessWindowStation.USER32(00000000), ref: 001412F4
                                                                    • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00141310
                                                                      • Part of subcall function 001410BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,001411FC), ref: 001410D4
                                                                      • Part of subcall function 001410BF: CloseHandle.KERNEL32(?,?,001411FC), ref: 001410E9
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                                    • String ID: $default$winsta0
                                                                    • API String ID: 22674027-1027155976
                                                                    • Opcode ID: dadda70f72b34019b8480501e361d349916e36cd79c427061781f6a424cc65ca
                                                                    • Instruction ID: 87ea4d886ab63bbc70e5b5d15210d62107e7d65af7e2100777bde6cbe9b99a80
                                                                    • Opcode Fuzzy Hash: dadda70f72b34019b8480501e361d349916e36cd79c427061781f6a424cc65ca
                                                                    • Instruction Fuzzy Hash: 12817971900209BBDF219FA4DC49FEE7BB9EF08704F184129FA15A62A0D7759AC4CB60
                                                                    APIs
                                                                      • Part of subcall function 001410F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00141114
                                                                      • Part of subcall function 001410F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00140B9B,?,?,?), ref: 00141120
                                                                      • Part of subcall function 001410F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00140B9B,?,?,?), ref: 0014112F
                                                                      • Part of subcall function 001410F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00140B9B,?,?,?), ref: 00141136
                                                                      • Part of subcall function 001410F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0014114D
                                                                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00140BCC
                                                                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00140C00
                                                                    • GetLengthSid.ADVAPI32(?), ref: 00140C17
                                                                    • GetAce.ADVAPI32(?,00000000,?), ref: 00140C51
                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00140C6D
                                                                    • GetLengthSid.ADVAPI32(?), ref: 00140C84
                                                                    • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00140C8C
                                                                    • HeapAlloc.KERNEL32(00000000), ref: 00140C93
                                                                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00140CB4
                                                                    • CopySid.ADVAPI32(00000000), ref: 00140CBB
                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00140CEA
                                                                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00140D0C
                                                                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00140D1E
                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00140D45
                                                                    • HeapFree.KERNEL32(00000000), ref: 00140D4C
                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00140D55
                                                                    • HeapFree.KERNEL32(00000000), ref: 00140D5C
                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00140D65
                                                                    • HeapFree.KERNEL32(00000000), ref: 00140D6C
                                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00140D78
                                                                    • HeapFree.KERNEL32(00000000), ref: 00140D7F
                                                                      • Part of subcall function 00141193: GetProcessHeap.KERNEL32(00000008,00140BB1,?,00000000,?,00140BB1,?), ref: 001411A1
                                                                      • Part of subcall function 00141193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00140BB1,?), ref: 001411A8
                                                                      • Part of subcall function 00141193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00140BB1,?), ref: 001411B7
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                    • String ID:
                                                                    • API String ID: 4175595110-0
                                                                    • Opcode ID: 520e6ad2f0a8d47d3edd3b4f077633a72b23bd0c7bcb7bc7684e94766a02e54e
                                                                    • Instruction ID: fdafa3ed0508185c93aeb6f7111c19ffa1c4be41e0499d8c7e25486f317da881
                                                                    • Opcode Fuzzy Hash: 520e6ad2f0a8d47d3edd3b4f077633a72b23bd0c7bcb7bc7684e94766a02e54e
                                                                    • Instruction Fuzzy Hash: 97716075900209EBDF11DFE5DC44FAEBBB8BF08310F144529FA18A7161D771AA85CBA0
                                                                    APIs
                                                                    • OpenClipboard.USER32(0017CC08), ref: 0015EB29
                                                                    • IsClipboardFormatAvailable.USER32(0000000D), ref: 0015EB37
                                                                    • GetClipboardData.USER32(0000000D), ref: 0015EB43
                                                                    • CloseClipboard.USER32 ref: 0015EB4F
                                                                    • GlobalLock.KERNEL32(00000000), ref: 0015EB87
                                                                    • CloseClipboard.USER32 ref: 0015EB91
                                                                    • GlobalUnlock.KERNEL32(00000000,00000000), ref: 0015EBBC
                                                                    • IsClipboardFormatAvailable.USER32(00000001), ref: 0015EBC9
                                                                    • GetClipboardData.USER32(00000001), ref: 0015EBD1
                                                                    • GlobalLock.KERNEL32(00000000), ref: 0015EBE2
                                                                    • GlobalUnlock.KERNEL32(00000000,?), ref: 0015EC22
                                                                    • IsClipboardFormatAvailable.USER32(0000000F), ref: 0015EC38
                                                                    • GetClipboardData.USER32(0000000F), ref: 0015EC44
                                                                    • GlobalLock.KERNEL32(00000000), ref: 0015EC55
                                                                    • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 0015EC77
                                                                    • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0015EC94
                                                                    • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0015ECD2
                                                                    • GlobalUnlock.KERNEL32(00000000,?,?), ref: 0015ECF3
                                                                    • CountClipboardFormats.USER32 ref: 0015ED14
                                                                    • CloseClipboard.USER32 ref: 0015ED59
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                                    • String ID:
                                                                    • API String ID: 420908878-0
                                                                    • Opcode ID: 1a58810dbee7090fdf74dae894697924657a5e6551ad99b0beabf09141fdf016
                                                                    • Instruction ID: 933939f9ad4451e1e76c560dcaa52aaa0b1e6b669eb440d6f46532154061ca78
                                                                    • Opcode Fuzzy Hash: 1a58810dbee7090fdf74dae894697924657a5e6551ad99b0beabf09141fdf016
                                                                    • Instruction Fuzzy Hash: 4261D234604201DFD318EF64D888F6A77F4AF84715F14455DF86A9B2A2CB31DE89CBA2
                                                                    APIs
                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 001569BE
                                                                    • FindClose.KERNEL32(00000000), ref: 00156A12
                                                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00156A4E
                                                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00156A75
                                                                      • Part of subcall function 000E9CB3: _wcslen.LIBCMT ref: 000E9CBD
                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00156AB2
                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00156ADF
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                                    • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                                    • API String ID: 3830820486-3289030164
                                                                    • Opcode ID: 3762f1e9a650d4f24b5e8fd83a3c4f55d8be6ba6445eafe2e8adea8133535368
                                                                    • Instruction ID: 3d8a10aed412e10eb8cc9588382054700b9cbd071cbe5a8b78ea7da03c2eb860
                                                                    • Opcode Fuzzy Hash: 3762f1e9a650d4f24b5e8fd83a3c4f55d8be6ba6445eafe2e8adea8133535368
                                                                    • Instruction Fuzzy Hash: E8D173715083409EC314EB65C881EAFB7ECAF88704F44491DF999D7152EB34DA48C7A2
                                                                    APIs
                                                                    • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 00159663
                                                                    • GetFileAttributesW.KERNEL32(?), ref: 001596A1
                                                                    • SetFileAttributesW.KERNEL32(?,?), ref: 001596BB
                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 001596D3
                                                                    • FindClose.KERNEL32(00000000), ref: 001596DE
                                                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 001596FA
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 0015974A
                                                                    • SetCurrentDirectoryW.KERNEL32(001A6B7C), ref: 00159768
                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00159772
                                                                    • FindClose.KERNEL32(00000000), ref: 0015977F
                                                                    • FindClose.KERNEL32(00000000), ref: 0015978F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                    • String ID: *.*
                                                                    • API String ID: 1409584000-438819550
                                                                    • Opcode ID: a8fa11b7a22afacff2d196fbf529f57a8fa51a1ff794c169000584f911b01118
                                                                    • Instruction ID: f4e0083da995c66b74711c757122da87cea38fc89fa9e5aedf8b9e5e3c77b0a7
                                                                    • Opcode Fuzzy Hash: a8fa11b7a22afacff2d196fbf529f57a8fa51a1ff794c169000584f911b01118
                                                                    • Instruction Fuzzy Hash: 3831F536501209EEDB14AFB4DC08ADE77BCAF09321F14405AF828E6091DB34DEC88EA1
                                                                    APIs
                                                                    • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 001597BE
                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 00159819
                                                                    • FindClose.KERNEL32(00000000), ref: 00159824
                                                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 00159840
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00159890
                                                                    • SetCurrentDirectoryW.KERNEL32(001A6B7C), ref: 001598AE
                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 001598B8
                                                                    • FindClose.KERNEL32(00000000), ref: 001598C5
                                                                    • FindClose.KERNEL32(00000000), ref: 001598D5
                                                                      • Part of subcall function 0014DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 0014DB00
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                                    • String ID: *.*
                                                                    • API String ID: 2640511053-438819550
                                                                    • Opcode ID: 0f97985aaa97bed6210bf4c46f8654079490311320629b67aff107a1e5accaff
                                                                    • Instruction ID: 28d3c6ae303d8d663d0d52e2b94d3054b6d5d252b063782b957359245c2d8eea
                                                                    • Opcode Fuzzy Hash: 0f97985aaa97bed6210bf4c46f8654079490311320629b67aff107a1e5accaff
                                                                    • Instruction Fuzzy Hash: 1031C33150121DEADF10AFB4EC48ADE77BDAF06321F148159E864A61D1DB70DA888F61
                                                                    APIs
                                                                      • Part of subcall function 0016C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0016B6AE,?,?), ref: 0016C9B5
                                                                      • Part of subcall function 0016C998: _wcslen.LIBCMT ref: 0016C9F1
                                                                      • Part of subcall function 0016C998: _wcslen.LIBCMT ref: 0016CA68
                                                                      • Part of subcall function 0016C998: _wcslen.LIBCMT ref: 0016CA9E
                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0016BF3E
                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 0016BFA9
                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 0016BFCD
                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0016C02C
                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 0016C0E7
                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0016C154
                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0016C1E9
                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 0016C23A
                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0016C2E3
                                                                    • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0016C382
                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 0016C38F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                                                    • String ID:
                                                                    • API String ID: 3102970594-0
                                                                    • Opcode ID: 77070228c1c028a7c113d4a8ba8deedc4a84b872be3fba2f509d7faddde278d8
                                                                    • Instruction ID: c5c744a39be2ba100c58dfabb223356502e939cdcc0e1deb79e8074e5b0a3a92
                                                                    • Opcode Fuzzy Hash: 77070228c1c028a7c113d4a8ba8deedc4a84b872be3fba2f509d7faddde278d8
                                                                    • Instruction Fuzzy Hash: 28025C716042409FD714CF28C895E2ABBE5FF89304F18849DF88ADB2A2DB31ED55CB91
                                                                    APIs
                                                                    • GetLocalTime.KERNEL32(?), ref: 00158257
                                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00158267
                                                                    • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00158273
                                                                    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00158310
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00158324
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00158356
                                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0015838C
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00158395
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentDirectoryTime$File$Local$System
                                                                    • String ID: *.*
                                                                    • API String ID: 1464919966-438819550
                                                                    • Opcode ID: bb11ec864318d9140f6b46a15b19b844a0a7aa45e71f77bf6b9d616b15e86e5a
                                                                    • Instruction ID: 9cf338869dcd9352c98bb68aa42cf9a3c381ea2ee2615c1e9b1fcff45c336c49
                                                                    • Opcode Fuzzy Hash: bb11ec864318d9140f6b46a15b19b844a0a7aa45e71f77bf6b9d616b15e86e5a
                                                                    • Instruction Fuzzy Hash: E3616B725047459FC710EF60C8419AFB3E8FF89315F04892EF9A9A7251DB31E949CB92
                                                                    APIs
                                                                      • Part of subcall function 000E3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,000E3A97,?,?,000E2E7F,?,?,?,00000000), ref: 000E3AC2
                                                                      • Part of subcall function 0014E199: GetFileAttributesW.KERNEL32(?,0014CF95), ref: 0014E19A
                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 0014D122
                                                                    • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 0014D1DD
                                                                    • MoveFileW.KERNEL32(?,?), ref: 0014D1F0
                                                                    • DeleteFileW.KERNEL32(?,?,?,?), ref: 0014D20D
                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 0014D237
                                                                      • Part of subcall function 0014D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,0014D21C,?,?), ref: 0014D2B2
                                                                    • FindClose.KERNEL32(00000000,?,?,?), ref: 0014D253
                                                                    • FindClose.KERNEL32(00000000), ref: 0014D264
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                                    • String ID: \*.*
                                                                    • API String ID: 1946585618-1173974218
                                                                    • Opcode ID: c42bf0cf3e231a1cd7b6760aec4f04a2293fc92fc4daec297d81d112e173c3e3
                                                                    • Instruction ID: ba9680b8d7bd2592a054c34ca3c03e7e260a18f66abef2787d91f8da450a73fb
                                                                    • Opcode Fuzzy Hash: c42bf0cf3e231a1cd7b6760aec4f04a2293fc92fc4daec297d81d112e173c3e3
                                                                    • Instruction Fuzzy Hash: B061793180114DAECF15EBA1EA92DEDBBB5AF55300F644069E406771A2EF30AF49CB60
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                    • String ID:
                                                                    • API String ID: 1737998785-0
                                                                    • Opcode ID: d1faa9bdd36990ac1d00b797dac3509aa404c702702ee1642acb866b1d77bf14
                                                                    • Instruction ID: 40f4d8b6c993221e30e2b4015bb55a3007017ac9bc26230260dbeb240e56416a
                                                                    • Opcode Fuzzy Hash: d1faa9bdd36990ac1d00b797dac3509aa404c702702ee1642acb866b1d77bf14
                                                                    • Instruction Fuzzy Hash: 04419B31604611EFE724DF15D889B19BBF1EF44329F14809DE8298FAA2C771ED86CB90
                                                                    APIs
                                                                      • Part of subcall function 001416C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0014170D
                                                                      • Part of subcall function 001416C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0014173A
                                                                      • Part of subcall function 001416C3: GetLastError.KERNEL32 ref: 0014174A
                                                                    • ExitWindowsEx.USER32(?,00000000), ref: 0014E932
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                    • String ID: $ $@$SeShutdownPrivilege
                                                                    • API String ID: 2234035333-3163812486
                                                                    • Opcode ID: 7fce46e6820be3a3a2e6d02bf7c21e5760f101f7ea9317578744461f9c05f1f8
                                                                    • Instruction ID: 10402e17ab9fbbffcadb9c3e37c66debe0770f363cf151d63bba47f25726d4d7
                                                                    • Opcode Fuzzy Hash: 7fce46e6820be3a3a2e6d02bf7c21e5760f101f7ea9317578744461f9c05f1f8
                                                                    • Instruction Fuzzy Hash: 1C01D673610211BBEB6426B8DC86BBF72ECB714758F160825F806E21F2D7A15C8086D0
                                                                    APIs
                                                                    • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00161276
                                                                    • WSAGetLastError.WSOCK32 ref: 00161283
                                                                    • bind.WSOCK32(00000000,?,00000010), ref: 001612BA
                                                                    • WSAGetLastError.WSOCK32 ref: 001612C5
                                                                    • closesocket.WSOCK32(00000000), ref: 001612F4
                                                                    • listen.WSOCK32(00000000,00000005), ref: 00161303
                                                                    • WSAGetLastError.WSOCK32 ref: 0016130D
                                                                    • closesocket.WSOCK32(00000000), ref: 0016133C
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$closesocket$bindlistensocket
                                                                    • String ID:
                                                                    • API String ID: 540024437-0
                                                                    • Opcode ID: 5267fa7415b22b81db95271a22965bc07827cad91fe1e8945b505eb2f0792845
                                                                    • Instruction ID: 68fb84fada0602708612f6d587c67ce94447a2312fbea0764bcfc0defc2877dc
                                                                    • Opcode Fuzzy Hash: 5267fa7415b22b81db95271a22965bc07827cad91fe1e8945b505eb2f0792845
                                                                    • Instruction Fuzzy Hash: 39416031600140AFD714DF64C894B6ABBE6BF46318F2C819CE85A9F296C771ED81CBE1
                                                                    APIs
                                                                    • _free.LIBCMT ref: 0011B9D4
                                                                    • _free.LIBCMT ref: 0011B9F8
                                                                    • _free.LIBCMT ref: 0011BB7F
                                                                    • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00183700), ref: 0011BB91
                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,001B121C,000000FF,00000000,0000003F,00000000,?,?), ref: 0011BC09
                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,001B1270,000000FF,?,0000003F,00000000,?), ref: 0011BC36
                                                                    • _free.LIBCMT ref: 0011BD4B
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                                    • String ID:
                                                                    • API String ID: 314583886-0
                                                                    • Opcode ID: 67000ac8989754d3cb2c1098693e01c583e3fabdef11580253fccc84eff91d32
                                                                    • Instruction ID: f007b4742eb55611463e7a29a990b1bb6f62c384dc2ae751dc58ed645754f4f9
                                                                    • Opcode Fuzzy Hash: 67000ac8989754d3cb2c1098693e01c583e3fabdef11580253fccc84eff91d32
                                                                    • Instruction Fuzzy Hash: B0C1F671908209AFCB2C9F69D8D1BEA7BB9EF55310F2441BAE494D7291E7309EC1C790
                                                                    APIs
                                                                      • Part of subcall function 000E3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,000E3A97,?,?,000E2E7F,?,?,?,00000000), ref: 000E3AC2
                                                                      • Part of subcall function 0014E199: GetFileAttributesW.KERNEL32(?,0014CF95), ref: 0014E19A
                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 0014D420
                                                                    • DeleteFileW.KERNEL32(?,?,?,?), ref: 0014D470
                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 0014D481
                                                                    • FindClose.KERNEL32(00000000), ref: 0014D498
                                                                    • FindClose.KERNEL32(00000000), ref: 0014D4A1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                    • String ID: \*.*
                                                                    • API String ID: 2649000838-1173974218
                                                                    • Opcode ID: 46bc29d61095fe1582df6c61ac6413117ea6b84275c97681c00e7f4b512a1d1c
                                                                    • Instruction ID: a8dfbf0061a108c48b16b6cc22d8cf51bc43e9db379fc19a87da169bfa644b3f
                                                                    • Opcode Fuzzy Hash: 46bc29d61095fe1582df6c61ac6413117ea6b84275c97681c00e7f4b512a1d1c
                                                                    • Instruction Fuzzy Hash: 113170710083819FC704EF65D8558EFB7A8BF96314F844A1DF4D5631A2EB20AA49C763
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: __floor_pentium4
                                                                    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                    • API String ID: 4168288129-2761157908
                                                                    • Opcode ID: 2186690f00621c7ddee5dbb37690a1bb252e71baa0446fab25bf1ce7486fd2c2
                                                                    • Instruction ID: 3ea46f96564e637c9f96ecca9b0add48fb01489a29fceab4cc99faaa8181a716
                                                                    • Opcode Fuzzy Hash: 2186690f00621c7ddee5dbb37690a1bb252e71baa0446fab25bf1ce7486fd2c2
                                                                    • Instruction Fuzzy Hash: AAC22B71E086298FDB69CE689D447E9B7B5EB48304F1541FAD84DE7280E774AEC28F40
                                                                    APIs
                                                                    • _wcslen.LIBCMT ref: 001564DC
                                                                    • CoInitialize.OLE32(00000000), ref: 00156639
                                                                    • CoCreateInstance.OLE32(0017FCF8,00000000,00000001,0017FB68,?), ref: 00156650
                                                                    • CoUninitialize.OLE32 ref: 001568D4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                    • String ID: .lnk
                                                                    • API String ID: 886957087-24824748
                                                                    • Opcode ID: 477b692c760e1d1d87bf8dfdb5d93404edf59e963e54229cc2d379d7e4b4c721
                                                                    • Instruction ID: d488510c12cda7f8804f6458b0d04d93b29efd26cd3ce521803e817b01cb3933
                                                                    • Opcode Fuzzy Hash: 477b692c760e1d1d87bf8dfdb5d93404edf59e963e54229cc2d379d7e4b4c721
                                                                    • Instruction Fuzzy Hash: ACD158715082419FC314EF24C8819ABB7E8FF94304F50496DF5959B2A2EB71EE4ACB92
                                                                    APIs
                                                                    • GetForegroundWindow.USER32(?,?,00000000), ref: 001622E8
                                                                      • Part of subcall function 0015E4EC: GetWindowRect.USER32(?,?), ref: 0015E504
                                                                    • GetDesktopWindow.USER32 ref: 00162312
                                                                    • GetWindowRect.USER32(00000000), ref: 00162319
                                                                    • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00162355
                                                                    • GetCursorPos.USER32(?), ref: 00162381
                                                                    • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 001623DF
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                                    • String ID:
                                                                    • API String ID: 2387181109-0
                                                                    • Opcode ID: 0aa8631f505c0bb085b3603e96eb761f8c1d5bd4cad4958a7de034afe321f8ec
                                                                    • Instruction ID: f1264f6d746be0e7afefb8adf913891cb09310144bf92d9f8e067cbcf2088abb
                                                                    • Opcode Fuzzy Hash: 0aa8631f505c0bb085b3603e96eb761f8c1d5bd4cad4958a7de034afe321f8ec
                                                                    • Instruction Fuzzy Hash: B031BC72505715ABC720DF54CC49AABBBA9FB88314F000A1DF98997291DB34EA58CBD2
                                                                    APIs
                                                                      • Part of subcall function 000E9CB3: _wcslen.LIBCMT ref: 000E9CBD
                                                                    • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00159B78
                                                                    • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00159C8B
                                                                      • Part of subcall function 00153874: GetInputState.USER32 ref: 001538CB
                                                                      • Part of subcall function 00153874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00153966
                                                                    • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00159BA8
                                                                    • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00159C75
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                                    • String ID: *.*
                                                                    • API String ID: 1972594611-438819550
                                                                    • Opcode ID: d3f0f909f81413111efdfbc51bce9a35695a13560118be64c8be185d797d66c6
                                                                    • Instruction ID: 3d6a954a8a18d499f19901ff30b99e8db8635bfdeaaa9c469c541fcb8e313b07
                                                                    • Opcode Fuzzy Hash: d3f0f909f81413111efdfbc51bce9a35695a13560118be64c8be185d797d66c6
                                                                    • Instruction Fuzzy Hash: FB415F7190420ADFDF14DF64C989AEEBBB8EF05311F244159E819B7191EB309E88CFA1
                                                                    APIs
                                                                      • Part of subcall function 000F9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 000F9BB2
                                                                    • DefDlgProcW.USER32(?,?,?,?,?), ref: 000F9A4E
                                                                    • GetSysColor.USER32(0000000F), ref: 000F9B23
                                                                    • SetBkColor.GDI32(?,00000000), ref: 000F9B36
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Color$LongProcWindow
                                                                    • String ID:
                                                                    • API String ID: 3131106179-0
                                                                    • Opcode ID: d6a4bbe7ddf55ac3ea5471907d2afd57e5cade05ad01493a34a3585dcf70c845
                                                                    • Instruction ID: 32c234d07f22396fb86508d4ccf085b45c2475bc134daa433317dd54a33604cb
                                                                    • Opcode Fuzzy Hash: d6a4bbe7ddf55ac3ea5471907d2afd57e5cade05ad01493a34a3585dcf70c845
                                                                    • Instruction Fuzzy Hash: D3A1FBB0108448BEE739AA3D8C9DF7F369DEB82340F15420AF612D6DD1CB259D45E2B2
                                                                    APIs
                                                                      • Part of subcall function 0016304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0016307A
                                                                      • Part of subcall function 0016304E: _wcslen.LIBCMT ref: 0016309B
                                                                    • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 0016185D
                                                                    • WSAGetLastError.WSOCK32 ref: 00161884
                                                                    • bind.WSOCK32(00000000,?,00000010), ref: 001618DB
                                                                    • WSAGetLastError.WSOCK32 ref: 001618E6
                                                                    • closesocket.WSOCK32(00000000), ref: 00161915
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                                    • String ID:
                                                                    • API String ID: 1601658205-0
                                                                    • Opcode ID: 0e4fa66bf06d1d3fd7f96f880f45d0927ca7ddef3325fba4f6f8bc6beca34069
                                                                    • Instruction ID: 125e658ac557d86fe3c0df6ac217fedacae3e82b6aaeda8d8692b42c39a45e80
                                                                    • Opcode Fuzzy Hash: 0e4fa66bf06d1d3fd7f96f880f45d0927ca7ddef3325fba4f6f8bc6beca34069
                                                                    • Instruction Fuzzy Hash: 1951A371A00210AFEB10AF24D886F6A77E5AB44718F58845CF91AAF3D3D771AD41CBE1
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                    • String ID:
                                                                    • API String ID: 292994002-0
                                                                    • Opcode ID: a0bb587e28429a55338e00669aa5add16e6542b633584e48fc6f4ec41541cf52
                                                                    • Instruction ID: c53fa328f9d91f067cd054d033afb18f99071e5f1aead8d7cd4f04849c95f119
                                                                    • Opcode Fuzzy Hash: a0bb587e28429a55338e00669aa5add16e6542b633584e48fc6f4ec41541cf52
                                                                    • Instruction Fuzzy Hash: 522191317402516FD7218F5ED884B6A7BB5AF95325B19C06CE84E8B352CB71DC82CB90
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                                    • API String ID: 0-1546025612
                                                                    • Opcode ID: 81059bde0196c53f27c7d0381dce95b07566ea14f013fee45936587ba72a8249
                                                                    • Instruction ID: 442d69def1180b4f88cb98d55f56cae3a7388feeb57d9ef49e7433412fe2bcc4
                                                                    • Opcode Fuzzy Hash: 81059bde0196c53f27c7d0381dce95b07566ea14f013fee45936587ba72a8249
                                                                    • Instruction Fuzzy Hash: A6A28F71A0066ACFDF34CF59D8807ADB7B2BF54310F2481AAE859B7285EB309D91CB50
                                                                    APIs
                                                                    • CreateToolhelp32Snapshot.KERNEL32 ref: 0016A6AC
                                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 0016A6BA
                                                                      • Part of subcall function 000E9CB3: _wcslen.LIBCMT ref: 000E9CBD
                                                                    • Process32NextW.KERNEL32(00000000,?), ref: 0016A79C
                                                                    • CloseHandle.KERNEL32(00000000), ref: 0016A7AB
                                                                      • Part of subcall function 000FCE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00123303,?), ref: 000FCE8A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                                    • String ID:
                                                                    • API String ID: 1991900642-0
                                                                    • Opcode ID: f64cc92e05bd7d0825c39f7c183f986a7df965cd57b6c6fd6db0c6ff841b501d
                                                                    • Instruction ID: 6d9568bee84b96d8e806b76b1fe103f1965e8667a9b8fb6769efc06086abedaf
                                                                    • Opcode Fuzzy Hash: f64cc92e05bd7d0825c39f7c183f986a7df965cd57b6c6fd6db0c6ff841b501d
                                                                    • Instruction Fuzzy Hash: EE517F715083419FD310EF25C886EABBBE8FF89754F40492DF589A7252EB31D944CB92
                                                                    APIs
                                                                    • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 0014AAAC
                                                                    • SetKeyboardState.USER32(00000080), ref: 0014AAC8
                                                                    • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 0014AB36
                                                                    • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 0014AB88
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: KeyboardState$InputMessagePostSend
                                                                    • String ID:
                                                                    • API String ID: 432972143-0
                                                                    • Opcode ID: 411c228790ac5625a5a78569c4ca2e6f21632a750ab82bdeb989d98c85107437
                                                                    • Instruction ID: 189376d46ef07e2f07615d4d437d025f2e9faefcdec88e6fe0b128fa2b14d93b
                                                                    • Opcode Fuzzy Hash: 411c228790ac5625a5a78569c4ca2e6f21632a750ab82bdeb989d98c85107437
                                                                    • Instruction Fuzzy Hash: 35311270AC0208AEFB35CB648C05BFA7BAAEF54320F85421AF585961F0D3759981C7A2
                                                                    APIs
                                                                    • InternetReadFile.WININET(?,?,00000400,?), ref: 0015CE89
                                                                    • GetLastError.KERNEL32(?,00000000), ref: 0015CEEA
                                                                    • SetEvent.KERNEL32(?,?,00000000), ref: 0015CEFE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorEventFileInternetLastRead
                                                                    • String ID:
                                                                    • API String ID: 234945975-0
                                                                    • Opcode ID: 823828f0988f792049b244950640fd6cde8f765b1bbaab8e65d4e960d5d91bd8
                                                                    • Instruction ID: 2ef8e7d92c75e7aa00502ea58c962afa028ee43a562d4b1577f76360a22533af
                                                                    • Opcode Fuzzy Hash: 823828f0988f792049b244950640fd6cde8f765b1bbaab8e65d4e960d5d91bd8
                                                                    • Instruction Fuzzy Hash: 1821BD71500305DFE720CFA5C949BA67BF8EB50315F10481EE956E6151E770EE888BA0
                                                                    APIs
                                                                    • lstrlenW.KERNEL32(?,?,?,00000000), ref: 001482AA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: lstrlen
                                                                    • String ID: ($|
                                                                    • API String ID: 1659193697-1631851259
                                                                    • Opcode ID: 79d9815b822073fa1b0f4daf77c119b922c8ee6b39abb661adcd30bc2301cee2
                                                                    • Instruction ID: ce142a90fd768a34703ecb8c6cd255fbecf2314a2bc4c55c891201691a73e1f8
                                                                    • Opcode Fuzzy Hash: 79d9815b822073fa1b0f4daf77c119b922c8ee6b39abb661adcd30bc2301cee2
                                                                    • Instruction Fuzzy Hash: 2F322575A006059FCB28CF59C481AAAB7F0FF48710B15C56EE59ADB7A1EB70E981CB40
                                                                    APIs
                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 00155CC1
                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 00155D17
                                                                    • FindClose.KERNEL32(?), ref: 00155D5F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Find$File$CloseFirstNext
                                                                    • String ID:
                                                                    • API String ID: 3541575487-0
                                                                    • Opcode ID: 308677e29b45df63cc1bdcfbeaa88b8996a9fcd62c9c406998bd50729e6676df
                                                                    • Instruction ID: fb13fcde29e6bd1620b6e8a9bd5f89c7ac65720bfc1d74e478283ef4ad5f2a7a
                                                                    • Opcode Fuzzy Hash: 308677e29b45df63cc1bdcfbeaa88b8996a9fcd62c9c406998bd50729e6676df
                                                                    • Instruction Fuzzy Hash: 82519835604A01DFC714CF68C4A4E9AB7F5FF49314F14855EE9AA8B3A2CB31E948CB91
                                                                    APIs
                                                                    • IsDebuggerPresent.KERNEL32 ref: 0011271A
                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00112724
                                                                    • UnhandledExceptionFilter.KERNEL32(?), ref: 00112731
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                    • String ID:
                                                                    • API String ID: 3906539128-0
                                                                    • Opcode ID: c9ba1b55d0e2646bd35191bda502768e476a4cf06afc72e40386bb72f836a447
                                                                    • Instruction ID: b38d294c9db5acbd1dc7df37ae056916a229e0be9032600ff1a52915025059cd
                                                                    • Opcode Fuzzy Hash: c9ba1b55d0e2646bd35191bda502768e476a4cf06afc72e40386bb72f836a447
                                                                    • Instruction Fuzzy Hash: 9131C4749012289BCB25DF68DC887D9B7B8BF18310F5041EAE80CA72A1EB709FC18F45
                                                                    APIs
                                                                    • SetErrorMode.KERNEL32(00000001), ref: 001551DA
                                                                    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00155238
                                                                    • SetErrorMode.KERNEL32(00000000), ref: 001552A1
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorMode$DiskFreeSpace
                                                                    • String ID:
                                                                    • API String ID: 1682464887-0
                                                                    • Opcode ID: 357a84dbe8c27b0fa73b5bab63a749968ce91337acc184fa6835d399cbb2fa7b
                                                                    • Instruction ID: b05b516955d8f9dc1e520486880f1d2d857597450391f84c515b15023ea66b12
                                                                    • Opcode Fuzzy Hash: 357a84dbe8c27b0fa73b5bab63a749968ce91337acc184fa6835d399cbb2fa7b
                                                                    • Instruction Fuzzy Hash: BD314C75A00518DFDB00DF54D894EADBBB5FF49314F4480A9E809AB362DB31E89ACB90
                                                                    APIs
                                                                      • Part of subcall function 000FFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00100668
                                                                      • Part of subcall function 000FFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00100685
                                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0014170D
                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0014173A
                                                                    • GetLastError.KERNEL32 ref: 0014174A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                                    • String ID:
                                                                    • API String ID: 577356006-0
                                                                    • Opcode ID: 3371a57588cb5e5c1cd3f9bbd129cee36019103ad0825c8ba5e732c3106b84ea
                                                                    • Instruction ID: 3ed1b1b15a023aca4636663c35460497d0c4ede37abacc6a8005a2d547f126af
                                                                    • Opcode Fuzzy Hash: 3371a57588cb5e5c1cd3f9bbd129cee36019103ad0825c8ba5e732c3106b84ea
                                                                    • Instruction Fuzzy Hash: B511BCB2400209BFE718AF54DC86DBBB7B9EF04714B20852EF05652651EB70BC818A60
                                                                    APIs
                                                                    • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0014D608
                                                                    • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 0014D645
                                                                    • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0014D650
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CloseControlCreateDeviceFileHandle
                                                                    • String ID:
                                                                    • API String ID: 33631002-0
                                                                    • Opcode ID: 25c150f7446d7d839f403a70a0eeea80a54b72d6a831a68336d32fa4a1126ad8
                                                                    • Instruction ID: 8f7d819b3719cf8fbb79650dea9c8125f12cae6a164d29b0643fc8901a65d3fb
                                                                    • Opcode Fuzzy Hash: 25c150f7446d7d839f403a70a0eeea80a54b72d6a831a68336d32fa4a1126ad8
                                                                    • Instruction Fuzzy Hash: 59115E75E05228BFDB108F99EC45FAFBBBCEB45B50F108165F908E7290D6704A458BE1
                                                                    APIs
                                                                    • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0014168C
                                                                    • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 001416A1
                                                                    • FreeSid.ADVAPI32(?), ref: 001416B1
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                    • String ID:
                                                                    • API String ID: 3429775523-0
                                                                    • Opcode ID: 8c196152f28fac4fae32b8bcc47eaa944f5bc14c109c86394f76db8620225c53
                                                                    • Instruction ID: f11d50bcc9fc8b1a8d5d9900ffecb7ccc54697e7a9d5b7501b1132e483ed8890
                                                                    • Opcode Fuzzy Hash: 8c196152f28fac4fae32b8bcc47eaa944f5bc14c109c86394f76db8620225c53
                                                                    • Instruction Fuzzy Hash: 5FF0F475950309FBDB00DFE49C89EAEBBBCFB08704F504565E501E2191E774AA848BA0
                                                                    APIs
                                                                    • GetCurrentProcess.KERNEL32(001128E9,?,00104CBE,001128E9,001A88B8,0000000C,00104E15,001128E9,00000002,00000000,?,001128E9), ref: 00104D09
                                                                    • TerminateProcess.KERNEL32(00000000,?,00104CBE,001128E9,001A88B8,0000000C,00104E15,001128E9,00000002,00000000,?,001128E9), ref: 00104D10
                                                                    • ExitProcess.KERNEL32 ref: 00104D22
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Process$CurrentExitTerminate
                                                                    • String ID:
                                                                    • API String ID: 1703294689-0
                                                                    • Opcode ID: 634003888e8ae48becfd7e9a6983a9ce8c7ca224b3778163ab22a5e7edce930c
                                                                    • Instruction ID: c7804a76cfae709a96e4e2463e2d64960b57389d0f43bdb95d103e08f5e63968
                                                                    • Opcode Fuzzy Hash: 634003888e8ae48becfd7e9a6983a9ce8c7ca224b3778163ab22a5e7edce930c
                                                                    • Instruction Fuzzy Hash: 86E0B671000248BBCF11AF94DD49A983B79FB65785B104028FD599A572CB75DEC2CB80
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: /
                                                                    • API String ID: 0-2043925204
                                                                    • Opcode ID: 309573e03da3d2390394f2defb3136852806bf56a76d008349649bbe08200c8d
                                                                    • Instruction ID: ee6f44d1a72c912ba0a055444ace03e1e5d2c1359e30ed2b3ade90df30ba0736
                                                                    • Opcode Fuzzy Hash: 309573e03da3d2390394f2defb3136852806bf56a76d008349649bbe08200c8d
                                                                    • Instruction Fuzzy Hash: D1412376940219ABCB289EB9CC48EEB77B8EB84714F1042B9F915C7180E7709DC18B90
                                                                    APIs
                                                                    • GetUserNameW.ADVAPI32(?,?), ref: 0013D28C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: NameUser
                                                                    • String ID: X64
                                                                    • API String ID: 2645101109-893830106
                                                                    • Opcode ID: 4f19db8af895cf3e3076420156d14e31bbcb350a009a4e8779b8ceec6d987081
                                                                    • Instruction ID: 193bfba0bc8fc769b2496b53160ef2c2af558a4822ba4dd4e06b27faa123fd9b
                                                                    • Opcode Fuzzy Hash: 4f19db8af895cf3e3076420156d14e31bbcb350a009a4e8779b8ceec6d987081
                                                                    • Instruction Fuzzy Hash: DCD0C9B480111DEADF94CB90EC88DDEB37CBB04305F100156F506A2000DB3095889F50
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                    • Instruction ID: 862d2e205ca86793820eb84574ca5748243602723ee4d95e44dbe7954a4b94e5
                                                                    • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                    • Instruction Fuzzy Hash: FB021C71E002199BDF14CFA9C9806ADFBF1EF58314F25826AE859E7380D771AA418FD4
                                                                    APIs
                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 00156918
                                                                    • FindClose.KERNEL32(00000000), ref: 00156961
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Find$CloseFileFirst
                                                                    • String ID:
                                                                    • API String ID: 2295610775-0
                                                                    • Opcode ID: e795497110e9168a330999001037ea0d03450d807a6dd13bc195aeaeeb1b78f2
                                                                    • Instruction ID: e60342a3056d471a440dfd9c721e8e53c8b0b026037a0563d56a8e0ac39bee26
                                                                    • Opcode Fuzzy Hash: e795497110e9168a330999001037ea0d03450d807a6dd13bc195aeaeeb1b78f2
                                                                    • Instruction Fuzzy Hash: 9D11BE31604600DFD710CF2AD484A16BBE1FF84329F44C6A9E8698F6A2CB30EC45CBD1
                                                                    APIs
                                                                    • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00164891,?,?,00000035,?), ref: 001537E4
                                                                    • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00164891,?,?,00000035,?), ref: 001537F4
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorFormatLastMessage
                                                                    • String ID:
                                                                    • API String ID: 3479602957-0
                                                                    • Opcode ID: e4c24b1a9f3602859d825b1c318a2d226303b3e4dcf6905c8be1f6b77c1026b3
                                                                    • Instruction ID: 61574b57a8a10a86adea7bbbb03822e5db23d3f3b9d88396c96ffbfa6f0fa60a
                                                                    • Opcode Fuzzy Hash: e4c24b1a9f3602859d825b1c318a2d226303b3e4dcf6905c8be1f6b77c1026b3
                                                                    • Instruction Fuzzy Hash: 52F0EC706042247EE71057765C4DFDB36ADEFC4761F000165F519D3281DA605944C7F0
                                                                    APIs
                                                                    • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 0014B25D
                                                                    • keybd_event.USER32(?,7694C0D0,?,00000000), ref: 0014B270
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: InputSendkeybd_event
                                                                    • String ID:
                                                                    • API String ID: 3536248340-0
                                                                    • Opcode ID: a09e9e5733fbb8ac4809c294d8a86c727bf4010e43fba92987770b96bcaf3a13
                                                                    • Instruction ID: 5f50a89fbcc7eb948df51ecb87f8e207538d3bd1e975a64420e5b92a14f55b1b
                                                                    • Opcode Fuzzy Hash: a09e9e5733fbb8ac4809c294d8a86c727bf4010e43fba92987770b96bcaf3a13
                                                                    • Instruction Fuzzy Hash: BCF01D7190428EABDB059FA0C805BAE7BB4FF04305F108009F955A51A1D779D6519F94
                                                                    APIs
                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,001411FC), ref: 001410D4
                                                                    • CloseHandle.KERNEL32(?,?,001411FC), ref: 001410E9
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: AdjustCloseHandlePrivilegesToken
                                                                    • String ID:
                                                                    • API String ID: 81990902-0
                                                                    • Opcode ID: 60c0464461be0636ab990fcc65a97fc9ac6ce4248921497f6eae198ae7b2a0bb
                                                                    • Instruction ID: 916f5c3706a8bc2869cee08ac7d5c80995652137441bc6f9e9ea8d083c05e4df
                                                                    • Opcode Fuzzy Hash: 60c0464461be0636ab990fcc65a97fc9ac6ce4248921497f6eae198ae7b2a0bb
                                                                    • Instruction Fuzzy Hash: 43E0BF72014611AEF7252B51FC05EB777A9FF04320B14882DF5A5818B1DB626CD0EB50
                                                                    Strings
                                                                    • Variable is not of type 'Object'., xrefs: 00130C40
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Variable is not of type 'Object'.
                                                                    • API String ID: 0-1840281001
                                                                    • Opcode ID: 86bf4bef93b55f285d1601733d4b93c973785f40554a21880c73a7d76048b73e
                                                                    • Instruction ID: a1ca517a35255480edca7f6621b0451dbe5574ebbd9fa06223a9fdbb3cfbdad4
                                                                    • Opcode Fuzzy Hash: 86bf4bef93b55f285d1601733d4b93c973785f40554a21880c73a7d76048b73e
                                                                    • Instruction Fuzzy Hash: B5327A709042589FEF14DF95C890EEDB7F5BF09304F244069E816BB292D776AE46CB50
                                                                    APIs
                                                                    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00116766,?,?,00000008,?,?,0011FEFE,00000000), ref: 00116998
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionRaise
                                                                    • String ID:
                                                                    • API String ID: 3997070919-0
                                                                    • Opcode ID: c714e1a3c1dbeab2e16910b6be21aaf1cb3b33949102155fb78509bf5e28e642
                                                                    • Instruction ID: 992bc2057a89c2377180d78f56f8c6014110ebcd32b9f5760c786393769ae374
                                                                    • Opcode Fuzzy Hash: c714e1a3c1dbeab2e16910b6be21aaf1cb3b33949102155fb78509bf5e28e642
                                                                    • Instruction Fuzzy Hash: D0B11D71510609DFD719CF28C486BA57BE0FF45364F298668E8D9CF2A2C736D991CB40
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID: 0-3916222277
                                                                    • Opcode ID: 426ff38253e5f96914e607269404b2ba345336107a5dced140a4e0080b4c60dd
                                                                    • Instruction ID: 3b6bc221b8dd8a5230c7d233c334c66d5bcde441f241a195a97a2ba611c05cd7
                                                                    • Opcode Fuzzy Hash: 426ff38253e5f96914e607269404b2ba345336107a5dced140a4e0080b4c60dd
                                                                    • Instruction Fuzzy Hash: C7125E719002299FDB24CF58C980AFEB7F5FF48710F14819AE949EB655EB309A81DF90
                                                                    APIs
                                                                    • BlockInput.USER32(00000001), ref: 0015EABD
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: BlockInput
                                                                    • String ID:
                                                                    • API String ID: 3456056419-0
                                                                    • Opcode ID: 67e7a251157142d321a7746d262cfb25d52326000f4fae6c745e64f98bcedc2b
                                                                    • Instruction ID: ab154d418c9fc06f8c906300bb83262fd26b7cfe466554fbdcbf9a86143356c3
                                                                    • Opcode Fuzzy Hash: 67e7a251157142d321a7746d262cfb25d52326000f4fae6c745e64f98bcedc2b
                                                                    • Instruction Fuzzy Hash: DDE04F322002049FD714EF6AD844E9AF7EDBF98760F00842AFD5ADB351DB70E9858B90
                                                                    APIs
                                                                    • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,001003EE), ref: 001009DA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterUnhandled
                                                                    • String ID:
                                                                    • API String ID: 3192549508-0
                                                                    • Opcode ID: 3702a5fa0ecfa9e7f477c00993bec5a869812eac80472b66e62902dc1237fcac
                                                                    • Instruction ID: bbe78771b218d447ec4c236ddf3c8b305a58cdeaba5475c2726f498c837b12d0
                                                                    • Opcode Fuzzy Hash: 3702a5fa0ecfa9e7f477c00993bec5a869812eac80472b66e62902dc1237fcac
                                                                    • Instruction Fuzzy Hash:
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 0
                                                                    • API String ID: 0-4108050209
                                                                    • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                    • Instruction ID: 006b51a0a02365549193f238c125432dbc2ec4419a8c40827718ef6c286a9ddf
                                                                    • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                    • Instruction Fuzzy Hash: 25518A71E0C7099BDF389528885DBBE6385AB52354F18850BD8C2C72C2CBD1FE41D362
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: dfe8232c4f16e7ccf39ac12726aada5b342568aa49914961039a786fb7c48b88
                                                                    • Instruction ID: b8f9c82d3267207cf429a1c6000e7ddad57f7ecd59e4cd4a59d9c901ddb86fd4
                                                                    • Opcode Fuzzy Hash: dfe8232c4f16e7ccf39ac12726aada5b342568aa49914961039a786fb7c48b88
                                                                    • Instruction Fuzzy Hash: 8A32FF32D29F014DD7279634C822336A699AFB73C5F15D737E81AB5EA9EB3985C34200
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 369a511c3155235023d1bcb9396b8dac8dcb58ea4fcd46f62971141fa7a4911a
                                                                    • Instruction ID: 5499b5bac353db586a39cae3b4088df13ee65cdf008e7061b83d95e50b4f4959
                                                                    • Opcode Fuzzy Hash: 369a511c3155235023d1bcb9396b8dac8dcb58ea4fcd46f62971141fa7a4911a
                                                                    • Instruction Fuzzy Hash: E9322932A0015D8BDF28CF29C595A7DBBE1EF45310F29816AD959EB691E330DD81EBC0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: b2b5cf128331a72caf330063c28b0742c52c36c501a3705928493873d68be68b
                                                                    • Instruction ID: 10c47fd5b8095ed13708ec092b772595e603d7dbe20c0324256f43327e53bbbb
                                                                    • Opcode Fuzzy Hash: b2b5cf128331a72caf330063c28b0742c52c36c501a3705928493873d68be68b
                                                                    • Instruction Fuzzy Hash: 6822C170A0465ADFDF14CF65D881AEEB7F6FF48300F244629E816A7291EB35AD50CB50
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: ecf1d706be8149d042882e58afe261a3766bf35ed6e5375be50ad11e0da07a3f
                                                                    • Instruction ID: 66020b2646c578ea20a491a915698e03d3d6c2cedc4d691b6abc0d644bdf133d
                                                                    • Opcode Fuzzy Hash: ecf1d706be8149d042882e58afe261a3766bf35ed6e5375be50ad11e0da07a3f
                                                                    • Instruction Fuzzy Hash: 2D02B7B0E0011AEFDF14DF65D881AADB7F1FF54300F118169E916AB291EB71AE60CB91
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c1f2d488ad9074fee4274c705c956a5c45feab972f192d3e414ce01616427585
                                                                    • Instruction ID: 96551e07b0daaa4a39d7c5a105d30fb564a148af0580b190f321e0ae76866064
                                                                    • Opcode Fuzzy Hash: c1f2d488ad9074fee4274c705c956a5c45feab972f192d3e414ce01616427585
                                                                    • Instruction Fuzzy Hash: 6BB1CF30D2AF414DD22396398871336BA5CBFBB6D5B95D71BFC2674D22EB2286C34240
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: decabd672e093ea9c1fbd50d9b8f9b89fe760c1e5a23dabaa94cbcf21f442f84
                                                                    • Instruction ID: 53fc894f59d5b66811fdd1e845d1ff96b6244a9c104a9a51e8da8ce423e20465
                                                                    • Opcode Fuzzy Hash: decabd672e093ea9c1fbd50d9b8f9b89fe760c1e5a23dabaa94cbcf21f442f84
                                                                    • Instruction Fuzzy Hash: BA613971F0C749A6EE38A9288995BBE3394DF55710F180919F8C2DB2C1DBD1BE42C365
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: fe6111e28591557eafd5454aec638ae99204d2f3f0dfcc51200506edf72d0a96
                                                                    • Instruction ID: 085603712953fdbd0af5abed022fba58d12399c691ec92b17ac51628c1688625
                                                                    • Opcode Fuzzy Hash: fe6111e28591557eafd5454aec638ae99204d2f3f0dfcc51200506edf72d0a96
                                                                    • Instruction Fuzzy Hash: 61618971E0C70966DE395AA89891BBF2388EF52740F10095AF9C2DB2C1EBD2FD42C355
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 9e4b6a9f009772bf900f81a080d7866889bcb8304680426c062b1f7db16e4a36
                                                                    • Instruction ID: 579be41d88a26bef8aa56aeb76095be574de100d2130552b53be951ffceae4a7
                                                                    • Opcode Fuzzy Hash: 9e4b6a9f009772bf900f81a080d7866889bcb8304680426c062b1f7db16e4a36
                                                                    • Instruction Fuzzy Hash: 2421BB326215118BD728CF79C85367E73E5A754310F15862EE4A7C77D0DF35A948C780
                                                                    APIs
                                                                    • DeleteObject.GDI32(00000000), ref: 00162B30
                                                                    • DeleteObject.GDI32(00000000), ref: 00162B43
                                                                    • DestroyWindow.USER32 ref: 00162B52
                                                                    • GetDesktopWindow.USER32 ref: 00162B6D
                                                                    • GetWindowRect.USER32(00000000), ref: 00162B74
                                                                    • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00162CA3
                                                                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00162CB1
                                                                    • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00162CF8
                                                                    • GetClientRect.USER32(00000000,?), ref: 00162D04
                                                                    • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00162D40
                                                                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00162D62
                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00162D75
                                                                    • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00162D80
                                                                    • GlobalLock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00162D89
                                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00162D98
                                                                    • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00162DA1
                                                                    • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00162DA8
                                                                    • GlobalFree.KERNEL32(00000000), ref: 00162DB3
                                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00162DC5
                                                                    • OleLoadPicture.OLEAUT32(?,00000000,00000000,0017FC38,00000000), ref: 00162DDB
                                                                    • GlobalFree.KERNEL32(00000000), ref: 00162DEB
                                                                    • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00162E11
                                                                    • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00162E30
                                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00162E52
                                                                    • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0016303F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                    • String ID: $AutoIt v3$DISPLAY$static
                                                                    • API String ID: 2211948467-2373415609
                                                                    • Opcode ID: 5289d4e1f50d23b32ada16da801ac647e4bebe1741390d1de05a57262d95c8f2
                                                                    • Instruction ID: 4b2f4eaf4a8c01af74a5ba3556b5fed4227382073d4c9dbe322976c3e524f102
                                                                    • Opcode Fuzzy Hash: 5289d4e1f50d23b32ada16da801ac647e4bebe1741390d1de05a57262d95c8f2
                                                                    • Instruction Fuzzy Hash: 44027C71900615EFDB14DF64CC89EAE7BB9FF48710F048158F919AB2A1DB74AD81CBA0
                                                                    APIs
                                                                    • SetTextColor.GDI32(?,00000000), ref: 0017712F
                                                                    • GetSysColorBrush.USER32(0000000F), ref: 00177160
                                                                    • GetSysColor.USER32(0000000F), ref: 0017716C
                                                                    • SetBkColor.GDI32(?,000000FF), ref: 00177186
                                                                    • SelectObject.GDI32(?,?), ref: 00177195
                                                                    • InflateRect.USER32(?,000000FF,000000FF), ref: 001771C0
                                                                    • GetSysColor.USER32(00000010), ref: 001771C8
                                                                    • CreateSolidBrush.GDI32(00000000), ref: 001771CF
                                                                    • FrameRect.USER32(?,?,00000000), ref: 001771DE
                                                                    • DeleteObject.GDI32(00000000), ref: 001771E5
                                                                    • InflateRect.USER32(?,000000FE,000000FE), ref: 00177230
                                                                    • FillRect.USER32(?,?,?), ref: 00177262
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00177284
                                                                      • Part of subcall function 001773E8: GetSysColor.USER32(00000012), ref: 00177421
                                                                      • Part of subcall function 001773E8: SetTextColor.GDI32(?,?), ref: 00177425
                                                                      • Part of subcall function 001773E8: GetSysColorBrush.USER32(0000000F), ref: 0017743B
                                                                      • Part of subcall function 001773E8: GetSysColor.USER32(0000000F), ref: 00177446
                                                                      • Part of subcall function 001773E8: GetSysColor.USER32(00000011), ref: 00177463
                                                                      • Part of subcall function 001773E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00177471
                                                                      • Part of subcall function 001773E8: SelectObject.GDI32(?,00000000), ref: 00177482
                                                                      • Part of subcall function 001773E8: SetBkColor.GDI32(?,00000000), ref: 0017748B
                                                                      • Part of subcall function 001773E8: SelectObject.GDI32(?,?), ref: 00177498
                                                                      • Part of subcall function 001773E8: InflateRect.USER32(?,000000FF,000000FF), ref: 001774B7
                                                                      • Part of subcall function 001773E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 001774CE
                                                                      • Part of subcall function 001773E8: GetWindowLongW.USER32(00000000,000000F0), ref: 001774DB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                                    • String ID:
                                                                    • API String ID: 4124339563-0
                                                                    • Opcode ID: 2b5d1a64784cd4b4c0dacc3dcc3141782b2322410450327fa7bfb498c098e502
                                                                    • Instruction ID: d357e1ef1991c513e52a463d0280bdca0cdb630829e6eb6bf0059257478094b7
                                                                    • Opcode Fuzzy Hash: 2b5d1a64784cd4b4c0dacc3dcc3141782b2322410450327fa7bfb498c098e502
                                                                    • Instruction Fuzzy Hash: D8A1907210C301EFD7109F60DC48A6B7BB9FB89321F104A2DF96A965E1D771E984CB91
                                                                    APIs
                                                                    • DestroyWindow.USER32(00000000), ref: 0016273E
                                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0016286A
                                                                    • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 001628A9
                                                                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 001628B9
                                                                    • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00162900
                                                                    • GetClientRect.USER32(00000000,?), ref: 0016290C
                                                                    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00162955
                                                                    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00162964
                                                                    • GetStockObject.GDI32(00000011), ref: 00162974
                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00162978
                                                                    • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00162988
                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00162991
                                                                    • DeleteDC.GDI32(00000000), ref: 0016299A
                                                                    • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 001629C6
                                                                    • SendMessageW.USER32(00000030,00000000,00000001), ref: 001629DD
                                                                    • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00162A1D
                                                                    • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00162A31
                                                                    • SendMessageW.USER32(00000404,00000001,00000000), ref: 00162A42
                                                                    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00162A77
                                                                    • GetStockObject.GDI32(00000011), ref: 00162A82
                                                                    • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00162A8D
                                                                    • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00162A97
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                    • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                    • API String ID: 2910397461-517079104
                                                                    • Opcode ID: cc8fa6caac3262daca40cab2e5646adb31fb5444a587ed4d20915f1d21159465
                                                                    • Instruction ID: 22529d4d77eb89d2f31f01908fbc7ea75056e46697aec45c1eed5d9f2b3d4ce2
                                                                    • Opcode Fuzzy Hash: cc8fa6caac3262daca40cab2e5646adb31fb5444a587ed4d20915f1d21159465
                                                                    • Instruction Fuzzy Hash: F8B14C71A00615AFEB14DFA8DC85FAE7BB9FB08710F504118F915E76A1D774AD80CBA0
                                                                    APIs
                                                                    • SetErrorMode.KERNEL32(00000001), ref: 00154AED
                                                                    • GetDriveTypeW.KERNEL32(?,0017CB68,?,\\.\,0017CC08), ref: 00154BCA
                                                                    • SetErrorMode.KERNEL32(00000000,0017CB68,?,\\.\,0017CC08), ref: 00154D36
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorMode$DriveType
                                                                    • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                    • API String ID: 2907320926-4222207086
                                                                    • Opcode ID: 5b31948dfd2dd630ae694de00edd201b9b0bac30e5c228a255cb57fa904ca938
                                                                    • Instruction ID: 23d7ebb551d1f1bfb21a217a97f1469b7869ffe126070c5cf14673e671b31e56
                                                                    • Opcode Fuzzy Hash: 5b31948dfd2dd630ae694de00edd201b9b0bac30e5c228a255cb57fa904ca938
                                                                    • Instruction Fuzzy Hash: 4D61E534605205EFCB08DF64CA819AC77B1AB8538AB298015FC26AF692DB31DDC9DB41
                                                                    APIs
                                                                    • GetSysColor.USER32(00000012), ref: 00177421
                                                                    • SetTextColor.GDI32(?,?), ref: 00177425
                                                                    • GetSysColorBrush.USER32(0000000F), ref: 0017743B
                                                                    • GetSysColor.USER32(0000000F), ref: 00177446
                                                                    • CreateSolidBrush.GDI32(?), ref: 0017744B
                                                                    • GetSysColor.USER32(00000011), ref: 00177463
                                                                    • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00177471
                                                                    • SelectObject.GDI32(?,00000000), ref: 00177482
                                                                    • SetBkColor.GDI32(?,00000000), ref: 0017748B
                                                                    • SelectObject.GDI32(?,?), ref: 00177498
                                                                    • InflateRect.USER32(?,000000FF,000000FF), ref: 001774B7
                                                                    • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 001774CE
                                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 001774DB
                                                                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0017752A
                                                                    • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00177554
                                                                    • InflateRect.USER32(?,000000FD,000000FD), ref: 00177572
                                                                    • DrawFocusRect.USER32(?,?), ref: 0017757D
                                                                    • GetSysColor.USER32(00000011), ref: 0017758E
                                                                    • SetTextColor.GDI32(?,00000000), ref: 00177596
                                                                    • DrawTextW.USER32(?,001770F5,000000FF,?,00000000), ref: 001775A8
                                                                    • SelectObject.GDI32(?,?), ref: 001775BF
                                                                    • DeleteObject.GDI32(?), ref: 001775CA
                                                                    • SelectObject.GDI32(?,?), ref: 001775D0
                                                                    • DeleteObject.GDI32(?), ref: 001775D5
                                                                    • SetTextColor.GDI32(?,?), ref: 001775DB
                                                                    • SetBkColor.GDI32(?,?), ref: 001775E5
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                    • String ID:
                                                                    • API String ID: 1996641542-0
                                                                    • Opcode ID: 1901d93a7ab8e943d0fd7d959f06cc6eecf6a4635d157618305d22c0b15e4dd1
                                                                    • Instruction ID: b1aa1b8739e11a43ef7e857ef530bab8c3ed23e2f388072924737669d712da3e
                                                                    • Opcode Fuzzy Hash: 1901d93a7ab8e943d0fd7d959f06cc6eecf6a4635d157618305d22c0b15e4dd1
                                                                    • Instruction Fuzzy Hash: CA614D72904218EFDF119FA4DC49AEE7FB9EB08320F118125F919AB6E1D7759980CF90
                                                                    APIs
                                                                    • GetCursorPos.USER32(?), ref: 00171128
                                                                    • GetDesktopWindow.USER32 ref: 0017113D
                                                                    • GetWindowRect.USER32(00000000), ref: 00171144
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00171199
                                                                    • DestroyWindow.USER32(?), ref: 001711B9
                                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 001711ED
                                                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0017120B
                                                                    • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0017121D
                                                                    • SendMessageW.USER32(00000000,00000421,?,?), ref: 00171232
                                                                    • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00171245
                                                                    • IsWindowVisible.USER32(00000000), ref: 001712A1
                                                                    • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 001712BC
                                                                    • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 001712D0
                                                                    • GetWindowRect.USER32(00000000,?), ref: 001712E8
                                                                    • MonitorFromPoint.USER32(?,?,00000002), ref: 0017130E
                                                                    • GetMonitorInfoW.USER32(00000000,?), ref: 00171328
                                                                    • CopyRect.USER32(?,?), ref: 0017133F
                                                                    • SendMessageW.USER32(00000000,00000412,00000000), ref: 001713AA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                    • String ID: ($0$tooltips_class32
                                                                    • API String ID: 698492251-4156429822
                                                                    • Opcode ID: 471cc65c6ab6385ee3cd35c83642c65277a1467f7412c0878cdff359eac3e849
                                                                    • Instruction ID: f9412583aa39b67033505907a24b563bfb22fed80310f0b84fc9057bfe4ec557
                                                                    • Opcode Fuzzy Hash: 471cc65c6ab6385ee3cd35c83642c65277a1467f7412c0878cdff359eac3e849
                                                                    • Instruction Fuzzy Hash: 7DB15A71604341AFD714DF69C884BAABBF4FF84350F40891CF999AB2A2D771E884CB91
                                                                    APIs
                                                                    • CharUpperBuffW.USER32(?,?), ref: 001702E5
                                                                    • _wcslen.LIBCMT ref: 0017031F
                                                                    • _wcslen.LIBCMT ref: 00170389
                                                                    • _wcslen.LIBCMT ref: 001703F1
                                                                    • _wcslen.LIBCMT ref: 00170475
                                                                    • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 001704C5
                                                                    • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00170504
                                                                      • Part of subcall function 000FF9F2: _wcslen.LIBCMT ref: 000FF9FD
                                                                      • Part of subcall function 0014223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00142258
                                                                      • Part of subcall function 0014223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 0014228A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                    • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                                    • API String ID: 1103490817-719923060
                                                                    • Opcode ID: ea46b95458495ce5e664a737abe2495e8447f822388723406a36f7911178e7bc
                                                                    • Instruction ID: 6f16d2d038586c78b4ae7b5283bfd7ee5f53d382ec62b26f365f8a51921efd6f
                                                                    • Opcode Fuzzy Hash: ea46b95458495ce5e664a737abe2495e8447f822388723406a36f7911178e7bc
                                                                    • Instruction Fuzzy Hash: 8FE18C31208341DFC715DF24C99096AB3F6BF98314F54896CF89AAB2A6DB30ED85CB41
                                                                    APIs
                                                                    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 000F8968
                                                                    • GetSystemMetrics.USER32(00000007), ref: 000F8970
                                                                    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 000F899B
                                                                    • GetSystemMetrics.USER32(00000008), ref: 000F89A3
                                                                    • GetSystemMetrics.USER32(00000004), ref: 000F89C8
                                                                    • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 000F89E5
                                                                    • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 000F89F5
                                                                    • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 000F8A28
                                                                    • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 000F8A3C
                                                                    • GetClientRect.USER32(00000000,000000FF), ref: 000F8A5A
                                                                    • GetStockObject.GDI32(00000011), ref: 000F8A76
                                                                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 000F8A81
                                                                      • Part of subcall function 000F912D: GetCursorPos.USER32(?), ref: 000F9141
                                                                      • Part of subcall function 000F912D: ScreenToClient.USER32(00000000,?), ref: 000F915E
                                                                      • Part of subcall function 000F912D: GetAsyncKeyState.USER32(00000001), ref: 000F9183
                                                                      • Part of subcall function 000F912D: GetAsyncKeyState.USER32(00000002), ref: 000F919D
                                                                    • SetTimer.USER32(00000000,00000000,00000028,000F90FC), ref: 000F8AA8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                    • String ID: AutoIt v3 GUI
                                                                    • API String ID: 1458621304-248962490
                                                                    • Opcode ID: 0584672e1576f643bc4da690d7cac4ae514a9891e423323c534687863c1cfa1b
                                                                    • Instruction ID: d3fe48533a1a54b7ff177b61dadb12f0ae3f02c1ecc13acce56f8ecf2e28f972
                                                                    • Opcode Fuzzy Hash: 0584672e1576f643bc4da690d7cac4ae514a9891e423323c534687863c1cfa1b
                                                                    • Instruction Fuzzy Hash: 5AB18F31A00209AFDF14DF68CC59BEE7BB5FB48314F518229FA15A7690DB70E981CB51
                                                                    APIs
                                                                      • Part of subcall function 001410F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00141114
                                                                      • Part of subcall function 001410F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00140B9B,?,?,?), ref: 00141120
                                                                      • Part of subcall function 001410F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00140B9B,?,?,?), ref: 0014112F
                                                                      • Part of subcall function 001410F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00140B9B,?,?,?), ref: 00141136
                                                                      • Part of subcall function 001410F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0014114D
                                                                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00140DF5
                                                                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00140E29
                                                                    • GetLengthSid.ADVAPI32(?), ref: 00140E40
                                                                    • GetAce.ADVAPI32(?,00000000,?), ref: 00140E7A
                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00140E96
                                                                    • GetLengthSid.ADVAPI32(?), ref: 00140EAD
                                                                    • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00140EB5
                                                                    • HeapAlloc.KERNEL32(00000000), ref: 00140EBC
                                                                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00140EDD
                                                                    • CopySid.ADVAPI32(00000000), ref: 00140EE4
                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00140F13
                                                                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00140F35
                                                                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00140F47
                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00140F6E
                                                                    • HeapFree.KERNEL32(00000000), ref: 00140F75
                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00140F7E
                                                                    • HeapFree.KERNEL32(00000000), ref: 00140F85
                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00140F8E
                                                                    • HeapFree.KERNEL32(00000000), ref: 00140F95
                                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00140FA1
                                                                    • HeapFree.KERNEL32(00000000), ref: 00140FA8
                                                                      • Part of subcall function 00141193: GetProcessHeap.KERNEL32(00000008,00140BB1,?,00000000,?,00140BB1,?), ref: 001411A1
                                                                      • Part of subcall function 00141193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00140BB1,?), ref: 001411A8
                                                                      • Part of subcall function 00141193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00140BB1,?), ref: 001411B7
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                    • String ID:
                                                                    • API String ID: 4175595110-0
                                                                    • Opcode ID: f82b17fd7c0b4fd659407ab2e58fab5f26b24ce3eb1c2db9b7eac9daedc92776
                                                                    • Instruction ID: 5580874ee1704036ffcf723eb9b6cc7d4c971eaf33d5b3a36b95e19e6d9143ea
                                                                    • Opcode Fuzzy Hash: f82b17fd7c0b4fd659407ab2e58fab5f26b24ce3eb1c2db9b7eac9daedc92776
                                                                    • Instruction Fuzzy Hash: B171607190020AEFDF219FA5DC44FAEBBB8BF09310F144129FA19E71A1D7759985CBA0
                                                                    APIs
                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0016C4BD
                                                                    • RegCreateKeyExW.ADVAPI32(?,?,00000000,0017CC08,00000000,?,00000000,?,?), ref: 0016C544
                                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 0016C5A4
                                                                    • _wcslen.LIBCMT ref: 0016C5F4
                                                                    • _wcslen.LIBCMT ref: 0016C66F
                                                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 0016C6B2
                                                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 0016C7C1
                                                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 0016C84D
                                                                    • RegCloseKey.ADVAPI32(?), ref: 0016C881
                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 0016C88E
                                                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 0016C960
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                                    • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                    • API String ID: 9721498-966354055
                                                                    • Opcode ID: 8c9e8d32c7772dcc94f498556fc142d5cca5a55d08692cbb57f46592c43c968f
                                                                    • Instruction ID: e3ca1b9943dfd0f97221db5f486e9d95e5e0e3a7f81874152d938ef22ff8972c
                                                                    • Opcode Fuzzy Hash: 8c9e8d32c7772dcc94f498556fc142d5cca5a55d08692cbb57f46592c43c968f
                                                                    • Instruction Fuzzy Hash: E91268356046419FD714DF25C881B6AB7E5EF88714F04889CF89AAB3A2DB31FD41CB81
                                                                    APIs
                                                                    • CharUpperBuffW.USER32(?,?), ref: 001709C6
                                                                    • _wcslen.LIBCMT ref: 00170A01
                                                                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00170A54
                                                                    • _wcslen.LIBCMT ref: 00170A8A
                                                                    • _wcslen.LIBCMT ref: 00170B06
                                                                    • _wcslen.LIBCMT ref: 00170B81
                                                                      • Part of subcall function 000FF9F2: _wcslen.LIBCMT ref: 000FF9FD
                                                                      • Part of subcall function 00142BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00142BFA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                    • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                    • API String ID: 1103490817-4258414348
                                                                    • Opcode ID: 638ac3d45c7e041ff4ce1f326e65468b354db841160a5abac4eda8303b0a4a1a
                                                                    • Instruction ID: f36b135d7b1600927a44b8b1565c45a95e19527237f2257850444bebc7207a21
                                                                    • Opcode Fuzzy Hash: 638ac3d45c7e041ff4ce1f326e65468b354db841160a5abac4eda8303b0a4a1a
                                                                    • Instruction Fuzzy Hash: CDE18635208741CFC715DF24C45096AB7F2BF98318B55895CF89AAB3A2D731EE85CB81
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$BuffCharUpper
                                                                    • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                    • API String ID: 1256254125-909552448
                                                                    • Opcode ID: 091c3cca552c2eb9c8f80a452429fc9534a3a3ae9809dbcd157ed0961eb3fd97
                                                                    • Instruction ID: c958f3f26d3005690f2b91d716f4b33738f90124a298ac9b69edd44a0d45a721
                                                                    • Opcode Fuzzy Hash: 091c3cca552c2eb9c8f80a452429fc9534a3a3ae9809dbcd157ed0961eb3fd97
                                                                    • Instruction Fuzzy Hash: B071043260416A8BCB20DEBCCD515BA3391AFA5794F554128FCD6A7285F771CEA4C3E0
                                                                    APIs
                                                                    • _wcslen.LIBCMT ref: 0017835A
                                                                    • _wcslen.LIBCMT ref: 0017836E
                                                                    • _wcslen.LIBCMT ref: 00178391
                                                                    • _wcslen.LIBCMT ref: 001783B4
                                                                    • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 001783F2
                                                                    • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00175BF2), ref: 0017844E
                                                                    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00178487
                                                                    • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 001784CA
                                                                    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00178501
                                                                    • FreeLibrary.KERNEL32(?), ref: 0017850D
                                                                    • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0017851D
                                                                    • DestroyIcon.USER32(?,?,?,?,?,00175BF2), ref: 0017852C
                                                                    • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00178549
                                                                    • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00178555
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                                    • String ID: .dll$.exe$.icl
                                                                    • API String ID: 799131459-1154884017
                                                                    • Opcode ID: 82b94fdaf08ed23d6b3b0e37be83238c08a97ea94e4730b9274bb5f96ab7c018
                                                                    • Instruction ID: 6da5e76e730a3748b063d127920a1924efd260641bce58e7cd38fe9861e79a17
                                                                    • Opcode Fuzzy Hash: 82b94fdaf08ed23d6b3b0e37be83238c08a97ea94e4730b9274bb5f96ab7c018
                                                                    • Instruction Fuzzy Hash: 2961D0B1640215BFEB14DF64CC89BFE77B8BB08711F108509F91AE60D1DBB4AA80C7A0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                    • API String ID: 0-1645009161
                                                                    • Opcode ID: 82b7162bee56133eb30aeac6176b3b277beac226d69d6522f7169ad51d99d93f
                                                                    • Instruction ID: 7c503e3ad1cdac07fc6f3b6705967953ef855cc9cb680a8427f29848039007c8
                                                                    • Opcode Fuzzy Hash: 82b7162bee56133eb30aeac6176b3b277beac226d69d6522f7169ad51d99d93f
                                                                    • Instruction Fuzzy Hash: D881C271648615BFDB25AF61DC82FBF37B9AF25300F044024F949BA192EB70D961C7A1
                                                                    APIs
                                                                    • CharLowerBuffW.USER32(?,?), ref: 00153EF8
                                                                    • _wcslen.LIBCMT ref: 00153F03
                                                                    • _wcslen.LIBCMT ref: 00153F5A
                                                                    • _wcslen.LIBCMT ref: 00153F98
                                                                    • GetDriveTypeW.KERNEL32(?), ref: 00153FD6
                                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0015401E
                                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00154059
                                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00154087
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: SendString_wcslen$BuffCharDriveLowerType
                                                                    • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                    • API String ID: 1839972693-4113822522
                                                                    • Opcode ID: bd9fccfe1cf6fb0c9acd11f893e3577a888552b67176892cc30e9bf7e4e099ed
                                                                    • Instruction ID: 111eab1045726922a975389e940e4549e8b0d916dd5e2cc5488508f6b8ddb898
                                                                    • Opcode Fuzzy Hash: bd9fccfe1cf6fb0c9acd11f893e3577a888552b67176892cc30e9bf7e4e099ed
                                                                    • Instruction Fuzzy Hash: E571C472604201DFC310EF24C8818AAB7F4EF957A8F54492DF9A5AB291EB31DD89CB51
                                                                    APIs
                                                                    • LoadIconW.USER32(00000063), ref: 00145A2E
                                                                    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00145A40
                                                                    • SetWindowTextW.USER32(?,?), ref: 00145A57
                                                                    • GetDlgItem.USER32(?,000003EA), ref: 00145A6C
                                                                    • SetWindowTextW.USER32(00000000,?), ref: 00145A72
                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00145A82
                                                                    • SetWindowTextW.USER32(00000000,?), ref: 00145A88
                                                                    • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00145AA9
                                                                    • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00145AC3
                                                                    • GetWindowRect.USER32(?,?), ref: 00145ACC
                                                                    • _wcslen.LIBCMT ref: 00145B33
                                                                    • SetWindowTextW.USER32(?,?), ref: 00145B6F
                                                                    • GetDesktopWindow.USER32 ref: 00145B75
                                                                    • GetWindowRect.USER32(00000000), ref: 00145B7C
                                                                    • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00145BD3
                                                                    • GetClientRect.USER32(?,?), ref: 00145BE0
                                                                    • PostMessageW.USER32(?,00000005,00000000,?), ref: 00145C05
                                                                    • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00145C2F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                                    • String ID:
                                                                    • API String ID: 895679908-0
                                                                    • Opcode ID: f76661809fdf5412313aa6fa2ef729959962d86d873da49131c79a2d0063a82b
                                                                    • Instruction ID: b10d5f36de2235292fd3e7f6451011599c0e31dbdd9c80c199a2d6070a6afb4b
                                                                    • Opcode Fuzzy Hash: f76661809fdf5412313aa6fa2ef729959962d86d873da49131c79a2d0063a82b
                                                                    • Instruction Fuzzy Hash: E2716E31900B09AFDB20DFA8CE85AAEBBF6FF48705F10451CE546A36A1D775E984CB50
                                                                    APIs
                                                                    • LoadCursorW.USER32(00000000,00007F89), ref: 0015FE27
                                                                    • LoadCursorW.USER32(00000000,00007F8A), ref: 0015FE32
                                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 0015FE3D
                                                                    • LoadCursorW.USER32(00000000,00007F03), ref: 0015FE48
                                                                    • LoadCursorW.USER32(00000000,00007F8B), ref: 0015FE53
                                                                    • LoadCursorW.USER32(00000000,00007F01), ref: 0015FE5E
                                                                    • LoadCursorW.USER32(00000000,00007F81), ref: 0015FE69
                                                                    • LoadCursorW.USER32(00000000,00007F88), ref: 0015FE74
                                                                    • LoadCursorW.USER32(00000000,00007F80), ref: 0015FE7F
                                                                    • LoadCursorW.USER32(00000000,00007F86), ref: 0015FE8A
                                                                    • LoadCursorW.USER32(00000000,00007F83), ref: 0015FE95
                                                                    • LoadCursorW.USER32(00000000,00007F85), ref: 0015FEA0
                                                                    • LoadCursorW.USER32(00000000,00007F82), ref: 0015FEAB
                                                                    • LoadCursorW.USER32(00000000,00007F84), ref: 0015FEB6
                                                                    • LoadCursorW.USER32(00000000,00007F04), ref: 0015FEC1
                                                                    • LoadCursorW.USER32(00000000,00007F02), ref: 0015FECC
                                                                    • GetCursorInfo.USER32(?), ref: 0015FEDC
                                                                    • GetLastError.KERNEL32 ref: 0015FF1E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Cursor$Load$ErrorInfoLast
                                                                    • String ID:
                                                                    • API String ID: 3215588206-0
                                                                    • Opcode ID: ea67b62a2bf36e619e6a7691ed731884c3ff0a9c9d5b9d8b6a8eb3dffa953223
                                                                    • Instruction ID: 01ff8f6be4e7ea8501773101d5ea5b9012916ecde8da26e7766dd8335596c156
                                                                    • Opcode Fuzzy Hash: ea67b62a2bf36e619e6a7691ed731884c3ff0a9c9d5b9d8b6a8eb3dffa953223
                                                                    • Instruction Fuzzy Hash: C64152B0D04319AADB109FBA8C89C5EBFE8FF04754B50452AF51DEB681DB78A901CF91
                                                                    APIs
                                                                    • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 001000C6
                                                                      • Part of subcall function 001000ED: InitializeCriticalSectionAndSpinCount.KERNEL32(001B070C,00000FA0,FD77C613,?,?,?,?,001223B3,000000FF), ref: 0010011C
                                                                      • Part of subcall function 001000ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,001223B3,000000FF), ref: 00100127
                                                                      • Part of subcall function 001000ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,001223B3,000000FF), ref: 00100138
                                                                      • Part of subcall function 001000ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 0010014E
                                                                      • Part of subcall function 001000ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 0010015C
                                                                      • Part of subcall function 001000ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 0010016A
                                                                      • Part of subcall function 001000ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00100195
                                                                      • Part of subcall function 001000ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 001001A0
                                                                    • ___scrt_fastfail.LIBCMT ref: 001000E7
                                                                      • Part of subcall function 001000A3: __onexit.LIBCMT ref: 001000A9
                                                                    Strings
                                                                    • WakeAllConditionVariable, xrefs: 00100162
                                                                    • InitializeConditionVariable, xrefs: 00100148
                                                                    • SleepConditionVariableCS, xrefs: 00100154
                                                                    • kernel32.dll, xrefs: 00100133
                                                                    • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00100122
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                                    • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                    • API String ID: 66158676-1714406822
                                                                    • Opcode ID: bcb9d9fe4eef3cd404c7bee336382256b594115fc9d50168703b1733b5fcae57
                                                                    • Instruction ID: 993132fc186a7dcf1091552665ef7b7576b5737e6c1bdf0d2bbed8d25da51b9a
                                                                    • Opcode Fuzzy Hash: bcb9d9fe4eef3cd404c7bee336382256b594115fc9d50168703b1733b5fcae57
                                                                    • Instruction Fuzzy Hash: 8A21D732A44711ABD7226BA4EC09B6A73E4EB0DB51F10413EF98592AD1DFB09C808A90
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen
                                                                    • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                    • API String ID: 176396367-1603158881
                                                                    • Opcode ID: 179ad100d4f6ee28ef322d11cdb27560991228b6888de21645b4094aa92b8cec
                                                                    • Instruction ID: f74757e6687de5394914bf3b94d9aa88493bd7508bd139979ca53907a0f36c79
                                                                    • Opcode Fuzzy Hash: 179ad100d4f6ee28ef322d11cdb27560991228b6888de21645b4094aa92b8cec
                                                                    • Instruction Fuzzy Hash: B5E1F532A00516ABCB18DFB8C451AFDFBB1BF54710F558129E466F72A0DB70AE85C7A0
                                                                    APIs
                                                                    • CharLowerBuffW.USER32(00000000,00000000,0017CC08), ref: 00154527
                                                                    • _wcslen.LIBCMT ref: 0015453B
                                                                    • _wcslen.LIBCMT ref: 00154599
                                                                    • _wcslen.LIBCMT ref: 001545F4
                                                                    • _wcslen.LIBCMT ref: 0015463F
                                                                    • _wcslen.LIBCMT ref: 001546A7
                                                                      • Part of subcall function 000FF9F2: _wcslen.LIBCMT ref: 000FF9FD
                                                                    • GetDriveTypeW.KERNEL32(?,001A6BF0,00000061), ref: 00154743
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$BuffCharDriveLowerType
                                                                    • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                    • API String ID: 2055661098-1000479233
                                                                    • Opcode ID: 92ea93bd273e93659e256ccaa342a2e21b5ba93348f73c4568c1ab52fa52cba7
                                                                    • Instruction ID: 7f6e856b4de631f3f075f3386462a3e484d13df6fa5de1ca2c5f1163006a76ba
                                                                    • Opcode Fuzzy Hash: 92ea93bd273e93659e256ccaa342a2e21b5ba93348f73c4568c1ab52fa52cba7
                                                                    • Instruction Fuzzy Hash: 2DB11731608302DFC714DF28C890A6EB7E5AFA9759F50491DF8A6DB291E730D888CB52
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,0017CC08), ref: 001640BB
                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 001640CD
                                                                    • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,0017CC08), ref: 001640F2
                                                                    • FreeLibrary.KERNEL32(00000000,?,0017CC08), ref: 0016413E
                                                                    • StringFromGUID2.OLE32(?,?,00000028,?,0017CC08), ref: 001641A8
                                                                    • SysFreeString.OLEAUT32(00000009), ref: 00164262
                                                                    • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 001642C8
                                                                    • SysFreeString.OLEAUT32(?), ref: 001642F2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                                                                    • String ID: GetModuleHandleExW$kernel32.dll
                                                                    • API String ID: 354098117-199464113
                                                                    • Opcode ID: 061545aab28b8b5a64c5ef8c5f0ed80062c4dd0b713b1ad4f60b8c3f9fbca6e1
                                                                    • Instruction ID: d831585507b7b8f3e4b55f4d392b14ad4faa307e85c025ccb6b8a1b8f889e907
                                                                    • Opcode Fuzzy Hash: 061545aab28b8b5a64c5ef8c5f0ed80062c4dd0b713b1ad4f60b8c3f9fbca6e1
                                                                    • Instruction Fuzzy Hash: 29126E75A00115EFDB14DF94C884EAEBBB5FF45314F258098F906AB251CB31ED96CBA0
                                                                    APIs
                                                                    • GetMenuItemCount.USER32(001B1990), ref: 00122F8D
                                                                    • GetMenuItemCount.USER32(001B1990), ref: 0012303D
                                                                    • GetCursorPos.USER32(?), ref: 00123081
                                                                    • SetForegroundWindow.USER32(00000000), ref: 0012308A
                                                                    • TrackPopupMenuEx.USER32(001B1990,00000000,?,00000000,00000000,00000000), ref: 0012309D
                                                                    • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 001230A9
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                                    • String ID: 0
                                                                    • API String ID: 36266755-4108050209
                                                                    • Opcode ID: 0858dd086107522330e15863fb7814f3a78e45b52daf33d2269a2a1d61a2f70f
                                                                    • Instruction ID: a5889727e1a3f433d674ad2cd97514d26f1a8a663b4e5825e452e0a47a78a805
                                                                    • Opcode Fuzzy Hash: 0858dd086107522330e15863fb7814f3a78e45b52daf33d2269a2a1d61a2f70f
                                                                    • Instruction Fuzzy Hash: C4710970644255BEEB258F25DD89F9EFF74FF05324F20421AF6246A1E0C7B1A960DB90
                                                                    APIs
                                                                    • DestroyWindow.USER32(00000000,?), ref: 00176DEB
                                                                      • Part of subcall function 000E6B57: _wcslen.LIBCMT ref: 000E6B6A
                                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00176E5F
                                                                    • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00176E81
                                                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00176E94
                                                                    • DestroyWindow.USER32(?), ref: 00176EB5
                                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,000E0000,00000000), ref: 00176EE4
                                                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00176EFD
                                                                    • GetDesktopWindow.USER32 ref: 00176F16
                                                                    • GetWindowRect.USER32(00000000), ref: 00176F1D
                                                                    • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00176F35
                                                                    • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00176F4D
                                                                      • Part of subcall function 000F9944: GetWindowLongW.USER32(?,000000EB), ref: 000F9952
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                                    • String ID: 0$tooltips_class32
                                                                    • API String ID: 2429346358-3619404913
                                                                    • Opcode ID: 38c0a017ec4ed4ab4e5d576dc279359041c67911f02c5be63d5c6cac66725b38
                                                                    • Instruction ID: ca4bcc962021d8c591110835f67db24c4de683fc48fb694c9c8ad56d736c08d9
                                                                    • Opcode Fuzzy Hash: 38c0a017ec4ed4ab4e5d576dc279359041c67911f02c5be63d5c6cac66725b38
                                                                    • Instruction Fuzzy Hash: 40719870104240AFDB21DF28DC58FBABBF9FB89304F64451DF98997262CB70A989CB51
                                                                    APIs
                                                                      • Part of subcall function 000F9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 000F9BB2
                                                                    • DragQueryPoint.SHELL32(?,?), ref: 00179147
                                                                      • Part of subcall function 00177674: ClientToScreen.USER32(?,?), ref: 0017769A
                                                                      • Part of subcall function 00177674: GetWindowRect.USER32(?,?), ref: 00177710
                                                                      • Part of subcall function 00177674: PtInRect.USER32(?,?,00178B89), ref: 00177720
                                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 001791B0
                                                                    • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 001791BB
                                                                    • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 001791DE
                                                                    • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00179225
                                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 0017923E
                                                                    • SendMessageW.USER32(?,000000B1,?,?), ref: 00179255
                                                                    • SendMessageW.USER32(?,000000B1,?,?), ref: 00179277
                                                                    • DragFinish.SHELL32(?), ref: 0017927E
                                                                    • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00179371
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                                    • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                                    • API String ID: 221274066-3440237614
                                                                    • Opcode ID: 24e38da8cc2055dcba2d2f9e47aa360fb371f5ca8ad15d8c7144f792433fe7f1
                                                                    • Instruction ID: c175fc12ba44e5de06dd467ef1e111e5621baf544f80a70efd26c8ce8b7c35d2
                                                                    • Opcode Fuzzy Hash: 24e38da8cc2055dcba2d2f9e47aa360fb371f5ca8ad15d8c7144f792433fe7f1
                                                                    • Instruction Fuzzy Hash: 1C616A71108340AFD701EF65DC85DAFBBF8EF89750F40491DF599921A1DB309A89CB92
                                                                    APIs
                                                                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0015C4B0
                                                                    • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0015C4C3
                                                                    • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0015C4D7
                                                                    • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0015C4F0
                                                                    • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0015C533
                                                                    • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0015C549
                                                                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0015C554
                                                                    • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0015C584
                                                                    • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0015C5DC
                                                                    • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0015C5F0
                                                                    • InternetCloseHandle.WININET(00000000), ref: 0015C5FB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                                    • String ID:
                                                                    • API String ID: 3800310941-3916222277
                                                                    • Opcode ID: 48bf768ead4b87177f1c9785e038d63d546fb1da28a95b040c9d5f4cf178e312
                                                                    • Instruction ID: e2377fef73dccc9acc40b9738946a7dc29bdde38b2ce92af0f8fad943cf4abda
                                                                    • Opcode Fuzzy Hash: 48bf768ead4b87177f1c9785e038d63d546fb1da28a95b040c9d5f4cf178e312
                                                                    • Instruction Fuzzy Hash: FD514EB1600305FFDB218FA4C988AAB7BBCFF04755F00441DF9559A650EB34EA889BE0
                                                                    APIs
                                                                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 00178592
                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 001785A2
                                                                    • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 001785AD
                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 001785BA
                                                                    • GlobalLock.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 001785C8
                                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 001785D7
                                                                    • GlobalUnlock.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 001785E0
                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 001785E7
                                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 001785F8
                                                                    • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,0017FC38,?), ref: 00178611
                                                                    • GlobalFree.KERNEL32(00000000), ref: 00178621
                                                                    • GetObjectW.GDI32(?,00000018,?), ref: 00178641
                                                                    • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00178671
                                                                    • DeleteObject.GDI32(?), ref: 00178699
                                                                    • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 001786AF
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                    • String ID:
                                                                    • API String ID: 3840717409-0
                                                                    • Opcode ID: adec125103b3121600268d521965c8a9f737b371c8a38a73a3e3652304a82637
                                                                    • Instruction ID: 8ead94e9e204b43fa6b8a2c0b5837f0353fcbb73e9ea1190455a0f1b59d220e7
                                                                    • Opcode Fuzzy Hash: adec125103b3121600268d521965c8a9f737b371c8a38a73a3e3652304a82637
                                                                    • Instruction Fuzzy Hash: C841F975640205BFDB119FA5DC8CEAA7BB8FF89B15F148158F909E7260DB309981CB60
                                                                    APIs
                                                                    • VariantInit.OLEAUT32(00000000), ref: 00151502
                                                                    • VariantCopy.OLEAUT32(?,?), ref: 0015150B
                                                                    • VariantClear.OLEAUT32(?), ref: 00151517
                                                                    • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 001515FB
                                                                    • VarR8FromDec.OLEAUT32(?,?), ref: 00151657
                                                                    • VariantInit.OLEAUT32(?), ref: 00151708
                                                                    • SysFreeString.OLEAUT32(?), ref: 0015178C
                                                                    • VariantClear.OLEAUT32(?), ref: 001517D8
                                                                    • VariantClear.OLEAUT32(?), ref: 001517E7
                                                                    • VariantInit.OLEAUT32(00000000), ref: 00151823
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                                    • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                                    • API String ID: 1234038744-3931177956
                                                                    • Opcode ID: abcb3b66616e219f787356660f96771aa6ebfdf16eb80496b7eb0a090eded31e
                                                                    • Instruction ID: 8ebb2930df1ce84b92d018ee967df7be479b0c092721841e2193a24ca80803b9
                                                                    • Opcode Fuzzy Hash: abcb3b66616e219f787356660f96771aa6ebfdf16eb80496b7eb0a090eded31e
                                                                    • Instruction Fuzzy Hash: DED12331A00105EFDB05AF65D885BBDB7B1BF46701F11805AF826AF581EB34DC49DBA1
                                                                    APIs
                                                                      • Part of subcall function 000E9CB3: _wcslen.LIBCMT ref: 000E9CBD
                                                                      • Part of subcall function 0016C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0016B6AE,?,?), ref: 0016C9B5
                                                                      • Part of subcall function 0016C998: _wcslen.LIBCMT ref: 0016C9F1
                                                                      • Part of subcall function 0016C998: _wcslen.LIBCMT ref: 0016CA68
                                                                      • Part of subcall function 0016C998: _wcslen.LIBCMT ref: 0016CA9E
                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0016B6F4
                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0016B772
                                                                    • RegDeleteValueW.ADVAPI32(?,?), ref: 0016B80A
                                                                    • RegCloseKey.ADVAPI32(?), ref: 0016B87E
                                                                    • RegCloseKey.ADVAPI32(?), ref: 0016B89C
                                                                    • LoadLibraryA.KERNEL32(advapi32.dll), ref: 0016B8F2
                                                                    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0016B904
                                                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 0016B922
                                                                    • FreeLibrary.KERNEL32(00000000), ref: 0016B983
                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 0016B994
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                                    • String ID: RegDeleteKeyExW$advapi32.dll
                                                                    • API String ID: 146587525-4033151799
                                                                    • Opcode ID: 6d605c9fde5d0bef41e73f68b83b8a214493223881885681e4863c74001340e1
                                                                    • Instruction ID: 16841c895ee416ebca61925937b6bb7657387aff487562397d400d476b5e3a6e
                                                                    • Opcode Fuzzy Hash: 6d605c9fde5d0bef41e73f68b83b8a214493223881885681e4863c74001340e1
                                                                    • Instruction Fuzzy Hash: 96C18B35208241AFD714DF24C895F6ABBE5BF84308F54845CF49A9B2A2CB31ED86CB91
                                                                    APIs
                                                                    • GetDC.USER32(00000000), ref: 001625D8
                                                                    • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 001625E8
                                                                    • CreateCompatibleDC.GDI32(?), ref: 001625F4
                                                                    • SelectObject.GDI32(00000000,?), ref: 00162601
                                                                    • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 0016266D
                                                                    • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 001626AC
                                                                    • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 001626D0
                                                                    • SelectObject.GDI32(?,?), ref: 001626D8
                                                                    • DeleteObject.GDI32(?), ref: 001626E1
                                                                    • DeleteDC.GDI32(?), ref: 001626E8
                                                                    • ReleaseDC.USER32(00000000,?), ref: 001626F3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                    • String ID: (
                                                                    • API String ID: 2598888154-3887548279
                                                                    • Opcode ID: d2d2592038934df18b3617bf0b4a920c5104ce3f0267f1645e6644b65af9e931
                                                                    • Instruction ID: f3d73853def2b8752169afb9bbf368438fbe88f5fce43ae6295ab537655c6ca9
                                                                    • Opcode Fuzzy Hash: d2d2592038934df18b3617bf0b4a920c5104ce3f0267f1645e6644b65af9e931
                                                                    • Instruction Fuzzy Hash: DF61D2B5D00219EFCF14CFA4DC84AAEBBB6FF48310F208529E959A7250D774A991CF90
                                                                    APIs
                                                                    • ___free_lconv_mon.LIBCMT ref: 0011DAA1
                                                                      • Part of subcall function 0011D63C: _free.LIBCMT ref: 0011D659
                                                                      • Part of subcall function 0011D63C: _free.LIBCMT ref: 0011D66B
                                                                      • Part of subcall function 0011D63C: _free.LIBCMT ref: 0011D67D
                                                                      • Part of subcall function 0011D63C: _free.LIBCMT ref: 0011D68F
                                                                      • Part of subcall function 0011D63C: _free.LIBCMT ref: 0011D6A1
                                                                      • Part of subcall function 0011D63C: _free.LIBCMT ref: 0011D6B3
                                                                      • Part of subcall function 0011D63C: _free.LIBCMT ref: 0011D6C5
                                                                      • Part of subcall function 0011D63C: _free.LIBCMT ref: 0011D6D7
                                                                      • Part of subcall function 0011D63C: _free.LIBCMT ref: 0011D6E9
                                                                      • Part of subcall function 0011D63C: _free.LIBCMT ref: 0011D6FB
                                                                      • Part of subcall function 0011D63C: _free.LIBCMT ref: 0011D70D
                                                                      • Part of subcall function 0011D63C: _free.LIBCMT ref: 0011D71F
                                                                      • Part of subcall function 0011D63C: _free.LIBCMT ref: 0011D731
                                                                    • _free.LIBCMT ref: 0011DA96
                                                                      • Part of subcall function 001129C8: HeapFree.KERNEL32(00000000,00000000,?,0011D7D1,00000000,00000000,00000000,00000000,?,0011D7F8,00000000,00000007,00000000,?,0011DBF5,00000000), ref: 001129DE
                                                                      • Part of subcall function 001129C8: GetLastError.KERNEL32(00000000,?,0011D7D1,00000000,00000000,00000000,00000000,?,0011D7F8,00000000,00000007,00000000,?,0011DBF5,00000000,00000000), ref: 001129F0
                                                                    • _free.LIBCMT ref: 0011DAB8
                                                                    • _free.LIBCMT ref: 0011DACD
                                                                    • _free.LIBCMT ref: 0011DAD8
                                                                    • _free.LIBCMT ref: 0011DAFA
                                                                    • _free.LIBCMT ref: 0011DB0D
                                                                    • _free.LIBCMT ref: 0011DB1B
                                                                    • _free.LIBCMT ref: 0011DB26
                                                                    • _free.LIBCMT ref: 0011DB5E
                                                                    • _free.LIBCMT ref: 0011DB65
                                                                    • _free.LIBCMT ref: 0011DB82
                                                                    • _free.LIBCMT ref: 0011DB9A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                    • String ID:
                                                                    • API String ID: 161543041-0
                                                                    • Opcode ID: 3b70a1ef65e781273eda176db178cbd49a868255d57ed5dc2f986fe33f50ceb3
                                                                    • Instruction ID: 9beb67aa50ffb6a0fd2dc6ba5897e110e188702d7a857d5623dba38fe3cb5dde
                                                                    • Opcode Fuzzy Hash: 3b70a1ef65e781273eda176db178cbd49a868255d57ed5dc2f986fe33f50ceb3
                                                                    • Instruction Fuzzy Hash: 7E315A326086099FEB29AA39F845BDA77E8FF21324F114439E449DB191DF34ACE08724
                                                                    APIs
                                                                    • GetClassNameW.USER32(?,?,00000100), ref: 0014369C
                                                                    • _wcslen.LIBCMT ref: 001436A7
                                                                    • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00143797
                                                                    • GetClassNameW.USER32(?,?,00000400), ref: 0014380C
                                                                    • GetDlgCtrlID.USER32(?), ref: 0014385D
                                                                    • GetWindowRect.USER32(?,?), ref: 00143882
                                                                    • GetParent.USER32(?), ref: 001438A0
                                                                    • ScreenToClient.USER32(00000000), ref: 001438A7
                                                                    • GetClassNameW.USER32(?,?,00000100), ref: 00143921
                                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 0014395D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                                    • String ID: %s%u
                                                                    • API String ID: 4010501982-679674701
                                                                    • Opcode ID: 8d2c59cf275386b996997f7a4ef3908c0bec0e0c1eea4b5e9effae11dd71ed4d
                                                                    • Instruction ID: d983e978005aa94f4f18229edb1813cf0b2969fa3fdb1996755fb38b9deb46d3
                                                                    • Opcode Fuzzy Hash: 8d2c59cf275386b996997f7a4ef3908c0bec0e0c1eea4b5e9effae11dd71ed4d
                                                                    • Instruction Fuzzy Hash: DD91C271204606AFD719DF24C885FEAF7A9FF44354F108629F9A9D21A0DB30EA46CB91
                                                                    APIs
                                                                    • GetClassNameW.USER32(?,?,00000400), ref: 00144994
                                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 001449DA
                                                                    • _wcslen.LIBCMT ref: 001449EB
                                                                    • CharUpperBuffW.USER32(?,00000000), ref: 001449F7
                                                                    • _wcsstr.LIBVCRUNTIME ref: 00144A2C
                                                                    • GetClassNameW.USER32(00000018,?,00000400), ref: 00144A64
                                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 00144A9D
                                                                    • GetClassNameW.USER32(00000018,?,00000400), ref: 00144AE6
                                                                    • GetClassNameW.USER32(?,?,00000400), ref: 00144B20
                                                                    • GetWindowRect.USER32(?,?), ref: 00144B8B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                                    • String ID: ThumbnailClass
                                                                    • API String ID: 1311036022-1241985126
                                                                    • Opcode ID: d2bfb04efc4ca3402df316756794c8e6051840a5f97aea0c2721d300b8394c8b
                                                                    • Instruction ID: 8fee75bcf768cd52bd2f091570324dcb9d617683a525252e1242ea5d273723f2
                                                                    • Opcode Fuzzy Hash: d2bfb04efc4ca3402df316756794c8e6051840a5f97aea0c2721d300b8394c8b
                                                                    • Instruction Fuzzy Hash: 7E91CF711082059FDB04DF14C985FAA77E9FF84714F088469FD8A9B1A6EB30ED85CBA1
                                                                    APIs
                                                                      • Part of subcall function 000F9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 000F9BB2
                                                                    • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00178D5A
                                                                    • GetFocus.USER32 ref: 00178D6A
                                                                    • GetDlgCtrlID.USER32(00000000), ref: 00178D75
                                                                    • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 00178E1D
                                                                    • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00178ECF
                                                                    • GetMenuItemCount.USER32(?), ref: 00178EEC
                                                                    • GetMenuItemID.USER32(?,00000000), ref: 00178EFC
                                                                    • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00178F2E
                                                                    • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00178F70
                                                                    • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00178FA1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                                                    • String ID: 0
                                                                    • API String ID: 1026556194-4108050209
                                                                    • Opcode ID: 06ce7efdde376ce0ceb404cd5e015cce756bf0baded554c5e36ce51aa41dc60a
                                                                    • Instruction ID: 3e836be6fae8556e1aeb2c502e804f218d28c322de4595ee53993f5054f26693
                                                                    • Opcode Fuzzy Hash: 06ce7efdde376ce0ceb404cd5e015cce756bf0baded554c5e36ce51aa41dc60a
                                                                    • Instruction Fuzzy Hash: 60818F71648301AFD710CF24C888AAB7BF9FB88354F14891DF99997291DF71D941CBA2
                                                                    APIs
                                                                    • GetMenuItemInfoW.USER32(001B1990,000000FF,00000000,00000030), ref: 0014BFAC
                                                                    • SetMenuItemInfoW.USER32(001B1990,00000004,00000000,00000030), ref: 0014BFE1
                                                                    • Sleep.KERNEL32(000001F4), ref: 0014BFF3
                                                                    • GetMenuItemCount.USER32(?), ref: 0014C039
                                                                    • GetMenuItemID.USER32(?,00000000), ref: 0014C056
                                                                    • GetMenuItemID.USER32(?,-00000001), ref: 0014C082
                                                                    • GetMenuItemID.USER32(?,?), ref: 0014C0C9
                                                                    • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0014C10F
                                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0014C124
                                                                    • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0014C145
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ItemMenu$Info$CheckCountRadioSleep
                                                                    • String ID: 0
                                                                    • API String ID: 1460738036-4108050209
                                                                    • Opcode ID: 42b12ed64177679f4cf63ee5f589b40cb1bdc0074a17dbb68e15c9009e54fd4a
                                                                    • Instruction ID: cc86a6a480476b851d280c4142961b4aafb977c663ded559397bbbd952257714
                                                                    • Opcode Fuzzy Hash: 42b12ed64177679f4cf63ee5f589b40cb1bdc0074a17dbb68e15c9009e54fd4a
                                                                    • Instruction Fuzzy Hash: CA618FB4A0124AEFDF15CF64CC88AEEBBB8FB05344F144559F815A72A1D731AD85CBA0
                                                                    APIs
                                                                    • GetFileVersionInfoSizeW.VERSION(?,?), ref: 0014DC20
                                                                    • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 0014DC46
                                                                    • _wcslen.LIBCMT ref: 0014DC50
                                                                    • _wcsstr.LIBVCRUNTIME ref: 0014DCA0
                                                                    • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 0014DCBC
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                                                                    • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                                    • API String ID: 1939486746-1459072770
                                                                    • Opcode ID: e5442a860ed829a7db7c78e3af4b58c4d9a856d02610099530b63c77ffd7e59c
                                                                    • Instruction ID: 59c5fc9579337a57082639434e493c3bace20a9f98492fe44c16f492e5558cda
                                                                    • Opcode Fuzzy Hash: e5442a860ed829a7db7c78e3af4b58c4d9a856d02610099530b63c77ffd7e59c
                                                                    • Instruction Fuzzy Hash: F9412472A40205BADB04A7B4EC43EFF37BCEF52750F148069FA04A61D3EBB4990197A4
                                                                    APIs
                                                                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0016CC64
                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 0016CC8D
                                                                    • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0016CD48
                                                                      • Part of subcall function 0016CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 0016CCAA
                                                                      • Part of subcall function 0016CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 0016CCBD
                                                                      • Part of subcall function 0016CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0016CCCF
                                                                      • Part of subcall function 0016CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0016CD05
                                                                      • Part of subcall function 0016CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0016CD28
                                                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 0016CCF3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                                    • String ID: RegDeleteKeyExW$advapi32.dll
                                                                    • API String ID: 2734957052-4033151799
                                                                    • Opcode ID: edca2306f087a3ea603fe756b9220373da8a126932c61315608cab0f7420a65f
                                                                    • Instruction ID: bc4bffc0674103d856deb704b409a1a69b69b7822ecef3a18cd6b1c0c1004589
                                                                    • Opcode Fuzzy Hash: edca2306f087a3ea603fe756b9220373da8a126932c61315608cab0f7420a65f
                                                                    • Instruction Fuzzy Hash: AA316F75A01129BBDB209B94DC88EFFBB7CEF56750F000169F949E2240DB349E85DAE0
                                                                    APIs
                                                                    • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00153D40
                                                                    • _wcslen.LIBCMT ref: 00153D6D
                                                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00153D9D
                                                                    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00153DBE
                                                                    • RemoveDirectoryW.KERNEL32(?), ref: 00153DCE
                                                                    • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00153E55
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00153E60
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00153E6B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                                    • String ID: :$\$\??\%s
                                                                    • API String ID: 1149970189-3457252023
                                                                    • Opcode ID: 778e5acbaec7b28b1665cf35e017266990f5d3a989201ba64b23eeff06d00fae
                                                                    • Instruction ID: 759adbd1dcae8a690bc968b02885272438d795e164dc18892591d00f1cb895f6
                                                                    • Opcode Fuzzy Hash: 778e5acbaec7b28b1665cf35e017266990f5d3a989201ba64b23eeff06d00fae
                                                                    • Instruction Fuzzy Hash: 3231B672500109ABDB219BA0DC49FEF37BDEF88741F5040B9F929D6051E77097888B64
                                                                    APIs
                                                                    • timeGetTime.WINMM ref: 0014E6B4
                                                                      • Part of subcall function 000FE551: timeGetTime.WINMM(?,?,0014E6D4), ref: 000FE555
                                                                    • Sleep.KERNEL32(0000000A), ref: 0014E6E1
                                                                    • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 0014E705
                                                                    • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 0014E727
                                                                    • SetActiveWindow.USER32 ref: 0014E746
                                                                    • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 0014E754
                                                                    • SendMessageW.USER32(00000010,00000000,00000000), ref: 0014E773
                                                                    • Sleep.KERNEL32(000000FA), ref: 0014E77E
                                                                    • IsWindow.USER32 ref: 0014E78A
                                                                    • EndDialog.USER32(00000000), ref: 0014E79B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                    • String ID: BUTTON
                                                                    • API String ID: 1194449130-3405671355
                                                                    • Opcode ID: 5c252e7bb304509e1aa0db42f7c3e51e8cbf51d009ef8713a60919debf9ab3c1
                                                                    • Instruction ID: ac6b80705fb864353a9195b919fa14b4ca8ac46ae012e128eb2645732b8f79e6
                                                                    • Opcode Fuzzy Hash: 5c252e7bb304509e1aa0db42f7c3e51e8cbf51d009ef8713a60919debf9ab3c1
                                                                    • Instruction Fuzzy Hash: A821D870600204BFEB005F71ECCAE253BBAF75435AF211528F919C2AB1DB719CC48B94
                                                                    APIs
                                                                      • Part of subcall function 000E9CB3: _wcslen.LIBCMT ref: 000E9CBD
                                                                    • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0014EA5D
                                                                    • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0014EA73
                                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0014EA84
                                                                    • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0014EA96
                                                                    • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0014EAA7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: SendString$_wcslen
                                                                    • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                    • API String ID: 2420728520-1007645807
                                                                    • Opcode ID: 4a8a25fce50c9f2e271f2688449f5d0103be872d1d1fbfc8bcc92b18e004f72c
                                                                    • Instruction ID: 7633465f6bda555b098abcdde9f4ca7dfb9c7130febe7b2e32310b97b75a612a
                                                                    • Opcode Fuzzy Hash: 4a8a25fce50c9f2e271f2688449f5d0103be872d1d1fbfc8bcc92b18e004f72c
                                                                    • Instruction Fuzzy Hash: F0111C25A902597DD724A7A2DC4ADFB6ABCEBD2B04F540429B811B30E2EFB05A45C5B0
                                                                    APIs
                                                                    • GetKeyboardState.USER32(?), ref: 0014A012
                                                                    • SetKeyboardState.USER32(?), ref: 0014A07D
                                                                    • GetAsyncKeyState.USER32(000000A0), ref: 0014A09D
                                                                    • GetKeyState.USER32(000000A0), ref: 0014A0B4
                                                                    • GetAsyncKeyState.USER32(000000A1), ref: 0014A0E3
                                                                    • GetKeyState.USER32(000000A1), ref: 0014A0F4
                                                                    • GetAsyncKeyState.USER32(00000011), ref: 0014A120
                                                                    • GetKeyState.USER32(00000011), ref: 0014A12E
                                                                    • GetAsyncKeyState.USER32(00000012), ref: 0014A157
                                                                    • GetKeyState.USER32(00000012), ref: 0014A165
                                                                    • GetAsyncKeyState.USER32(0000005B), ref: 0014A18E
                                                                    • GetKeyState.USER32(0000005B), ref: 0014A19C
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: State$Async$Keyboard
                                                                    • String ID:
                                                                    • API String ID: 541375521-0
                                                                    • Opcode ID: cee9e55bdb40b2ef8b8004e8cc56ee6e730aa573eebe5df0ddc24cf94dd437f9
                                                                    • Instruction ID: 8c5ed09a2290d42ca59d5406d4001fb8708998df9f07746cb1bc37adeabe8389
                                                                    • Opcode Fuzzy Hash: cee9e55bdb40b2ef8b8004e8cc56ee6e730aa573eebe5df0ddc24cf94dd437f9
                                                                    • Instruction Fuzzy Hash: DE512C3094438829FB35DBB08850BEBBFF59F12780F49458DD5C2571E2DB54AA8CC762
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,00000001), ref: 00145CE2
                                                                    • GetWindowRect.USER32(00000000,?), ref: 00145CFB
                                                                    • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00145D59
                                                                    • GetDlgItem.USER32(?,00000002), ref: 00145D69
                                                                    • GetWindowRect.USER32(00000000,?), ref: 00145D7B
                                                                    • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00145DCF
                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00145DDD
                                                                    • GetWindowRect.USER32(00000000,?), ref: 00145DEF
                                                                    • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00145E31
                                                                    • GetDlgItem.USER32(?,000003EA), ref: 00145E44
                                                                    • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00145E5A
                                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 00145E67
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Window$ItemMoveRect$Invalidate
                                                                    • String ID:
                                                                    • API String ID: 3096461208-0
                                                                    • Opcode ID: 7d4cd804768a8db78ae41eb9a9e279083e9cd81137e5debd7697d9065110b35b
                                                                    • Instruction ID: 6bbec9b2f6fb03839c81abd3af629e73d8d6e2e8596ccc712b4b6b7d49e73b45
                                                                    • Opcode Fuzzy Hash: 7d4cd804768a8db78ae41eb9a9e279083e9cd81137e5debd7697d9065110b35b
                                                                    • Instruction Fuzzy Hash: 7B510E71A00605AFDB18CFA8DD89AAEBBB6FF48300F548129F519E6691D7709E44CB60
                                                                    APIs
                                                                      • Part of subcall function 000F8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,000F8BE8,?,00000000,?,?,?,?,000F8BBA,00000000,?), ref: 000F8FC5
                                                                    • DestroyWindow.USER32(?), ref: 000F8C81
                                                                    • KillTimer.USER32(00000000,?,?,?,?,000F8BBA,00000000,?), ref: 000F8D1B
                                                                    • DestroyAcceleratorTable.USER32(00000000), ref: 00136973
                                                                    • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,000F8BBA,00000000,?), ref: 001369A1
                                                                    • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,000F8BBA,00000000,?), ref: 001369B8
                                                                    • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,000F8BBA,00000000), ref: 001369D4
                                                                    • DeleteObject.GDI32(00000000), ref: 001369E6
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                    • String ID:
                                                                    • API String ID: 641708696-0
                                                                    • Opcode ID: bddf748b0b4f9041b2cf9b0953fd2266ddaf48d7e68cd17836185db8ee48ea92
                                                                    • Instruction ID: 59c04bca0408b257666d17d04c36aba0c4092a7ddacc017653ed8b4c20322f0a
                                                                    • Opcode Fuzzy Hash: bddf748b0b4f9041b2cf9b0953fd2266ddaf48d7e68cd17836185db8ee48ea92
                                                                    • Instruction Fuzzy Hash: 63617731102608EFDB359F15D958BBAB7F1FB4031AF55862CE2469BD60CB31A9D0EB90
                                                                    APIs
                                                                      • Part of subcall function 000F9944: GetWindowLongW.USER32(?,000000EB), ref: 000F9952
                                                                    • GetSysColor.USER32(0000000F), ref: 000F9862
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ColorLongWindow
                                                                    • String ID:
                                                                    • API String ID: 259745315-0
                                                                    • Opcode ID: 43cf8f3be109f8bd676efb349d7e9671018f7459ac6f2e11c31a481cf2ad5c5f
                                                                    • Instruction ID: 587c9307687aaae192913c069c92155bcb6ddb7605fa624bc02a55e10605754e
                                                                    • Opcode Fuzzy Hash: 43cf8f3be109f8bd676efb349d7e9671018f7459ac6f2e11c31a481cf2ad5c5f
                                                                    • Instruction Fuzzy Hash: D941C431104648EFDB305F389C88BB93BB5EB46370F544619FAA6875E1CB719D82EB60
                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,0012F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00149717
                                                                    • LoadStringW.USER32(00000000,?,0012F7F8,00000001), ref: 00149720
                                                                      • Part of subcall function 000E9CB3: _wcslen.LIBCMT ref: 000E9CBD
                                                                    • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,0012F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00149742
                                                                    • LoadStringW.USER32(00000000,?,0012F7F8,00000001), ref: 00149745
                                                                    • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00149866
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: HandleLoadModuleString$Message_wcslen
                                                                    • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                    • API String ID: 747408836-2268648507
                                                                    • Opcode ID: e43ec6d3f3165314181e949c20982f580ddf1f013b1b3a4530ecd1508544c956
                                                                    • Instruction ID: 85263a6b1457579d537dbc6ed1642166806fce6d37f3454d8957481a3567f5f7
                                                                    • Opcode Fuzzy Hash: e43ec6d3f3165314181e949c20982f580ddf1f013b1b3a4530ecd1508544c956
                                                                    • Instruction Fuzzy Hash: 80413D72900249AACF14FBE1DE86DEEB778AF55340F600125F605720A2EF356F49CB61
                                                                    APIs
                                                                      • Part of subcall function 000E6B57: _wcslen.LIBCMT ref: 000E6B6A
                                                                    • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 001407A2
                                                                    • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 001407BE
                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 001407DA
                                                                    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00140804
                                                                    • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 0014082C
                                                                    • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00140837
                                                                    • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0014083C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                                    • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                    • API String ID: 323675364-22481851
                                                                    • Opcode ID: 4af08e65d596324135dc5482bda68fc980f9ec5c91ef65635c7d2a99d4ba7bb5
                                                                    • Instruction ID: e1fdf6191005805c1756c9aff52162f7e6ab966e327f4f288e3addb9385ef8da
                                                                    • Opcode Fuzzy Hash: 4af08e65d596324135dc5482bda68fc980f9ec5c91ef65635c7d2a99d4ba7bb5
                                                                    • Instruction Fuzzy Hash: 67411876D10229AFCF15EBA5DC85CEEB778BF48350B544129E905B7162EB30AE44CBA0
                                                                    APIs
                                                                    • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0017403B
                                                                    • CreateCompatibleDC.GDI32(00000000), ref: 00174042
                                                                    • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00174055
                                                                    • SelectObject.GDI32(00000000,00000000), ref: 0017405D
                                                                    • GetPixel.GDI32(00000000,00000000,00000000), ref: 00174068
                                                                    • DeleteDC.GDI32(00000000), ref: 00174072
                                                                    • GetWindowLongW.USER32(?,000000EC), ref: 0017407C
                                                                    • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 00174092
                                                                    • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 0017409E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                                    • String ID: static
                                                                    • API String ID: 2559357485-2160076837
                                                                    • Opcode ID: ac00d61da521330e4f678621403b57527091be1d66a9f57f5cfb89be9cf2ea50
                                                                    • Instruction ID: 57f4e62d1a84cbf98b92d06c39633812db3a959808c935ef612517ec6ebdd17a
                                                                    • Opcode Fuzzy Hash: ac00d61da521330e4f678621403b57527091be1d66a9f57f5cfb89be9cf2ea50
                                                                    • Instruction Fuzzy Hash: 66317A32101215ABDF219FA4DC48FDA3B79FF0D760F114214FA28A61A0C735D990DB90
                                                                    APIs
                                                                    • VariantInit.OLEAUT32(?), ref: 00163C5C
                                                                    • CoInitialize.OLE32(00000000), ref: 00163C8A
                                                                    • CoUninitialize.OLE32 ref: 00163C94
                                                                    • _wcslen.LIBCMT ref: 00163D2D
                                                                    • GetRunningObjectTable.OLE32(00000000,?), ref: 00163DB1
                                                                    • SetErrorMode.KERNEL32(00000001,00000029), ref: 00163ED5
                                                                    • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00163F0E
                                                                    • CoGetObject.OLE32(?,00000000,0017FB98,?), ref: 00163F2D
                                                                    • SetErrorMode.KERNEL32(00000000), ref: 00163F40
                                                                    • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00163FC4
                                                                    • VariantClear.OLEAUT32(?), ref: 00163FD8
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                                    • String ID:
                                                                    • API String ID: 429561992-0
                                                                    • Opcode ID: 8a6e7f74cd42024b41dc891f5de1d0cca69be96136e45e1118d4cafdfd390280
                                                                    • Instruction ID: 50c747bfbb0f73f6aa57bfadf8d5bca1504fc4d0678e0ce82e52462f81689354
                                                                    • Opcode Fuzzy Hash: 8a6e7f74cd42024b41dc891f5de1d0cca69be96136e45e1118d4cafdfd390280
                                                                    • Instruction Fuzzy Hash: 63C145716083019FC700DF68C88496BB7E9FF89744F00495DF99A9B251DB31EE46CBA2
                                                                    APIs
                                                                    • CoInitialize.OLE32(00000000), ref: 00157AF3
                                                                    • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00157B8F
                                                                    • SHGetDesktopFolder.SHELL32(?), ref: 00157BA3
                                                                    • CoCreateInstance.OLE32(0017FD08,00000000,00000001,001A6E6C,?), ref: 00157BEF
                                                                    • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00157C74
                                                                    • CoTaskMemFree.OLE32(?,?), ref: 00157CCC
                                                                    • SHBrowseForFolderW.SHELL32(?), ref: 00157D57
                                                                    • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00157D7A
                                                                    • CoTaskMemFree.OLE32(00000000), ref: 00157D81
                                                                    • CoTaskMemFree.OLE32(00000000), ref: 00157DD6
                                                                    • CoUninitialize.OLE32 ref: 00157DDC
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                                    • String ID:
                                                                    • API String ID: 2762341140-0
                                                                    • Opcode ID: d6188e72441bb91c50f6feb03c1b26e492fd18dea5bbb1c2d5190e55f09fb953
                                                                    • Instruction ID: ee1bb2b00d5bfe36b11f8539c8929a8633b756c096a627ea25fc1ad4375b32b3
                                                                    • Opcode Fuzzy Hash: d6188e72441bb91c50f6feb03c1b26e492fd18dea5bbb1c2d5190e55f09fb953
                                                                    • Instruction Fuzzy Hash: 8EC12C75A04105EFCB14DFA4D885DAEBBF9FF48305B148499E81AAB262D730ED85CB90
                                                                    APIs
                                                                    • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00175504
                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00175515
                                                                    • CharNextW.USER32(00000158), ref: 00175544
                                                                    • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00175585
                                                                    • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 0017559B
                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 001755AC
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$CharNext
                                                                    • String ID:
                                                                    • API String ID: 1350042424-0
                                                                    • Opcode ID: 887458edb346fbe69ca30af66a2d66728f9da993b5b9a1ff0e0806916b772cf4
                                                                    • Instruction ID: 25256d32ea45eb1228981b5e0929bed1910b49e22041077735335209d5320978
                                                                    • Opcode Fuzzy Hash: 887458edb346fbe69ca30af66a2d66728f9da993b5b9a1ff0e0806916b772cf4
                                                                    • Instruction Fuzzy Hash: A1617174904609EFDF10DF54CC859FE7BBAEF05764F108149F629A7290D7B49A80DBA0
                                                                    APIs
                                                                    • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 0013FAAF
                                                                    • SafeArrayAllocData.OLEAUT32(?), ref: 0013FB08
                                                                    • VariantInit.OLEAUT32(?), ref: 0013FB1A
                                                                    • SafeArrayAccessData.OLEAUT32(?,?), ref: 0013FB3A
                                                                    • VariantCopy.OLEAUT32(?,?), ref: 0013FB8D
                                                                    • SafeArrayUnaccessData.OLEAUT32(?), ref: 0013FBA1
                                                                    • VariantClear.OLEAUT32(?), ref: 0013FBB6
                                                                    • SafeArrayDestroyData.OLEAUT32(?), ref: 0013FBC3
                                                                    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0013FBCC
                                                                    • VariantClear.OLEAUT32(?), ref: 0013FBDE
                                                                    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0013FBE9
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                    • String ID:
                                                                    • API String ID: 2706829360-0
                                                                    • Opcode ID: 001c516adc5e3382985edd6d90a5d285f6f15d78b2d02cd5ac6cd85fb6d6d6e9
                                                                    • Instruction ID: f2e5a3c871a181562859009980c3a5e9744a18ebfa9101e65f71aa68a154c235
                                                                    • Opcode Fuzzy Hash: 001c516adc5e3382985edd6d90a5d285f6f15d78b2d02cd5ac6cd85fb6d6d6e9
                                                                    • Instruction Fuzzy Hash: DD415175E00219DFCF00DF64D854DEEBBB9EF18344F108069E91AA7661C730A986CB90
                                                                    APIs
                                                                    • GetKeyboardState.USER32(?), ref: 00149CA1
                                                                    • GetAsyncKeyState.USER32(000000A0), ref: 00149D22
                                                                    • GetKeyState.USER32(000000A0), ref: 00149D3D
                                                                    • GetAsyncKeyState.USER32(000000A1), ref: 00149D57
                                                                    • GetKeyState.USER32(000000A1), ref: 00149D6C
                                                                    • GetAsyncKeyState.USER32(00000011), ref: 00149D84
                                                                    • GetKeyState.USER32(00000011), ref: 00149D96
                                                                    • GetAsyncKeyState.USER32(00000012), ref: 00149DAE
                                                                    • GetKeyState.USER32(00000012), ref: 00149DC0
                                                                    • GetAsyncKeyState.USER32(0000005B), ref: 00149DD8
                                                                    • GetKeyState.USER32(0000005B), ref: 00149DEA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: State$Async$Keyboard
                                                                    • String ID:
                                                                    • API String ID: 541375521-0
                                                                    • Opcode ID: 44ea1a35add1699595fbced898ab0a396c0e82bfb1b0fc0005d020daf792ceee
                                                                    • Instruction ID: 57a5fe405631055aa80734089d953689536ea5a7e47643f3005b6b4852142a33
                                                                    • Opcode Fuzzy Hash: 44ea1a35add1699595fbced898ab0a396c0e82bfb1b0fc0005d020daf792ceee
                                                                    • Instruction Fuzzy Hash: A341D874A047CA6DFF319BA088447B7BEB06F11344F04805EDAC65A6D2DBA599C8C7A2
                                                                    APIs
                                                                    • WSAStartup.WSOCK32(00000101,?), ref: 001605BC
                                                                    • inet_addr.WSOCK32(?), ref: 0016061C
                                                                    • gethostbyname.WSOCK32(?), ref: 00160628
                                                                    • IcmpCreateFile.IPHLPAPI ref: 00160636
                                                                    • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 001606C6
                                                                    • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 001606E5
                                                                    • IcmpCloseHandle.IPHLPAPI(?), ref: 001607B9
                                                                    • WSACleanup.WSOCK32 ref: 001607BF
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                    • String ID: Ping
                                                                    • API String ID: 1028309954-2246546115
                                                                    • Opcode ID: 906ba4e217a8d29c03aa5fef498bcbe88101a57183218dd268278c41f2530eb9
                                                                    • Instruction ID: 2a740d87f718d867428e94754cfd88e57321a281d272bebed5d5df998ae7146e
                                                                    • Opcode Fuzzy Hash: 906ba4e217a8d29c03aa5fef498bcbe88101a57183218dd268278c41f2530eb9
                                                                    • Instruction Fuzzy Hash: 36919F356042419FD321CF15D889F1BBBE0AF48318F1585A9F4AA9BAA2C730FD95CF91
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$BuffCharLower
                                                                    • String ID: cdecl$none$stdcall$winapi
                                                                    • API String ID: 707087890-567219261
                                                                    • Opcode ID: 3f148194d343d2949d250962b2ddb7fcccf8f4e9f4aaeaa40798c731177f59db
                                                                    • Instruction ID: 2a76149a24d18362151f7dc444df3beade93db942fd7832f3405f6622b5eeeb5
                                                                    • Opcode Fuzzy Hash: 3f148194d343d2949d250962b2ddb7fcccf8f4e9f4aaeaa40798c731177f59db
                                                                    • Instruction Fuzzy Hash: 1A51B172A001169BCF24DFACCD509BEB3A5BF65324B614329E966E72C1DB31DE50C7A0
                                                                    APIs
                                                                    • CoInitialize.OLE32 ref: 00163774
                                                                    • CoUninitialize.OLE32 ref: 0016377F
                                                                    • CoCreateInstance.OLE32(?,00000000,00000017,0017FB78,?), ref: 001637D9
                                                                    • IIDFromString.OLE32(?,?), ref: 0016384C
                                                                    • VariantInit.OLEAUT32(?), ref: 001638E4
                                                                    • VariantClear.OLEAUT32(?), ref: 00163936
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                                    • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                    • API String ID: 636576611-1287834457
                                                                    • Opcode ID: c7768b6f2789f64ea2604711a4f8bd7a66d37c4a0d43146382d7d9b77cf3ac0c
                                                                    • Instruction ID: b51004be3750e77d6354a158f71cdaf642a57c0310c94bf88d52688a2c313b0f
                                                                    • Opcode Fuzzy Hash: c7768b6f2789f64ea2604711a4f8bd7a66d37c4a0d43146382d7d9b77cf3ac0c
                                                                    • Instruction Fuzzy Hash: 8861A071608301AFD311DF54CC89BAABBE8EF49714F10490DF9A59B291D770EE98CB92
                                                                    APIs
                                                                    • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 001533CF
                                                                      • Part of subcall function 000E9CB3: _wcslen.LIBCMT ref: 000E9CBD
                                                                    • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 001533F0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: LoadString$_wcslen
                                                                    • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                                    • API String ID: 4099089115-3080491070
                                                                    • Opcode ID: df6f171a40e085b5dfb30d5a9017f032d1c8a34fcb64bc21ede00ed3547b5337
                                                                    • Instruction ID: 099d189cb2abb098cf03a74b2236ac7752eb6f639d16602904fa862e41f3675c
                                                                    • Opcode Fuzzy Hash: df6f171a40e085b5dfb30d5a9017f032d1c8a34fcb64bc21ede00ed3547b5337
                                                                    • Instruction Fuzzy Hash: 49519D32900249BEDF19EBA1CD46EEEB7B8AF14340F644165F515730A2EB312F98DB60
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$BuffCharUpper
                                                                    • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                                    • API String ID: 1256254125-769500911
                                                                    • Opcode ID: 2140d0eae22ef27bdab97d5c31a6fa42fc2b45f435e33a3eb82811b914f7dca5
                                                                    • Instruction ID: 71d3275c610428bc02b6733bb431509f8116822e0414cf6ecbd39a0384af0575
                                                                    • Opcode Fuzzy Hash: 2140d0eae22ef27bdab97d5c31a6fa42fc2b45f435e33a3eb82811b914f7dca5
                                                                    • Instruction Fuzzy Hash: 16413932A090278BCB209F7DC9D05BE77B5AFA5754B264129E821D72A4E731CD81C790
                                                                    APIs
                                                                    • SetErrorMode.KERNEL32(00000001), ref: 001553A0
                                                                    • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00155416
                                                                    • GetLastError.KERNEL32 ref: 00155420
                                                                    • SetErrorMode.KERNEL32(00000000,READY), ref: 001554A7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Error$Mode$DiskFreeLastSpace
                                                                    • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                    • API String ID: 4194297153-14809454
                                                                    • Opcode ID: bfc9dc8271a32f9771690314e2a8d0921fe0269e826cc74e2168c64a1a8acd67
                                                                    • Instruction ID: 96817264a2cc83cd062b2d99ff7a7f6ca526302c7b0a0f8550621da089f52393
                                                                    • Opcode Fuzzy Hash: bfc9dc8271a32f9771690314e2a8d0921fe0269e826cc74e2168c64a1a8acd67
                                                                    • Instruction Fuzzy Hash: 7A31E335A00604DFC710DF68C494AAABBB5EF05306F188069E815DF292E730DD8ACBA0
                                                                    APIs
                                                                    • CreateMenu.USER32 ref: 00173C79
                                                                    • SetMenu.USER32(?,00000000), ref: 00173C88
                                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00173D10
                                                                    • IsMenu.USER32(?), ref: 00173D24
                                                                    • CreatePopupMenu.USER32 ref: 00173D2E
                                                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00173D5B
                                                                    • DrawMenuBar.USER32 ref: 00173D63
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                                    • String ID: 0$F
                                                                    • API String ID: 161812096-3044882817
                                                                    • Opcode ID: 0e31ce0faff646725eae98695555b65a09693f621bd6836d9f99da0b84ef9d38
                                                                    • Instruction ID: 0a90193dcfa9218251a76510c49e590e5b5cc6b8e6e449eaea39f99eee40e397
                                                                    • Opcode Fuzzy Hash: 0e31ce0faff646725eae98695555b65a09693f621bd6836d9f99da0b84ef9d38
                                                                    • Instruction Fuzzy Hash: 01419878A01209EFDB24CFA4D884AEA7BB5FF49310F14402DF95AA7360D771AA50DF90
                                                                    APIs
                                                                      • Part of subcall function 000E9CB3: _wcslen.LIBCMT ref: 000E9CBD
                                                                      • Part of subcall function 00143CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00143CCA
                                                                    • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 00141F64
                                                                    • GetDlgCtrlID.USER32 ref: 00141F6F
                                                                    • GetParent.USER32 ref: 00141F8B
                                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 00141F8E
                                                                    • GetDlgCtrlID.USER32(?), ref: 00141F97
                                                                    • GetParent.USER32(?), ref: 00141FAB
                                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 00141FAE
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                    • String ID: ComboBox$ListBox
                                                                    • API String ID: 711023334-1403004172
                                                                    • Opcode ID: 5784c31336bee15965240334ac9ebed5ab3018172fbe7b03b34753c6f6b0f5a7
                                                                    • Instruction ID: 04cca266de1ce7c63c99ac4ff4b9840f3dc3a559c273b021a47b091b97f3f0bf
                                                                    • Opcode Fuzzy Hash: 5784c31336bee15965240334ac9ebed5ab3018172fbe7b03b34753c6f6b0f5a7
                                                                    • Instruction Fuzzy Hash: 2F21D474940214BFCF04AFA0CC85EEEBBB9EF15350F500119F965672A2DB355989DBA0
                                                                    APIs
                                                                      • Part of subcall function 000E9CB3: _wcslen.LIBCMT ref: 000E9CBD
                                                                      • Part of subcall function 00143CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00143CCA
                                                                    • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 00142043
                                                                    • GetDlgCtrlID.USER32 ref: 0014204E
                                                                    • GetParent.USER32 ref: 0014206A
                                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 0014206D
                                                                    • GetDlgCtrlID.USER32(?), ref: 00142076
                                                                    • GetParent.USER32(?), ref: 0014208A
                                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 0014208D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                    • String ID: ComboBox$ListBox
                                                                    • API String ID: 711023334-1403004172
                                                                    • Opcode ID: 6a9882928b45aac64ae2445c862add9052eb8a963ac978b00b4e5c32c294f10d
                                                                    • Instruction ID: 12de69dd8ac87966ab60279320b2f1ab120187f89aad4d1f7de003294c66d5f8
                                                                    • Opcode Fuzzy Hash: 6a9882928b45aac64ae2445c862add9052eb8a963ac978b00b4e5c32c294f10d
                                                                    • Instruction Fuzzy Hash: CB21F3B5A00214BFCF14AFA0CC85EFEBBB8EF15340F50044AF955A72A2DB758995DB60
                                                                    APIs
                                                                    • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00173A9D
                                                                    • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00173AA0
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00173AC7
                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00173AEA
                                                                    • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00173B62
                                                                    • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00173BAC
                                                                    • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00173BC7
                                                                    • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00173BE2
                                                                    • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00173BF6
                                                                    • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00173C13
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$LongWindow
                                                                    • String ID:
                                                                    • API String ID: 312131281-0
                                                                    • Opcode ID: ff0da41232f451f42485747ccc8c57e40bce25e842332fe7e89d748e00160a13
                                                                    • Instruction ID: b89826e5624f4f9e6b77cb745b56b1d7b565072ecb32628c6625e860798e3cd7
                                                                    • Opcode Fuzzy Hash: ff0da41232f451f42485747ccc8c57e40bce25e842332fe7e89d748e00160a13
                                                                    • Instruction Fuzzy Hash: A7616D75900248AFDB11DF68CC81EEE77F8EB09704F10419AFA19A7291D770AE85DF50
                                                                    APIs
                                                                    • _free.LIBCMT ref: 00112C94
                                                                      • Part of subcall function 001129C8: HeapFree.KERNEL32(00000000,00000000,?,0011D7D1,00000000,00000000,00000000,00000000,?,0011D7F8,00000000,00000007,00000000,?,0011DBF5,00000000), ref: 001129DE
                                                                      • Part of subcall function 001129C8: GetLastError.KERNEL32(00000000,?,0011D7D1,00000000,00000000,00000000,00000000,?,0011D7F8,00000000,00000007,00000000,?,0011DBF5,00000000,00000000), ref: 001129F0
                                                                    • _free.LIBCMT ref: 00112CA0
                                                                    • _free.LIBCMT ref: 00112CAB
                                                                    • _free.LIBCMT ref: 00112CB6
                                                                    • _free.LIBCMT ref: 00112CC1
                                                                    • _free.LIBCMT ref: 00112CCC
                                                                    • _free.LIBCMT ref: 00112CD7
                                                                    • _free.LIBCMT ref: 00112CE2
                                                                    • _free.LIBCMT ref: 00112CED
                                                                    • _free.LIBCMT ref: 00112CFB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                    • String ID:
                                                                    • API String ID: 776569668-0
                                                                    • Opcode ID: 214ec15df1dc351e7f4d85b72b5a5c7f2c6e5fb92b2d39787ca943bf43509b50
                                                                    • Instruction ID: a122f5a1d26bdf9db5350b0c1caefe273a4ac53dd856cb42b2876aa68447b68f
                                                                    • Opcode Fuzzy Hash: 214ec15df1dc351e7f4d85b72b5a5c7f2c6e5fb92b2d39787ca943bf43509b50
                                                                    • Instruction Fuzzy Hash: 1C119676100118AFCB0AEF58D942CDD3BA5FF15364F4144A5FA485F222D731EAA09B90
                                                                    APIs
                                                                    • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 000E1459
                                                                    • OleUninitialize.OLE32(?,00000000), ref: 000E14F8
                                                                    • UnregisterHotKey.USER32(?), ref: 000E16DD
                                                                    • DestroyWindow.USER32(?), ref: 001224B9
                                                                    • FreeLibrary.KERNEL32(?), ref: 0012251E
                                                                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0012254B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                    • String ID: close all
                                                                    • API String ID: 469580280-3243417748
                                                                    • Opcode ID: b6a9aa162d4aec2d1cc0e12002406487bb5f3c4b849b8fa9acd9e56b34a9f177
                                                                    • Instruction ID: d1ecd8a5adfe79716269974527f2c490cdad44094131d0a307b5944c74562663
                                                                    • Opcode Fuzzy Hash: b6a9aa162d4aec2d1cc0e12002406487bb5f3c4b849b8fa9acd9e56b34a9f177
                                                                    • Instruction Fuzzy Hash: DBD17E31701262DFCB29EF15D595AADF7A0BF05700F1481ADE94A7B262DB30AD62CF90
                                                                    APIs
                                                                    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00157FAD
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00157FC1
                                                                    • GetFileAttributesW.KERNEL32(?), ref: 00157FEB
                                                                    • SetFileAttributesW.KERNEL32(?,00000000), ref: 00158005
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00158017
                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00158060
                                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 001580B0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentDirectory$AttributesFile
                                                                    • String ID: *.*
                                                                    • API String ID: 769691225-438819550
                                                                    • Opcode ID: 5fdbdb5da2f105877c1c5c36fcb06d40178ad949d69a5f165ed0555a8df9c344
                                                                    • Instruction ID: 9323abf093f741948b22404b9ca83b50401e84dd3695629d5125cf57dfc6699e
                                                                    • Opcode Fuzzy Hash: 5fdbdb5da2f105877c1c5c36fcb06d40178ad949d69a5f165ed0555a8df9c344
                                                                    • Instruction Fuzzy Hash: 5581AE72508341DFCB24EE14D8429AAB3E8EB84311F144C6EFCA9DB291DB34DD498B92
                                                                    APIs
                                                                    • SetWindowLongW.USER32(?,000000EB), ref: 000E5C7A
                                                                      • Part of subcall function 000E5D0A: GetClientRect.USER32(?,?), ref: 000E5D30
                                                                      • Part of subcall function 000E5D0A: GetWindowRect.USER32(?,?), ref: 000E5D71
                                                                      • Part of subcall function 000E5D0A: ScreenToClient.USER32(?,?), ref: 000E5D99
                                                                    • GetDC.USER32 ref: 001246F5
                                                                    • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00124708
                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00124716
                                                                    • SelectObject.GDI32(00000000,00000000), ref: 0012472B
                                                                    • ReleaseDC.USER32(?,00000000), ref: 00124733
                                                                    • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 001247C4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                    • String ID: U
                                                                    • API String ID: 4009187628-3372436214
                                                                    • Opcode ID: 2bc99f4d2ba29f18614b668210c2fca67c80ee8881ad40927c15ab16432b7e3e
                                                                    • Instruction ID: c188ca13fcfe638c9f7f1207152a2a8592b44f948609980f164811845eca0e13
                                                                    • Opcode Fuzzy Hash: 2bc99f4d2ba29f18614b668210c2fca67c80ee8881ad40927c15ab16432b7e3e
                                                                    • Instruction Fuzzy Hash: BE711F30500205EFCF25CF64DD84AFA3BB2FF4A325F244269ED656A2A6C33188A1DF50
                                                                    APIs
                                                                    • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 001535E4
                                                                      • Part of subcall function 000E9CB3: _wcslen.LIBCMT ref: 000E9CBD
                                                                    • LoadStringW.USER32(001B2390,?,00000FFF,?), ref: 0015360A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: LoadString$_wcslen
                                                                    • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                    • API String ID: 4099089115-2391861430
                                                                    • Opcode ID: 3715d1965b5784607dd2a1f9cceec43aaa7d4b415adfee82a395785ad57ec345
                                                                    • Instruction ID: 113eab01453c3fe8287584dc9d335687d71127317f23ca4f62f0967a4c8939b8
                                                                    • Opcode Fuzzy Hash: 3715d1965b5784607dd2a1f9cceec43aaa7d4b415adfee82a395785ad57ec345
                                                                    • Instruction Fuzzy Hash: FB51697180024ABEDF15EBA1DC42EEEBB78AF14341F544129F515731A2EB312B99DBA0
                                                                    APIs
                                                                      • Part of subcall function 000F9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 000F9BB2
                                                                      • Part of subcall function 000F912D: GetCursorPos.USER32(?), ref: 000F9141
                                                                      • Part of subcall function 000F912D: ScreenToClient.USER32(00000000,?), ref: 000F915E
                                                                      • Part of subcall function 000F912D: GetAsyncKeyState.USER32(00000001), ref: 000F9183
                                                                      • Part of subcall function 000F912D: GetAsyncKeyState.USER32(00000002), ref: 000F919D
                                                                    • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 00178B6B
                                                                    • ImageList_EndDrag.COMCTL32 ref: 00178B71
                                                                    • ReleaseCapture.USER32 ref: 00178B77
                                                                    • SetWindowTextW.USER32(?,00000000), ref: 00178C12
                                                                    • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00178C25
                                                                    • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 00178CFF
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                                    • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                                    • API String ID: 1924731296-2107944366
                                                                    • Opcode ID: a8c59a94bab71bc8af3b6567f0b05faa7593c7586e7de7b09445fe7a043ab62f
                                                                    • Instruction ID: 4b23637d88f305d309d3d13abc99779fd167e4805745caf34b2662a65a6e594e
                                                                    • Opcode Fuzzy Hash: a8c59a94bab71bc8af3b6567f0b05faa7593c7586e7de7b09445fe7a043ab62f
                                                                    • Instruction Fuzzy Hash: 23518D71104244AFD704DF14CD9AFAA77F4FB88714F400A2DF95AA72E2DB719944CBA2
                                                                    APIs
                                                                    • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0015C272
                                                                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0015C29A
                                                                    • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0015C2CA
                                                                    • GetLastError.KERNEL32 ref: 0015C322
                                                                    • SetEvent.KERNEL32(?), ref: 0015C336
                                                                    • InternetCloseHandle.WININET(00000000), ref: 0015C341
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                    • String ID:
                                                                    • API String ID: 3113390036-3916222277
                                                                    • Opcode ID: 35041a059850022669e4d28a699767fa123400ed981791b726ff1a950f74c512
                                                                    • Instruction ID: 611f02c3ba91b3762d7d06cfcdbcf8affd604d2c487a127202c8ee7a9bb8d3c5
                                                                    • Opcode Fuzzy Hash: 35041a059850022669e4d28a699767fa123400ed981791b726ff1a950f74c512
                                                                    • Instruction Fuzzy Hash: 39316F71500308EFD7619F64CC88AAB7AFCFB59745F10851DF8569A611DB30DD889BA0
                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00123AAF,?,?,Bad directive syntax error,0017CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 001498BC
                                                                    • LoadStringW.USER32(00000000,?,00123AAF,?), ref: 001498C3
                                                                      • Part of subcall function 000E9CB3: _wcslen.LIBCMT ref: 000E9CBD
                                                                    • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00149987
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: HandleLoadMessageModuleString_wcslen
                                                                    • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                    • API String ID: 858772685-4153970271
                                                                    • Opcode ID: c9cfd631e9fbb5bfc0f56ae1a09082c61d76516ef443409a740d089ef9888330
                                                                    • Instruction ID: 249d1469ef42eb0a52bef50b424dc1e992fed716026dd2f1e56bf246468061c3
                                                                    • Opcode Fuzzy Hash: c9cfd631e9fbb5bfc0f56ae1a09082c61d76516ef443409a740d089ef9888330
                                                                    • Instruction Fuzzy Hash: C4216D3190025AAFCF15AFA0CC0AEEE7B75FF19304F044469F519760A2EB719A58DB61
                                                                    APIs
                                                                    • GetParent.USER32 ref: 001420AB
                                                                    • GetClassNameW.USER32(00000000,?,00000100), ref: 001420C0
                                                                    • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 0014214D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ClassMessageNameParentSend
                                                                    • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                    • API String ID: 1290815626-3381328864
                                                                    • Opcode ID: b7066b5d74062de8d60a8b50837ca36260ed2871b80bfe138832c25b069dc630
                                                                    • Instruction ID: cd3045fc8ee5feea20d5a9fa623a65d88bc2c3b26767485470894781c520a6e1
                                                                    • Opcode Fuzzy Hash: b7066b5d74062de8d60a8b50837ca36260ed2871b80bfe138832c25b069dc630
                                                                    • Instruction Fuzzy Hash: 4A1106BA6C8706FAF7052224DC06DE7379DCB15B25B61002AFB05A50F2EBB568C15664
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 7fcfafd4a8cc19b437b2b7055bbc65c22fbb3ae506858dcb0c7ae8765cdef44e
                                                                    • Instruction ID: 421d62302a6595d244dbc35d20dd4b86a8237355523a3bbd336e1818a9a5d62d
                                                                    • Opcode Fuzzy Hash: 7fcfafd4a8cc19b437b2b7055bbc65c22fbb3ae506858dcb0c7ae8765cdef44e
                                                                    • Instruction Fuzzy Hash: 6FC1F374A04249AFDB29DFA8C851BEDBBB4BF1D310F0441A9F464A7392C77099C2CB61
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                                    • String ID:
                                                                    • API String ID: 1282221369-0
                                                                    • Opcode ID: f7040499b566474b49dc90314a41cb38e3169f8ea85b2af4a0b5d261566b77e5
                                                                    • Instruction ID: bd2f661946df5bc50a992f3335fc1d8b5a4889b9e673efeb71e2cfb12aba3371
                                                                    • Opcode Fuzzy Hash: f7040499b566474b49dc90314a41cb38e3169f8ea85b2af4a0b5d261566b77e5
                                                                    • Instruction Fuzzy Hash: 6A613471A44316AFDB2DAFF4A881AEA7BA5AF19320F04427DF94497281D7319DC2C7D0
                                                                    APIs
                                                                    • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00175186
                                                                    • ShowWindow.USER32(?,00000000), ref: 001751C7
                                                                    • ShowWindow.USER32(?,00000005,?,00000000), ref: 001751CD
                                                                    • SetFocus.USER32(?,?,00000005,?,00000000), ref: 001751D1
                                                                      • Part of subcall function 00176FBA: DeleteObject.GDI32(00000000), ref: 00176FE6
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 0017520D
                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0017521A
                                                                    • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 0017524D
                                                                    • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00175287
                                                                    • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00175296
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                                    • String ID:
                                                                    • API String ID: 3210457359-0
                                                                    • Opcode ID: 51dac8acc236791c31b32be27f95d816168fcf1606e1de9c28899dff83c122af
                                                                    • Instruction ID: c71be65d28d02788f214b7c37d6b9e5d1d8f6cdf4118b3c982be7d9ecdc21583
                                                                    • Opcode Fuzzy Hash: 51dac8acc236791c31b32be27f95d816168fcf1606e1de9c28899dff83c122af
                                                                    • Instruction Fuzzy Hash: CA518230A44A08FEEF249F24CC45BD93B77EB05366F64C115F61D962E2C7B5A990DB40
                                                                    APIs
                                                                    • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00136890
                                                                    • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 001368A9
                                                                    • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 001368B9
                                                                    • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 001368D1
                                                                    • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 001368F2
                                                                    • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,000F8874,00000000,00000000,00000000,000000FF,00000000), ref: 00136901
                                                                    • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0013691E
                                                                    • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,000F8874,00000000,00000000,00000000,000000FF,00000000), ref: 0013692D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                                    • String ID:
                                                                    • API String ID: 1268354404-0
                                                                    • Opcode ID: 7420f0d4751c4871478db9cb27eacd1367dc559f5c1c52ee1cfe9d1449d02358
                                                                    • Instruction ID: 3fa20ef07c2f612d3ac01906f0df05848910b750cf7c2beb4469bdc6c1bd94ff
                                                                    • Opcode Fuzzy Hash: 7420f0d4751c4871478db9cb27eacd1367dc559f5c1c52ee1cfe9d1449d02358
                                                                    • Instruction Fuzzy Hash: 80516770600209FFDB20CF25CC95BAA7BB5FB58754F108518FA1696AA0DB71E990EB50
                                                                    APIs
                                                                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0015C182
                                                                    • GetLastError.KERNEL32 ref: 0015C195
                                                                    • SetEvent.KERNEL32(?), ref: 0015C1A9
                                                                      • Part of subcall function 0015C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0015C272
                                                                      • Part of subcall function 0015C253: GetLastError.KERNEL32 ref: 0015C322
                                                                      • Part of subcall function 0015C253: SetEvent.KERNEL32(?), ref: 0015C336
                                                                      • Part of subcall function 0015C253: InternetCloseHandle.WININET(00000000), ref: 0015C341
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                                    • String ID:
                                                                    • API String ID: 337547030-0
                                                                    • Opcode ID: e16812dc3997cfbd3e4979d909960a05d388707deb9f86c7209f0f29110abdeb
                                                                    • Instruction ID: ec3c1dd5877d47d3db4f2507519ab6594e6850bb0029bf74039f4c53dfba58d3
                                                                    • Opcode Fuzzy Hash: e16812dc3997cfbd3e4979d909960a05d388707deb9f86c7209f0f29110abdeb
                                                                    • Instruction Fuzzy Hash: 26318E71200701EFDB259FA5DC44A66BBF9FF18302F04441DF96A8A611DB30E898DBE0
                                                                    APIs
                                                                      • Part of subcall function 00143A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00143A57
                                                                      • Part of subcall function 00143A3D: GetCurrentThreadId.KERNEL32 ref: 00143A5E
                                                                      • Part of subcall function 00143A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,001425B3), ref: 00143A65
                                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 001425BD
                                                                    • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 001425DB
                                                                    • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 001425DF
                                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 001425E9
                                                                    • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00142601
                                                                    • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00142605
                                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 0014260F
                                                                    • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00142623
                                                                    • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00142627
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                    • String ID:
                                                                    • API String ID: 2014098862-0
                                                                    • Opcode ID: b30c1b312cdd18b3f3a93c2bb93bafc660deac2951ec00cfd004a95ec318bf9a
                                                                    • Instruction ID: 4d15a0693f8419b4ea366f3bc41975e8697d65ebcc62edf31c3b2f07e048a209
                                                                    • Opcode Fuzzy Hash: b30c1b312cdd18b3f3a93c2bb93bafc660deac2951ec00cfd004a95ec318bf9a
                                                                    • Instruction Fuzzy Hash: 3201B530390210BBFB1067689C8AF993E69DB5AB11F510015F318AF1E1C9F114C4CAA9
                                                                    APIs
                                                                    • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00141449,?,?,00000000), ref: 0014180C
                                                                    • HeapAlloc.KERNEL32(00000000,?,00141449,?,?,00000000), ref: 00141813
                                                                    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00141449,?,?,00000000), ref: 00141828
                                                                    • GetCurrentProcess.KERNEL32(?,00000000,?,00141449,?,?,00000000), ref: 00141830
                                                                    • DuplicateHandle.KERNEL32(00000000,?,00141449,?,?,00000000), ref: 00141833
                                                                    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00141449,?,?,00000000), ref: 00141843
                                                                    • GetCurrentProcess.KERNEL32(00141449,00000000,?,00141449,?,?,00000000), ref: 0014184B
                                                                    • DuplicateHandle.KERNEL32(00000000,?,00141449,?,?,00000000), ref: 0014184E
                                                                    • CreateThread.KERNEL32(00000000,00000000,00141874,00000000,00000000,00000000), ref: 00141868
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                    • String ID:
                                                                    • API String ID: 1957940570-0
                                                                    • Opcode ID: 9bfc3dcaf8809ba35f30b2d346166445e591a5fd0903bf84f81e9375b326dab6
                                                                    • Instruction ID: bb9a1cbfbd08781eea2bcc1d443e5e98a381a07000c3bcb836491b835ac6e89a
                                                                    • Opcode Fuzzy Hash: 9bfc3dcaf8809ba35f30b2d346166445e591a5fd0903bf84f81e9375b326dab6
                                                                    • Instruction Fuzzy Hash: 5101BBB5240308FFE710ABA5DC4DF6B3BACEB89B11F404425FA09DB5A1CA709880CB60
                                                                    APIs
                                                                      • Part of subcall function 0014D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 0014D501
                                                                      • Part of subcall function 0014D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 0014D50F
                                                                      • Part of subcall function 0014D4DC: CloseHandle.KERNEL32(00000000), ref: 0014D5DC
                                                                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0016A16D
                                                                    • GetLastError.KERNEL32 ref: 0016A180
                                                                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0016A1B3
                                                                    • TerminateProcess.KERNEL32(00000000,00000000), ref: 0016A268
                                                                    • GetLastError.KERNEL32(00000000), ref: 0016A273
                                                                    • CloseHandle.KERNEL32(00000000), ref: 0016A2C4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                    • String ID: SeDebugPrivilege
                                                                    • API String ID: 2533919879-2896544425
                                                                    • Opcode ID: 676fe748181dfd21e62fb83acad8cd08cd55258b6aae1916098fc0ea07b25136
                                                                    • Instruction ID: 14d154d17fbd2d8f32e6523023519698e58f1c3631c7f0a62e597b07d60bc6c4
                                                                    • Opcode Fuzzy Hash: 676fe748181dfd21e62fb83acad8cd08cd55258b6aae1916098fc0ea07b25136
                                                                    • Instruction Fuzzy Hash: 4161C2312042419FE720DF19C894F16BBE1AF54318F58849CE46A5BBA3C772ED85CF92
                                                                    APIs
                                                                    • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00173925
                                                                    • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 0017393A
                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00173954
                                                                    • _wcslen.LIBCMT ref: 00173999
                                                                    • SendMessageW.USER32(?,00001057,00000000,?), ref: 001739C6
                                                                    • SendMessageW.USER32(?,00001061,?,0000000F), ref: 001739F4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Window_wcslen
                                                                    • String ID: SysListView32
                                                                    • API String ID: 2147712094-78025650
                                                                    • Opcode ID: 5224e9b8f1197843c94a6e2fac46dc83d3a8b2ec34507b80831550ddaeb2a9e7
                                                                    • Instruction ID: b394b04dc56e02ba4db344287bb2f2232ed2fde18e5c3f079058d06e2ededf82
                                                                    • Opcode Fuzzy Hash: 5224e9b8f1197843c94a6e2fac46dc83d3a8b2ec34507b80831550ddaeb2a9e7
                                                                    • Instruction Fuzzy Hash: A2419371A00219ABDB219F64CC49BEA77B9FF18354F10452AF968E7281D7719A80DB90
                                                                    APIs
                                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0014BCFD
                                                                    • IsMenu.USER32(00000000), ref: 0014BD1D
                                                                    • CreatePopupMenu.USER32 ref: 0014BD53
                                                                    • GetMenuItemCount.USER32(00994A08), ref: 0014BDA4
                                                                    • InsertMenuItemW.USER32(00994A08,?,00000001,00000030), ref: 0014BDCC
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                                    • String ID: 0$2
                                                                    • API String ID: 93392585-3793063076
                                                                    • Opcode ID: 4b1156d5b327efbbab8c098fe2b21d9fd5838420c3e28dda0108ae09d56c0a10
                                                                    • Instruction ID: 635d4de9f41c607faf415958c6f0bd0a822ade2c34316d96f8985b99effa1fa3
                                                                    • Opcode Fuzzy Hash: 4b1156d5b327efbbab8c098fe2b21d9fd5838420c3e28dda0108ae09d56c0a10
                                                                    • Instruction Fuzzy Hash: 5251AD70A082059BDF24CFE8D8C4BAEBBF4BF55328F144299E415AB2A0D770D985CB61
                                                                    APIs
                                                                    • LoadIconW.USER32(00000000,00007F03), ref: 0014C913
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: IconLoad
                                                                    • String ID: blank$info$question$stop$warning
                                                                    • API String ID: 2457776203-404129466
                                                                    • Opcode ID: 83991cba3a1a86386b3001708877cc14fe0e6691795f02dd7c03db894a3c8687
                                                                    • Instruction ID: a745327382f826aa37f0a731f7d7b9c9ee884228cfa7d70882175e2b95463b82
                                                                    • Opcode Fuzzy Hash: 83991cba3a1a86386b3001708877cc14fe0e6691795f02dd7c03db894a3c8687
                                                                    • Instruction Fuzzy Hash: BA110D3678A317BBE7056B54DC83CAE779CDF25358B10002EF601A61E2EBB45D4052E4
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                                    • String ID: 0.0.0.0
                                                                    • API String ID: 642191829-3771769585
                                                                    • Opcode ID: 03c69cc1b0ac6156dc19713be75dc5a806677dc11a027a619cb7bc876f359b1a
                                                                    • Instruction ID: 0978eb34d5ec4f255e6ce76f5a40c54be43ffcb3f8cd1a37f5340ca23612a21a
                                                                    • Opcode Fuzzy Hash: 03c69cc1b0ac6156dc19713be75dc5a806677dc11a027a619cb7bc876f359b1a
                                                                    • Instruction Fuzzy Hash: E3110671904105AFDF24AB60EC4AEEE77BCDF25710F0101ADF549A60E1EFB18AC18B91
                                                                    APIs
                                                                      • Part of subcall function 000F9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 000F9BB2
                                                                    • GetSystemMetrics.USER32(0000000F), ref: 00179FC7
                                                                    • GetSystemMetrics.USER32(0000000F), ref: 00179FE7
                                                                    • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0017A224
                                                                    • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0017A242
                                                                    • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0017A263
                                                                    • ShowWindow.USER32(00000003,00000000), ref: 0017A282
                                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 0017A2A7
                                                                    • DefDlgProcW.USER32(?,00000005,?,?), ref: 0017A2CA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                                    • String ID:
                                                                    • API String ID: 1211466189-0
                                                                    • Opcode ID: e341b9d6243501b906bde63d3725a68c6ec613df849d07dfb129b4e2bed23a67
                                                                    • Instruction ID: 3c7eeac0183568335275fa343b6a560a93c355a940d3ad516a80a2533c0b87f6
                                                                    • Opcode Fuzzy Hash: e341b9d6243501b906bde63d3725a68c6ec613df849d07dfb129b4e2bed23a67
                                                                    • Instruction Fuzzy Hash: CCB18A35600215EFDF14CF68C9857AE7BB2FF84701F59C069EC49AB296DB31A980CB51
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$LocalTime
                                                                    • String ID:
                                                                    • API String ID: 952045576-0
                                                                    • Opcode ID: 0002073f90b05ebcea885ddf8c48703e867b55062eb18ca156952f0bfe48cf96
                                                                    • Instruction ID: 91b55388a8380fda78818729ff016d4f03a8fefc57186b841e1811adcd4d69d1
                                                                    • Opcode Fuzzy Hash: 0002073f90b05ebcea885ddf8c48703e867b55062eb18ca156952f0bfe48cf96
                                                                    • Instruction Fuzzy Hash: 2341B275C1021876CB11EBF4C88A9DFB7A8AF59310F508462E958F3162FB74E255C3A5
                                                                    APIs
                                                                    • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0013682C,00000004,00000000,00000000), ref: 000FF953
                                                                    • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,0013682C,00000004,00000000,00000000), ref: 0013F3D1
                                                                    • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0013682C,00000004,00000000,00000000), ref: 0013F454
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ShowWindow
                                                                    • String ID:
                                                                    • API String ID: 1268545403-0
                                                                    • Opcode ID: 1630311c557f0d51897ae5d67bcc4286d677bb8e8f751ba1edabf7139bc8ab6f
                                                                    • Instruction ID: b607341f7cabf9baac68b3d5735c7ebf535fc2d07f294ad33d4aeab9f70117e2
                                                                    • Opcode Fuzzy Hash: 1630311c557f0d51897ae5d67bcc4286d677bb8e8f751ba1edabf7139bc8ab6f
                                                                    • Instruction Fuzzy Hash: 2C414E3160C689BAC7789B29C88877A7BE2BF56314F54403CE24B92D71C7B298C1E751
                                                                    APIs
                                                                    • DeleteObject.GDI32(00000000), ref: 00172D1B
                                                                    • GetDC.USER32(00000000), ref: 00172D23
                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00172D2E
                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 00172D3A
                                                                    • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00172D76
                                                                    • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00172D87
                                                                    • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00175A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00172DC2
                                                                    • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00172DE1
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                    • String ID:
                                                                    • API String ID: 3864802216-0
                                                                    • Opcode ID: d752d12c252db2fb6524908211d332cfe642609495c613c0a437406cb0ccf55b
                                                                    • Instruction ID: 2a32ef636091e4cc856bda47a7220f55e29d930bb3192e343e85bdc68c1e832d
                                                                    • Opcode Fuzzy Hash: d752d12c252db2fb6524908211d332cfe642609495c613c0a437406cb0ccf55b
                                                                    • Instruction Fuzzy Hash: 2B317C76201214BFEB218F50CC8AFEB3BB9EF09715F044059FE0C9A291D6759C91CBA4
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: _memcmp
                                                                    • String ID:
                                                                    • API String ID: 2931989736-0
                                                                    • Opcode ID: 13da52b0c733f3de740847e872ee16c136076052bf81b9295414bbf1a64c8025
                                                                    • Instruction ID: f2f6f19e688c693993b2a7fcd5e7dfed90b30b72452e8eb84f432bbbe49b2341
                                                                    • Opcode Fuzzy Hash: 13da52b0c733f3de740847e872ee16c136076052bf81b9295414bbf1a64c8025
                                                                    • Instruction Fuzzy Hash: 5F21C271A40A097BD31956208E82FFB336FBF21394F554034FD089A692F764ED1285A5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: NULL Pointer assignment$Not an Object type
                                                                    • API String ID: 0-572801152
                                                                    • Opcode ID: 4dfcdd30da9f598acbbda243c5e310924a970c14c2cde5dde858daa6d143ff24
                                                                    • Instruction ID: 9f7fe8d2eb3cb78d9895b9c8481885f58aadcf82f53802467d5bf6925312e894
                                                                    • Opcode Fuzzy Hash: 4dfcdd30da9f598acbbda243c5e310924a970c14c2cde5dde858daa6d143ff24
                                                                    • Instruction Fuzzy Hash: 74D1D275A0060AAFDF14CFA8CC81BAEB7B6FF48344F148069E915AB281E770DD55CB90
                                                                    APIs
                                                                    • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,001217FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 001215CE
                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,001217FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00121651
                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,001217FB,?,001217FB,00000000,00000000,?,00000000,?,?,?,?), ref: 001216E4
                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,001217FB,00000000,00000000,?,00000000,?,?,?,?), ref: 001216FB
                                                                      • Part of subcall function 00113820: RtlAllocateHeap.NTDLL(00000000,?,001B1444,?,000FFDF5,?,?,000EA976,00000010,001B1440,000E13FC,?,000E13C6,?,000E1129), ref: 00113852
                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,001217FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00121777
                                                                    • __freea.LIBCMT ref: 001217A2
                                                                    • __freea.LIBCMT ref: 001217AE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                                    • String ID:
                                                                    • API String ID: 2829977744-0
                                                                    • Opcode ID: 159d5d204a10a9f356aa3dab40ac3aec41f2541fd72dc03c983f748afb730d55
                                                                    • Instruction ID: b199c00b42a03b86f23d27b9ced089efc2995b5deb6b69aefa2a6979104e4a28
                                                                    • Opcode Fuzzy Hash: 159d5d204a10a9f356aa3dab40ac3aec41f2541fd72dc03c983f748afb730d55
                                                                    • Instruction Fuzzy Hash: C191C772E00226BEDF24CE74E841AEE7BB5EFA9310F184669E905E7141D735DD90CBA0
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Variant$ClearInit
                                                                    • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                    • API String ID: 2610073882-625585964
                                                                    • Opcode ID: 35ab3027b964ae16a266d99fa1518b6765f6bbe19d76403f5ccb269e95c248ce
                                                                    • Instruction ID: 4b38eaa1bc99392f838c6285e886f213cfcb2952ee28421715b744f2b05c22f1
                                                                    • Opcode Fuzzy Hash: 35ab3027b964ae16a266d99fa1518b6765f6bbe19d76403f5ccb269e95c248ce
                                                                    • Instruction Fuzzy Hash: 16918B71A00219AFDF24CFA5CC88FAEBBB8EF46710F108559F516AB281D7709955CFA0
                                                                    APIs
                                                                    • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 0015125C
                                                                    • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00151284
                                                                    • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 001512A8
                                                                    • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 001512D8
                                                                    • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 0015135F
                                                                    • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 001513C4
                                                                    • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00151430
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                                    • String ID:
                                                                    • API String ID: 2550207440-0
                                                                    • Opcode ID: 87eac522d9f57e06bd87f02596bcf79ea5311823181f30a5b5f44f0c032ad540
                                                                    • Instruction ID: f1c24d7631f9d2fe7d4787d9a1f61778101e1cc1d9214a886880ba1171e00526
                                                                    • Opcode Fuzzy Hash: 87eac522d9f57e06bd87f02596bcf79ea5311823181f30a5b5f44f0c032ad540
                                                                    • Instruction Fuzzy Hash: A891D372A00209EFDB02DFA4C885BFE77B5FF45316F214029E921EB291D774A949CB90
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ObjectSelect$BeginCreatePath
                                                                    • String ID:
                                                                    • API String ID: 3225163088-0
                                                                    • Opcode ID: 44c89ddb61bad418198ec42ef815aeb0ebedd16228a94b3b3b32a1e9c2b48c20
                                                                    • Instruction ID: aaac1d388c5971a5bdd4b5ae8c1e5b677fbc3590fbb84e2e26c91b0a94977f25
                                                                    • Opcode Fuzzy Hash: 44c89ddb61bad418198ec42ef815aeb0ebedd16228a94b3b3b32a1e9c2b48c20
                                                                    • Instruction Fuzzy Hash: 61913771D00219EFCB15CFA9CC84AEEBBB8FF49720F148159E615B7291D374A981DBA0
                                                                    APIs
                                                                    • VariantInit.OLEAUT32(?), ref: 0016396B
                                                                    • CharUpperBuffW.USER32(?,?), ref: 00163A7A
                                                                    • _wcslen.LIBCMT ref: 00163A8A
                                                                    • VariantClear.OLEAUT32(?), ref: 00163C1F
                                                                      • Part of subcall function 00150CDF: VariantInit.OLEAUT32(00000000), ref: 00150D1F
                                                                      • Part of subcall function 00150CDF: VariantCopy.OLEAUT32(?,?), ref: 00150D28
                                                                      • Part of subcall function 00150CDF: VariantClear.OLEAUT32(?), ref: 00150D34
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                                    • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                    • API String ID: 4137639002-1221869570
                                                                    • Opcode ID: 9e13b225145f2be0c91d7bd1c3f9a71a895c5ddc47ca1b8afb98267236330fb9
                                                                    • Instruction ID: 9096d1ba58ffd78483ecf1ff3138c00b38ac8da9649a2b262709279b18bba25c
                                                                    • Opcode Fuzzy Hash: 9e13b225145f2be0c91d7bd1c3f9a71a895c5ddc47ca1b8afb98267236330fb9
                                                                    • Instruction Fuzzy Hash: 219188756083459FC704EF24C88096AB7E5FF89314F14882EF89A9B352DB30EE45CB82
                                                                    APIs
                                                                      • Part of subcall function 0014000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0013FF41,80070057,?,?,?,0014035E), ref: 0014002B
                                                                      • Part of subcall function 0014000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0013FF41,80070057,?,?), ref: 00140046
                                                                      • Part of subcall function 0014000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0013FF41,80070057,?,?), ref: 00140054
                                                                      • Part of subcall function 0014000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0013FF41,80070057,?), ref: 00140064
                                                                    • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00164C51
                                                                    • _wcslen.LIBCMT ref: 00164D59
                                                                    • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00164DCF
                                                                    • CoTaskMemFree.OLE32(?), ref: 00164DDA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                                    • String ID: NULL Pointer assignment
                                                                    • API String ID: 614568839-2785691316
                                                                    • Opcode ID: 82670041991cbbdc99935eb90f1400379f39f6d68ecf518a48bc07a6ecac9358
                                                                    • Instruction ID: 79d5cf7f55a6b5db1f0e43a4eee26d5ef06ced608d8c88d2e8839bf310caa1e0
                                                                    • Opcode Fuzzy Hash: 82670041991cbbdc99935eb90f1400379f39f6d68ecf518a48bc07a6ecac9358
                                                                    • Instruction Fuzzy Hash: 56912671D00219AFDF14DFA4DC91AEEB7B9BF08310F108169E919B7251EB35AA54CFA0
                                                                    APIs
                                                                    • GetMenu.USER32(?), ref: 00172183
                                                                    • GetMenuItemCount.USER32(00000000), ref: 001721B5
                                                                    • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 001721DD
                                                                    • _wcslen.LIBCMT ref: 00172213
                                                                    • GetMenuItemID.USER32(?,?), ref: 0017224D
                                                                    • GetSubMenu.USER32(?,?), ref: 0017225B
                                                                      • Part of subcall function 00143A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00143A57
                                                                      • Part of subcall function 00143A3D: GetCurrentThreadId.KERNEL32 ref: 00143A5E
                                                                      • Part of subcall function 00143A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,001425B3), ref: 00143A65
                                                                    • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 001722E3
                                                                      • Part of subcall function 0014E97B: Sleep.KERNELBASE ref: 0014E9F3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                                    • String ID:
                                                                    • API String ID: 4196846111-0
                                                                    • Opcode ID: 64c6602bff064fc64c00853be1e2449273c498e44a025834123aaeb0bf55f8f8
                                                                    • Instruction ID: e3fd83757621178bf7768b91f2d4b9cc928ffab48d55e2917b491240eb4b2a44
                                                                    • Opcode Fuzzy Hash: 64c6602bff064fc64c00853be1e2449273c498e44a025834123aaeb0bf55f8f8
                                                                    • Instruction Fuzzy Hash: A9719F75A00205AFCB14DF65C885AAEB7F1FF48310F158469E95AEB352DB34EE428B90
                                                                    APIs
                                                                    • IsWindow.USER32(009949B8), ref: 00177F37
                                                                    • IsWindowEnabled.USER32(009949B8), ref: 00177F43
                                                                    • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 0017801E
                                                                    • SendMessageW.USER32(009949B8,000000B0,?,?), ref: 00178051
                                                                    • IsDlgButtonChecked.USER32(?,?), ref: 00178089
                                                                    • GetWindowLongW.USER32(009949B8,000000EC), ref: 001780AB
                                                                    • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 001780C3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                                    • String ID:
                                                                    • API String ID: 4072528602-0
                                                                    • Opcode ID: 9635ca582e376c291018d6918b8a0d353167ddebe7d555f2815318b25cc81dd8
                                                                    • Instruction ID: 321d59b353b08cd34ea5513158f35f1f2948f4c12207589087a4962a6ef9432b
                                                                    • Opcode Fuzzy Hash: 9635ca582e376c291018d6918b8a0d353167ddebe7d555f2815318b25cc81dd8
                                                                    • Instruction Fuzzy Hash: 3971AE34608244AFEB259F64C994FFABBB5EF19300F148459F96D972A1CB31AC85CB60
                                                                    APIs
                                                                    • GetParent.USER32(?), ref: 0014AEF9
                                                                    • GetKeyboardState.USER32(?), ref: 0014AF0E
                                                                    • SetKeyboardState.USER32(?), ref: 0014AF6F
                                                                    • PostMessageW.USER32(?,00000101,00000010,?), ref: 0014AF9D
                                                                    • PostMessageW.USER32(?,00000101,00000011,?), ref: 0014AFBC
                                                                    • PostMessageW.USER32(?,00000101,00000012,?), ref: 0014AFFD
                                                                    • PostMessageW.USER32(?,00000101,0000005B,?), ref: 0014B020
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: MessagePost$KeyboardState$Parent
                                                                    • String ID:
                                                                    • API String ID: 87235514-0
                                                                    • Opcode ID: ed2de9021bc42150a9e93a43244bb2ec8225f299ad95a9f37495cfa524350388
                                                                    • Instruction ID: f8c3ae630022af0bba34378dd838ad1d5d199ba95ef4669809728fcb22915f92
                                                                    • Opcode Fuzzy Hash: ed2de9021bc42150a9e93a43244bb2ec8225f299ad95a9f37495cfa524350388
                                                                    • Instruction Fuzzy Hash: 0451C1A06487D53DFB3683348885BBBBEA95F06304F098589F1E9568E2C3D8EDC8D751
                                                                    APIs
                                                                    • GetParent.USER32(00000000), ref: 0014AD19
                                                                    • GetKeyboardState.USER32(?), ref: 0014AD2E
                                                                    • SetKeyboardState.USER32(?), ref: 0014AD8F
                                                                    • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 0014ADBB
                                                                    • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 0014ADD8
                                                                    • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 0014AE17
                                                                    • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 0014AE38
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: MessagePost$KeyboardState$Parent
                                                                    • String ID:
                                                                    • API String ID: 87235514-0
                                                                    • Opcode ID: fc3d9de72c03293eebe5817ee546aaf9b77a8cec602b776ee847b03f5358b3dd
                                                                    • Instruction ID: b731999cb064603cc87b408a0018e4ec8910989893d2075063a7a22ee6b9fb2e
                                                                    • Opcode Fuzzy Hash: fc3d9de72c03293eebe5817ee546aaf9b77a8cec602b776ee847b03f5358b3dd
                                                                    • Instruction Fuzzy Hash: 755107A09887D13DFB3783748C95BBA7EA85F45300F498488E1E9568E3C394EC84D752
                                                                    APIs
                                                                    • GetConsoleCP.KERNEL32(00123CD6,?,?,?,?,?,?,?,?,00115BA3,?,?,00123CD6,?,?), ref: 00115470
                                                                    • __fassign.LIBCMT ref: 001154EB
                                                                    • __fassign.LIBCMT ref: 00115506
                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00123CD6,00000005,00000000,00000000), ref: 0011552C
                                                                    • WriteFile.KERNEL32(?,00123CD6,00000000,00115BA3,00000000,?,?,?,?,?,?,?,?,?,00115BA3,?), ref: 0011554B
                                                                    • WriteFile.KERNEL32(?,?,00000001,00115BA3,00000000,?,?,?,?,?,?,?,?,?,00115BA3,?), ref: 00115584
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                    • String ID:
                                                                    • API String ID: 1324828854-0
                                                                    • Opcode ID: 6f25feb3d7bffaffb37c67f6c29285436a6a41c4cd08911600b12d016682addd
                                                                    • Instruction ID: d07bbd562614cd8dd39d7ed8705e416276ede42eb11109a573a910b0587d23fa
                                                                    • Opcode Fuzzy Hash: 6f25feb3d7bffaffb37c67f6c29285436a6a41c4cd08911600b12d016682addd
                                                                    • Instruction Fuzzy Hash: 9F51C571A00649DFDB15CFA8D845AEEBBFAEF49300F14412EF555E7291E7309A81CB60
                                                                    APIs
                                                                    • _ValidateLocalCookies.LIBCMT ref: 00102D4B
                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 00102D53
                                                                    • _ValidateLocalCookies.LIBCMT ref: 00102DE1
                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00102E0C
                                                                    • _ValidateLocalCookies.LIBCMT ref: 00102E61
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                    • String ID: csm
                                                                    • API String ID: 1170836740-1018135373
                                                                    • Opcode ID: d1e56e44583ea5e181c94cdd3443ed4e2f90361b3a33a95b47d407a73acca679
                                                                    • Instruction ID: 0202120cd5102d82793fcd2019e4b9a434a47dea3040c52e7e83c5f4356a9a10
                                                                    • Opcode Fuzzy Hash: d1e56e44583ea5e181c94cdd3443ed4e2f90361b3a33a95b47d407a73acca679
                                                                    • Instruction Fuzzy Hash: F641A334A00209ABCF14DFA8C849A9EBBB5BF45324F148195E8546B3D2D7B1AE45CBD0
                                                                    APIs
                                                                      • Part of subcall function 0016304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0016307A
                                                                      • Part of subcall function 0016304E: _wcslen.LIBCMT ref: 0016309B
                                                                    • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00161112
                                                                    • WSAGetLastError.WSOCK32 ref: 00161121
                                                                    • WSAGetLastError.WSOCK32 ref: 001611C9
                                                                    • closesocket.WSOCK32(00000000), ref: 001611F9
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                                    • String ID:
                                                                    • API String ID: 2675159561-0
                                                                    • Opcode ID: 2e1d068e92eb20b805e47018931c39ca313ba3ebf7960ffdcd5440118365f10d
                                                                    • Instruction ID: be3851434c4586ee2c58ec930d96dd284e121f36b61c9fa0cd06b6cc679db560
                                                                    • Opcode Fuzzy Hash: 2e1d068e92eb20b805e47018931c39ca313ba3ebf7960ffdcd5440118365f10d
                                                                    • Instruction Fuzzy Hash: 4641D431600604AFDB109F24CC85BAAB7F9EF46324F188059FD19AB292C774AD81CBE1
                                                                    APIs
                                                                      • Part of subcall function 0014DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0014CF22,?), ref: 0014DDFD
                                                                      • Part of subcall function 0014DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0014CF22,?), ref: 0014DE16
                                                                    • lstrcmpiW.KERNEL32(?,?), ref: 0014CF45
                                                                    • MoveFileW.KERNEL32(?,?), ref: 0014CF7F
                                                                    • _wcslen.LIBCMT ref: 0014D005
                                                                    • _wcslen.LIBCMT ref: 0014D01B
                                                                    • SHFileOperationW.SHELL32(?), ref: 0014D061
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                                    • String ID: \*.*
                                                                    • API String ID: 3164238972-1173974218
                                                                    • Opcode ID: 55bf71dde3ee9946c933ea75aca0cd411604215529d1c86635744e695469bc6c
                                                                    • Instruction ID: ef83a6e9699e510cce2270772cd7af9aaa25be398c36fda4f72d62f577737125
                                                                    • Opcode Fuzzy Hash: 55bf71dde3ee9946c933ea75aca0cd411604215529d1c86635744e695469bc6c
                                                                    • Instruction Fuzzy Hash: 4B4169719452189FDF12EFA4D981ADE77F9AF18340F1000E6E549E7152EB35A688CB50
                                                                    APIs
                                                                    • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00172E1C
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00172E4F
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00172E84
                                                                    • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00172EB6
                                                                    • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00172EE0
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00172EF1
                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00172F0B
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: LongWindow$MessageSend
                                                                    • String ID:
                                                                    • API String ID: 2178440468-0
                                                                    • Opcode ID: b7ed7f20a780e68d98981d704ff77d734f542deb966c2020da14782101a03d43
                                                                    • Instruction ID: 65a844dc3e66e08e54aee48de2ea28087190a440e6468baf2f76201b1ccca58f
                                                                    • Opcode Fuzzy Hash: b7ed7f20a780e68d98981d704ff77d734f542deb966c2020da14782101a03d43
                                                                    • Instruction Fuzzy Hash: 8E310430604250AFEB21CF58DC94FA537F1FB9A714F1541A8F9489F6B2CB71A881DB81
                                                                    APIs
                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00147769
                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0014778F
                                                                    • SysAllocString.OLEAUT32(00000000), ref: 00147792
                                                                    • SysAllocString.OLEAUT32(?), ref: 001477B0
                                                                    • SysFreeString.OLEAUT32(?), ref: 001477B9
                                                                    • StringFromGUID2.OLE32(?,?,00000028), ref: 001477DE
                                                                    • SysAllocString.OLEAUT32(?), ref: 001477EC
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                    • String ID:
                                                                    • API String ID: 3761583154-0
                                                                    • Opcode ID: 1cbc072b3b99265add1d9b1ecb60a30175583cf8ef49fd3e3e5a4882d3cb5891
                                                                    • Instruction ID: ae750584fb4d1b6fad8a4587bef167eb9e602735d39e7f678029b218b3e108d3
                                                                    • Opcode Fuzzy Hash: 1cbc072b3b99265add1d9b1ecb60a30175583cf8ef49fd3e3e5a4882d3cb5891
                                                                    • Instruction Fuzzy Hash: FE21A176604219AFDF10EFA8CC88CBB77ACEF097657448429FA19DB1A1D770DC8587A0
                                                                    APIs
                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00147842
                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00147868
                                                                    • SysAllocString.OLEAUT32(00000000), ref: 0014786B
                                                                    • SysAllocString.OLEAUT32 ref: 0014788C
                                                                    • SysFreeString.OLEAUT32 ref: 00147895
                                                                    • StringFromGUID2.OLE32(?,?,00000028), ref: 001478AF
                                                                    • SysAllocString.OLEAUT32(?), ref: 001478BD
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                    • String ID:
                                                                    • API String ID: 3761583154-0
                                                                    • Opcode ID: 0bd35653e994b1d15c9b1d29780de504351a707bb1ec2c53d48e7c3b7457d51f
                                                                    • Instruction ID: 7c5dbfadf5d045371f948ab2aec99311e124b6ba7de6137c85394163a32020e3
                                                                    • Opcode Fuzzy Hash: 0bd35653e994b1d15c9b1d29780de504351a707bb1ec2c53d48e7c3b7457d51f
                                                                    • Instruction Fuzzy Hash: 8A214175608205AFDB109FA8DC8CDBA77ECEB097607108125F915DB2B1DB74DC81CB64
                                                                    APIs
                                                                    • GetStdHandle.KERNEL32(0000000C), ref: 001504F2
                                                                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 0015052E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CreateHandlePipe
                                                                    • String ID: nul
                                                                    • API String ID: 1424370930-2873401336
                                                                    • Opcode ID: db6427c3893561fb26a2c8c5f4e3ffb552064391d499743476256ddcd87904ee
                                                                    • Instruction ID: fba44fb72c111e6333faf6d96ceb1c2aa10da669db014a07a6b8c18942f1cefd
                                                                    • Opcode Fuzzy Hash: db6427c3893561fb26a2c8c5f4e3ffb552064391d499743476256ddcd87904ee
                                                                    • Instruction Fuzzy Hash: 97217E75510305EFDB219FA9D804A9A77B4BF49725F204A19FCB1EA2E0E7709988CF60
                                                                    APIs
                                                                    • GetStdHandle.KERNEL32(000000F6), ref: 001505C6
                                                                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00150601
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CreateHandlePipe
                                                                    • String ID: nul
                                                                    • API String ID: 1424370930-2873401336
                                                                    • Opcode ID: fa7c270c8f3e17821570fe7f6295dae575e0bb4cd055ed1eb81df2ac94c272fa
                                                                    • Instruction ID: fc4913c7bdde53d15715e79d61bfdddd82915a591914edfb68ed05bddb844e2c
                                                                    • Opcode Fuzzy Hash: fa7c270c8f3e17821570fe7f6295dae575e0bb4cd055ed1eb81df2ac94c272fa
                                                                    • Instruction Fuzzy Hash: D8217F75500306DFDB219FA9CC04A9A77A4BF99721F240A19ECB1EB2E0E77099A4CB50
                                                                    APIs
                                                                      • Part of subcall function 000E600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 000E604C
                                                                      • Part of subcall function 000E600E: GetStockObject.GDI32(00000011), ref: 000E6060
                                                                      • Part of subcall function 000E600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 000E606A
                                                                    • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00174112
                                                                    • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0017411F
                                                                    • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0017412A
                                                                    • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00174139
                                                                    • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00174145
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$CreateObjectStockWindow
                                                                    • String ID: Msctls_Progress32
                                                                    • API String ID: 1025951953-3636473452
                                                                    • Opcode ID: f486f9aca6c5e1498902d79850f47e783281bd1add3f8701ce6296d547e0c9a1
                                                                    • Instruction ID: 7e8d628080fb33bb6f912537870140323a04c0e85372da4701964ae390abdaab
                                                                    • Opcode Fuzzy Hash: f486f9aca6c5e1498902d79850f47e783281bd1add3f8701ce6296d547e0c9a1
                                                                    • Instruction Fuzzy Hash: 1011B2B2140219BFEF119F64CC85EE77FADEF18798F118110BA18A2190C7729C61DBA4
                                                                    APIs
                                                                      • Part of subcall function 0011D7A3: _free.LIBCMT ref: 0011D7CC
                                                                    • _free.LIBCMT ref: 0011D82D
                                                                      • Part of subcall function 001129C8: HeapFree.KERNEL32(00000000,00000000,?,0011D7D1,00000000,00000000,00000000,00000000,?,0011D7F8,00000000,00000007,00000000,?,0011DBF5,00000000), ref: 001129DE
                                                                      • Part of subcall function 001129C8: GetLastError.KERNEL32(00000000,?,0011D7D1,00000000,00000000,00000000,00000000,?,0011D7F8,00000000,00000007,00000000,?,0011DBF5,00000000,00000000), ref: 001129F0
                                                                    • _free.LIBCMT ref: 0011D838
                                                                    • _free.LIBCMT ref: 0011D843
                                                                    • _free.LIBCMT ref: 0011D897
                                                                    • _free.LIBCMT ref: 0011D8A2
                                                                    • _free.LIBCMT ref: 0011D8AD
                                                                    • _free.LIBCMT ref: 0011D8B8
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                    • String ID:
                                                                    • API String ID: 776569668-0
                                                                    • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                    • Instruction ID: 32171ebeac2fb8d0622120f52d599f38b2a0d67d921f2014e4b11950d84fdb49
                                                                    • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                    • Instruction Fuzzy Hash: A1118E71540B18AAD625BFF0DC07FCB7BDCAF20704F440835F299AA0D2DBB4B5A58661
                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 0014DA74
                                                                    • LoadStringW.USER32(00000000), ref: 0014DA7B
                                                                    • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0014DA91
                                                                    • LoadStringW.USER32(00000000), ref: 0014DA98
                                                                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0014DADC
                                                                    Strings
                                                                    • %s (%d) : ==> %s: %s %s, xrefs: 0014DAB9
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: HandleLoadModuleString$Message
                                                                    • String ID: %s (%d) : ==> %s: %s %s
                                                                    • API String ID: 4072794657-3128320259
                                                                    • Opcode ID: 023f29ca2ae47fe30fab828d780ce3ac0318919a421d3e5ab80e0f0073ddcf32
                                                                    • Instruction ID: 1f8584da2355b6fdaee0e4e460e5e6a6faacd1578b5f03eb65f85f7e09443c17
                                                                    • Opcode Fuzzy Hash: 023f29ca2ae47fe30fab828d780ce3ac0318919a421d3e5ab80e0f0073ddcf32
                                                                    • Instruction Fuzzy Hash: 000162F6500208BFEB11ABA0DD89EE7367CE708701F4044A9B70AE2441EA749EC48FB5
                                                                    APIs
                                                                    • InterlockedExchange.KERNEL32(0098E190,0098E190), ref: 0015097B
                                                                    • EnterCriticalSection.KERNEL32(0098E170,00000000), ref: 0015098D
                                                                    • TerminateThread.KERNEL32(?,000001F6), ref: 0015099B
                                                                    • WaitForSingleObject.KERNEL32(?,000003E8), ref: 001509A9
                                                                    • CloseHandle.KERNEL32(?), ref: 001509B8
                                                                    • InterlockedExchange.KERNEL32(0098E190,000001F6), ref: 001509C8
                                                                    • LeaveCriticalSection.KERNEL32(0098E170), ref: 001509CF
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                    • String ID:
                                                                    • API String ID: 3495660284-0
                                                                    • Opcode ID: 4df7fbe38618896a52fb2e99bf3e35d6ae06502317ee052706989757f288d56d
                                                                    • Instruction ID: ef1c156b9f9bb3eb0a210cad418db7c1d92f92aeb59d6d1125cc506f94c13eef
                                                                    • Opcode Fuzzy Hash: 4df7fbe38618896a52fb2e99bf3e35d6ae06502317ee052706989757f288d56d
                                                                    • Instruction Fuzzy Hash: 03F01932442A02EBD7425BA4EE88AD6BB39BF05702F402029F206A4CA5CB7494E5CFD0
                                                                    APIs
                                                                    • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00161DC0
                                                                    • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00161DE1
                                                                    • WSAGetLastError.WSOCK32 ref: 00161DF2
                                                                    • htons.WSOCK32(?,?,?,?,?), ref: 00161EDB
                                                                    • inet_ntoa.WSOCK32(?), ref: 00161E8C
                                                                      • Part of subcall function 001439E8: _strlen.LIBCMT ref: 001439F2
                                                                      • Part of subcall function 00163224: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,0015EC0C), ref: 00163240
                                                                    • _strlen.LIBCMT ref: 00161F35
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                                                    • String ID:
                                                                    • API String ID: 3203458085-0
                                                                    • Opcode ID: f2dca3807ebb0ad93c27766b1de99b1dae83eec76d92dec966da05c83a4048d8
                                                                    • Instruction ID: f34eec5877235f4dab5edeaea40cf0b6980655e0eff55e7c7ca3ba39590bc8ac
                                                                    • Opcode Fuzzy Hash: f2dca3807ebb0ad93c27766b1de99b1dae83eec76d92dec966da05c83a4048d8
                                                                    • Instruction Fuzzy Hash: 0BB1D031604340AFC324DF24CC85E6A7BA5AF84318F98898CF55A5B2E3CB71ED46CB91
                                                                    APIs
                                                                    • GetClientRect.USER32(?,?), ref: 000E5D30
                                                                    • GetWindowRect.USER32(?,?), ref: 000E5D71
                                                                    • ScreenToClient.USER32(?,?), ref: 000E5D99
                                                                    • GetClientRect.USER32(?,?), ref: 000E5ED7
                                                                    • GetWindowRect.USER32(?,?), ref: 000E5EF8
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Rect$Client$Window$Screen
                                                                    • String ID:
                                                                    • API String ID: 1296646539-0
                                                                    • Opcode ID: 02698aff017e7db59077c117157ae87c716c836c6813896fe8a021f7583ba09a
                                                                    • Instruction ID: 4e10bf797aacedd67847456a95b05cda5fb7a9b8fae88ce3d0ee0f0f3336aecf
                                                                    • Opcode Fuzzy Hash: 02698aff017e7db59077c117157ae87c716c836c6813896fe8a021f7583ba09a
                                                                    • Instruction Fuzzy Hash: F7B16C34A1068ADFDB24CFA9C8407EEB7F1FF58315F14881AE8A9E7250D730AA51DB50
                                                                    APIs
                                                                    • __allrem.LIBCMT ref: 001100BA
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 001100D6
                                                                    • __allrem.LIBCMT ref: 001100ED
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0011010B
                                                                    • __allrem.LIBCMT ref: 00110122
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00110140
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                    • String ID:
                                                                    • API String ID: 1992179935-0
                                                                    • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                                    • Instruction ID: 9f1489a132a2f707b77a015a4e15af76512705f92402f8d3b36fa10c78c3e4e6
                                                                    • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                                    • Instruction Fuzzy Hash: AF812872A00706ABE7299F28CC82BAB73E8AF69364F25413DF451D66C1E7F4D9C18750
                                                                    APIs
                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,001082D9,001082D9,?,?,?,0011644F,00000001,00000001,8BE85006), ref: 00116258
                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,0011644F,00000001,00000001,8BE85006,?,?,?), ref: 001162DE
                                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 001163D8
                                                                    • __freea.LIBCMT ref: 001163E5
                                                                      • Part of subcall function 00113820: RtlAllocateHeap.NTDLL(00000000,?,001B1444,?,000FFDF5,?,?,000EA976,00000010,001B1440,000E13FC,?,000E13C6,?,000E1129), ref: 00113852
                                                                    • __freea.LIBCMT ref: 001163EE
                                                                    • __freea.LIBCMT ref: 00116413
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                    • String ID:
                                                                    • API String ID: 1414292761-0
                                                                    • Opcode ID: a9b7404c5c98278c8607e47b98f9dd2b256cb370179f63d2ab5f4cd1acb5e0c5
                                                                    • Instruction ID: fdbc2e387ed97735dc14ea1ad3b768aea5c925f283a7a198d7511772c3a1d18f
                                                                    • Opcode Fuzzy Hash: a9b7404c5c98278c8607e47b98f9dd2b256cb370179f63d2ab5f4cd1acb5e0c5
                                                                    • Instruction Fuzzy Hash: FB51E172A10226ABDB2D8F64CC81EEF77AAEB54710F154239FC19D6140EB36DCC0D6A0
                                                                    APIs
                                                                      • Part of subcall function 000E9CB3: _wcslen.LIBCMT ref: 000E9CBD
                                                                      • Part of subcall function 0016C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0016B6AE,?,?), ref: 0016C9B5
                                                                      • Part of subcall function 0016C998: _wcslen.LIBCMT ref: 0016C9F1
                                                                      • Part of subcall function 0016C998: _wcslen.LIBCMT ref: 0016CA68
                                                                      • Part of subcall function 0016C998: _wcslen.LIBCMT ref: 0016CA9E
                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0016BCCA
                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0016BD25
                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 0016BD6A
                                                                    • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0016BD99
                                                                    • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0016BDF3
                                                                    • RegCloseKey.ADVAPI32(?), ref: 0016BDFF
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                                    • String ID:
                                                                    • API String ID: 1120388591-0
                                                                    • Opcode ID: ca7611e51da6471f6110367f7afd4a4e1ada9849117639f752dd0570afbf0caf
                                                                    • Instruction ID: fe692c86f66abce1a209f60cb597c4638d19aee4f0c57caf47ff9609f5fbd585
                                                                    • Opcode Fuzzy Hash: ca7611e51da6471f6110367f7afd4a4e1ada9849117639f752dd0570afbf0caf
                                                                    • Instruction Fuzzy Hash: AE818C31208241AFD714DF64C8C5E6ABBE5FF84308F14895CF5598B2A2DB32ED95CB92
                                                                    APIs
                                                                    • VariantInit.OLEAUT32(00000035), ref: 0013F7B9
                                                                    • SysAllocString.OLEAUT32(00000001), ref: 0013F860
                                                                    • VariantCopy.OLEAUT32(0013FA64,00000000), ref: 0013F889
                                                                    • VariantClear.OLEAUT32(0013FA64), ref: 0013F8AD
                                                                    • VariantCopy.OLEAUT32(0013FA64,00000000), ref: 0013F8B1
                                                                    • VariantClear.OLEAUT32(?), ref: 0013F8BB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Variant$ClearCopy$AllocInitString
                                                                    • String ID:
                                                                    • API String ID: 3859894641-0
                                                                    • Opcode ID: 539272e1e1ca62b2923c13304c7620f551c68d3e773989cd83d5450114cb8a4c
                                                                    • Instruction ID: e3d841f74d63aaadc43aef8b6712935b77302412f2646dd56a6cc3ccd87e536d
                                                                    • Opcode Fuzzy Hash: 539272e1e1ca62b2923c13304c7620f551c68d3e773989cd83d5450114cb8a4c
                                                                    • Instruction Fuzzy Hash: 1A51F431E00300FADF28AB65D895B79B3A8EF55314F20946EF906EF292DB708C45C796
                                                                    APIs
                                                                      • Part of subcall function 000E7620: _wcslen.LIBCMT ref: 000E7625
                                                                      • Part of subcall function 000E6B57: _wcslen.LIBCMT ref: 000E6B6A
                                                                    • GetOpenFileNameW.COMDLG32(00000058), ref: 001594E5
                                                                    • _wcslen.LIBCMT ref: 00159506
                                                                    • _wcslen.LIBCMT ref: 0015952D
                                                                    • GetSaveFileNameW.COMDLG32(00000058), ref: 00159585
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$FileName$OpenSave
                                                                    • String ID: X
                                                                    • API String ID: 83654149-3081909835
                                                                    • Opcode ID: a06207f0952831edf2f04865235b63c67defb1aae743bb27feb384b066e788f6
                                                                    • Instruction ID: 7cbf0e03f64dd7fce42661cc846c396a14f942f309e8d6144a7c1b66118cbd59
                                                                    • Opcode Fuzzy Hash: a06207f0952831edf2f04865235b63c67defb1aae743bb27feb384b066e788f6
                                                                    • Instruction Fuzzy Hash: DDE1A331508340DFC724DF25C881AAAB7E0FF85314F14896DF999AB2A2DB31DD45CB92
                                                                    APIs
                                                                      • Part of subcall function 000F9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 000F9BB2
                                                                    • BeginPaint.USER32(?,?,?), ref: 000F9241
                                                                    • GetWindowRect.USER32(?,?), ref: 000F92A5
                                                                    • ScreenToClient.USER32(?,?), ref: 000F92C2
                                                                    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 000F92D3
                                                                    • EndPaint.USER32(?,?,?,?,?), ref: 000F9321
                                                                    • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 001371EA
                                                                      • Part of subcall function 000F9339: BeginPath.GDI32(00000000), ref: 000F9357
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                                    • String ID:
                                                                    • API String ID: 3050599898-0
                                                                    • Opcode ID: 9f5988f6bb121f2c2410960e27b74386cc9f7e65d129380d3b3873e688fbe409
                                                                    • Instruction ID: 8ab90fa1329ed6f8f44baba31f6ec4417060aa608af92ede2712250951823103
                                                                    • Opcode Fuzzy Hash: 9f5988f6bb121f2c2410960e27b74386cc9f7e65d129380d3b3873e688fbe409
                                                                    • Instruction Fuzzy Hash: C141DD71104304AFD721DF24CC94FBA7BF8EB45324F100629FAA4876E2C7319885EB61
                                                                    APIs
                                                                    • InterlockedExchange.KERNEL32(?,000001F5), ref: 0015080C
                                                                    • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00150847
                                                                    • EnterCriticalSection.KERNEL32(?), ref: 00150863
                                                                    • LeaveCriticalSection.KERNEL32(?), ref: 001508DC
                                                                    • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 001508F3
                                                                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 00150921
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                                    • String ID:
                                                                    • API String ID: 3368777196-0
                                                                    • Opcode ID: 60573a9c18c89e1d86b73873f552eb5ce90fea70426a3cfabb2a5e2288f0c484
                                                                    • Instruction ID: 9c3935a578734fa0fa42510ae9cd2f8b5e0ecdfa5add0e60d5f561f3c666ce15
                                                                    • Opcode Fuzzy Hash: 60573a9c18c89e1d86b73873f552eb5ce90fea70426a3cfabb2a5e2288f0c484
                                                                    • Instruction Fuzzy Hash: 7A415B71900205EFDF159F94DC85AAA7778FF08310F1440A9ED04AE29BDB70DEA5DBA4
                                                                    APIs
                                                                    • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,0013F3AB,00000000,?,?,00000000,?,0013682C,00000004,00000000,00000000), ref: 0017824C
                                                                    • EnableWindow.USER32(?,00000000), ref: 00178272
                                                                    • ShowWindow.USER32(FFFFFFFF,00000000), ref: 001782D1
                                                                    • ShowWindow.USER32(?,00000004), ref: 001782E5
                                                                    • EnableWindow.USER32(?,00000001), ref: 0017830B
                                                                    • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 0017832F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Show$Enable$MessageSend
                                                                    • String ID:
                                                                    • API String ID: 642888154-0
                                                                    • Opcode ID: 8e80219830e84c1ed3b992b13e5897778e2aad137a3c4b42bd72deb33bd46e0b
                                                                    • Instruction ID: 805de5eea654859c96e169e24cc66a03c25b6bbf7fc488790e25b417af6f2cc7
                                                                    • Opcode Fuzzy Hash: 8e80219830e84c1ed3b992b13e5897778e2aad137a3c4b42bd72deb33bd46e0b
                                                                    • Instruction Fuzzy Hash: F641C530641644AFDB15CF14D89DBE47BF1FB0A715F198269E60C4B263CB31A881CB90
                                                                    APIs
                                                                    • IsWindowVisible.USER32(?), ref: 00144C95
                                                                    • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00144CB2
                                                                    • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00144CEA
                                                                    • _wcslen.LIBCMT ref: 00144D08
                                                                    • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00144D10
                                                                    • _wcsstr.LIBVCRUNTIME ref: 00144D1A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                                    • String ID:
                                                                    • API String ID: 72514467-0
                                                                    • Opcode ID: 7b2d54bfc4a16d9d19a0b64e700acf7bf3df5e7f3be54c20de6684353a38d812
                                                                    • Instruction ID: 803c7ea3dfa414c06bf0b59f7109705f04cb1f00080730166624ffb755c5b2aa
                                                                    • Opcode Fuzzy Hash: 7b2d54bfc4a16d9d19a0b64e700acf7bf3df5e7f3be54c20de6684353a38d812
                                                                    • Instruction Fuzzy Hash: 5F212672604204BBEB155B79AC89FBB7BACDF55750F10803DF909CA1A2EB61CC4092A0
                                                                    APIs
                                                                      • Part of subcall function 000E3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,000E3A97,?,?,000E2E7F,?,?,?,00000000), ref: 000E3AC2
                                                                    • _wcslen.LIBCMT ref: 0015587B
                                                                    • CoInitialize.OLE32(00000000), ref: 00155995
                                                                    • CoCreateInstance.OLE32(0017FCF8,00000000,00000001,0017FB68,?), ref: 001559AE
                                                                    • CoUninitialize.OLE32 ref: 001559CC
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                                    • String ID: .lnk
                                                                    • API String ID: 3172280962-24824748
                                                                    • Opcode ID: 5f1ff0526886207370548622af6bbe69073108f6f1856a5690104778f2fa9f6a
                                                                    • Instruction ID: ed07d01e6cbb9da83972e384ccb8a9d8f19d9da4136206859de10615fc46c5de
                                                                    • Opcode Fuzzy Hash: 5f1ff0526886207370548622af6bbe69073108f6f1856a5690104778f2fa9f6a
                                                                    • Instruction Fuzzy Hash: CBD17371608701DFC704DF25C494A6ABBE2EF89315F14885DF899AB362CB31EC49CB92
                                                                    APIs
                                                                      • Part of subcall function 00140FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00140FCA
                                                                      • Part of subcall function 00140FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00140FD6
                                                                      • Part of subcall function 00140FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00140FE5
                                                                      • Part of subcall function 00140FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00140FEC
                                                                      • Part of subcall function 00140FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00141002
                                                                    • GetLengthSid.ADVAPI32(?,00000000,00141335), ref: 001417AE
                                                                    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 001417BA
                                                                    • HeapAlloc.KERNEL32(00000000), ref: 001417C1
                                                                    • CopySid.ADVAPI32(00000000,00000000,?), ref: 001417DA
                                                                    • GetProcessHeap.KERNEL32(00000000,00000000,00141335), ref: 001417EE
                                                                    • HeapFree.KERNEL32(00000000), ref: 001417F5
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                    • String ID:
                                                                    • API String ID: 3008561057-0
                                                                    • Opcode ID: 02d629022997dc415823b51685d1e547983dc7837437c7148005470f9ee0652c
                                                                    • Instruction ID: 82287c754a731f58c7369617288bfb2ea1831b1727e49efc3deecb3738e1004b
                                                                    • Opcode Fuzzy Hash: 02d629022997dc415823b51685d1e547983dc7837437c7148005470f9ee0652c
                                                                    • Instruction Fuzzy Hash: 5B118E32510205FFDB149FA4CC49BAE7BB9EB45366F104028F44597220D735A9C4CBA0
                                                                    APIs
                                                                    • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 001414FF
                                                                    • OpenProcessToken.ADVAPI32(00000000), ref: 00141506
                                                                    • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00141515
                                                                    • CloseHandle.KERNEL32(00000004), ref: 00141520
                                                                    • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0014154F
                                                                    • DestroyEnvironmentBlock.USERENV(00000000), ref: 00141563
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                    • String ID:
                                                                    • API String ID: 1413079979-0
                                                                    • Opcode ID: 6d71d442aac232f7ca293f94bce3c2495a5cdbc7f3b10f2922f8c1f0d7af770b
                                                                    • Instruction ID: edd6e766de4a39a124a0b9ca6b9689b88c4d76ccc50ea5d23c89d1548d6e2293
                                                                    • Opcode Fuzzy Hash: 6d71d442aac232f7ca293f94bce3c2495a5cdbc7f3b10f2922f8c1f0d7af770b
                                                                    • Instruction Fuzzy Hash: CB112972505209BBDF118F98DD49BDE7BB9EF49754F044019FA09A6060C3758EA0DBA0
                                                                    APIs
                                                                    • GetLastError.KERNEL32(?,?,00103379,00102FE5), ref: 00103390
                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0010339E
                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 001033B7
                                                                    • SetLastError.KERNEL32(00000000,?,00103379,00102FE5), ref: 00103409
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastValue___vcrt_
                                                                    • String ID:
                                                                    • API String ID: 3852720340-0
                                                                    • Opcode ID: b1643096c656c78ea51f177f7fced978f351c8fefce123f3c1102e7cac6fac6e
                                                                    • Instruction ID: 8a1fa3ad26ad7435b6555b7d288481e53d3c29adb2f50afdb157531ceba60168
                                                                    • Opcode Fuzzy Hash: b1643096c656c78ea51f177f7fced978f351c8fefce123f3c1102e7cac6fac6e
                                                                    • Instruction Fuzzy Hash: 65012432208311BEE62927747DC56672A9CFB263793200229F6B0882F0FFA24E815284
                                                                    APIs
                                                                    • GetLastError.KERNEL32(?,?,00115686,00123CD6,?,00000000,?,00115B6A,?,?,?,?,?,0010E6D1,?,001A8A48), ref: 00112D78
                                                                    • _free.LIBCMT ref: 00112DAB
                                                                    • _free.LIBCMT ref: 00112DD3
                                                                    • SetLastError.KERNEL32(00000000,?,?,?,?,0010E6D1,?,001A8A48,00000010,000E4F4A,?,?,00000000,00123CD6), ref: 00112DE0
                                                                    • SetLastError.KERNEL32(00000000,?,?,?,?,0010E6D1,?,001A8A48,00000010,000E4F4A,?,?,00000000,00123CD6), ref: 00112DEC
                                                                    • _abort.LIBCMT ref: 00112DF2
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$_free$_abort
                                                                    • String ID:
                                                                    • API String ID: 3160817290-0
                                                                    • Opcode ID: 95a2a3caab2b9ec8692275c83d1471792946c33c4fbca7aaf03d9092bc76221d
                                                                    • Instruction ID: 33dcbae1e23f7b4e309c64ab89d6621d922f525f63959890b9ca20b77c2dcdb5
                                                                    • Opcode Fuzzy Hash: 95a2a3caab2b9ec8692275c83d1471792946c33c4fbca7aaf03d9092bc76221d
                                                                    • Instruction Fuzzy Hash: 70F0A9315446106BCA1E37B8FC06ADA15656BD2771B25043CF828925D5EF3488E152A0
                                                                    APIs
                                                                      • Part of subcall function 000F9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 000F9693
                                                                      • Part of subcall function 000F9639: SelectObject.GDI32(?,00000000), ref: 000F96A2
                                                                      • Part of subcall function 000F9639: BeginPath.GDI32(?), ref: 000F96B9
                                                                      • Part of subcall function 000F9639: SelectObject.GDI32(?,00000000), ref: 000F96E2
                                                                    • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00178A4E
                                                                    • LineTo.GDI32(?,00000003,00000000), ref: 00178A62
                                                                    • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00178A70
                                                                    • LineTo.GDI32(?,00000000,00000003), ref: 00178A80
                                                                    • EndPath.GDI32(?), ref: 00178A90
                                                                    • StrokePath.GDI32(?), ref: 00178AA0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                    • String ID:
                                                                    • API String ID: 43455801-0
                                                                    • Opcode ID: 8c940fa2ea4056c9a127ab699c216ddc47482d3ef068b0b9f7b2d711774ee0c1
                                                                    • Instruction ID: af9c197eb5be5e4a3e24b6fadf895f3f404ba80c2e801a35f21fe51f35a62cc3
                                                                    • Opcode Fuzzy Hash: 8c940fa2ea4056c9a127ab699c216ddc47482d3ef068b0b9f7b2d711774ee0c1
                                                                    • Instruction Fuzzy Hash: 9311057604014CFFEB129F90DC88EAA7F6DEB08354F008026BA199A5A1C7719E95DFA0
                                                                    APIs
                                                                    • GetDC.USER32(00000000), ref: 00145218
                                                                    • GetDeviceCaps.GDI32(00000000,00000058), ref: 00145229
                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00145230
                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 00145238
                                                                    • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0014524F
                                                                    • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00145261
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CapsDevice$Release
                                                                    • String ID:
                                                                    • API String ID: 1035833867-0
                                                                    • Opcode ID: eb9a1ddd0d02cce1cce12b8e3fc5e40ec1f93b21d83cb3a19585289546839c3b
                                                                    • Instruction ID: 5ceb50033cb1879e80703e77f88dcd1c6ff7a8fadd3395fc6850ca19cb17d282
                                                                    • Opcode Fuzzy Hash: eb9a1ddd0d02cce1cce12b8e3fc5e40ec1f93b21d83cb3a19585289546839c3b
                                                                    • Instruction Fuzzy Hash: DE014F75E40718BBEB109BA59C49E5EBFB9EF48751F04406AFA08A7691D6709840CBA0
                                                                    APIs
                                                                    • MapVirtualKeyW.USER32(0000005B,00000000), ref: 000E1BF4
                                                                    • MapVirtualKeyW.USER32(00000010,00000000), ref: 000E1BFC
                                                                    • MapVirtualKeyW.USER32(000000A0,00000000), ref: 000E1C07
                                                                    • MapVirtualKeyW.USER32(000000A1,00000000), ref: 000E1C12
                                                                    • MapVirtualKeyW.USER32(00000011,00000000), ref: 000E1C1A
                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 000E1C22
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Virtual
                                                                    • String ID:
                                                                    • API String ID: 4278518827-0
                                                                    • Opcode ID: aabe9c89f069a1ff2c2809b27e9ea0d5edb960881fc2925d8cc55deba32ed4dc
                                                                    • Instruction ID: e03b68ce8a664efdfac3af10f58d73c37d6e1c1c9b717b5af4d76ab09cc64d67
                                                                    • Opcode Fuzzy Hash: aabe9c89f069a1ff2c2809b27e9ea0d5edb960881fc2925d8cc55deba32ed4dc
                                                                    • Instruction Fuzzy Hash: 370148B09027597DE3008F5A8C85A52FEA8FF19754F00411BA15C47A41C7B5A8A4CBE5
                                                                    APIs
                                                                    • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 0014EB30
                                                                    • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0014EB46
                                                                    • GetWindowThreadProcessId.USER32(?,?), ref: 0014EB55
                                                                    • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0014EB64
                                                                    • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0014EB6E
                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0014EB75
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                    • String ID:
                                                                    • API String ID: 839392675-0
                                                                    • Opcode ID: 347aa783ca29a06e375f04b69bf4c0652a56168bf5c717540ae5e22e95fec1c7
                                                                    • Instruction ID: d970a522575c185e5c3347a48ce429b42328ef1bcc0573309da4e21c34c13de5
                                                                    • Opcode Fuzzy Hash: 347aa783ca29a06e375f04b69bf4c0652a56168bf5c717540ae5e22e95fec1c7
                                                                    • Instruction Fuzzy Hash: 29F05E72240158BBE7215B629C4EEEF3E7CEFCAB11F00016CF605E1591E7A05A81CAF5
                                                                    APIs
                                                                    • GetClientRect.USER32(?), ref: 00137452
                                                                    • SendMessageW.USER32(?,00001328,00000000,?), ref: 00137469
                                                                    • GetWindowDC.USER32(?), ref: 00137475
                                                                    • GetPixel.GDI32(00000000,?,?), ref: 00137484
                                                                    • ReleaseDC.USER32(?,00000000), ref: 00137496
                                                                    • GetSysColor.USER32(00000005), ref: 001374B0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                                    • String ID:
                                                                    • API String ID: 272304278-0
                                                                    • Opcode ID: 14db671bcd74e1a598a9e02c922ce4e03460950632f3a517e554ded4f285d545
                                                                    • Instruction ID: c212186a85eb7ae79f4b20a657ef3746545406a621217e9c9114616253534d99
                                                                    • Opcode Fuzzy Hash: 14db671bcd74e1a598a9e02c922ce4e03460950632f3a517e554ded4f285d545
                                                                    • Instruction Fuzzy Hash: B2014B31504215EFEB616F64DC08BEABBB6FB04321F510168F91AA25A1CB312ED1AB90
                                                                    APIs
                                                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0014187F
                                                                    • UnloadUserProfile.USERENV(?,?), ref: 0014188B
                                                                    • CloseHandle.KERNEL32(?), ref: 00141894
                                                                    • CloseHandle.KERNEL32(?), ref: 0014189C
                                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 001418A5
                                                                    • HeapFree.KERNEL32(00000000), ref: 001418AC
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                    • String ID:
                                                                    • API String ID: 146765662-0
                                                                    • Opcode ID: 38cdd4a2e2237d53a8649d48be79a78fb5ca899888cb6518b32a2741f6be87d7
                                                                    • Instruction ID: a7bda341ab89a8fd79e94f6beb4109795fce94fd2ce21a0dae0c0602d6f6bbaa
                                                                    • Opcode Fuzzy Hash: 38cdd4a2e2237d53a8649d48be79a78fb5ca899888cb6518b32a2741f6be87d7
                                                                    • Instruction Fuzzy Hash: 07E07576104505FBEB015FA5ED0C94ABF79FF49B22B508629F22991871CB3294E1DF90
                                                                    APIs
                                                                      • Part of subcall function 000E7620: _wcslen.LIBCMT ref: 000E7625
                                                                    • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0014C6EE
                                                                    • _wcslen.LIBCMT ref: 0014C735
                                                                    • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0014C79C
                                                                    • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 0014C7CA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ItemMenu$Info_wcslen$Default
                                                                    • String ID: 0
                                                                    • API String ID: 1227352736-4108050209
                                                                    • Opcode ID: 93cc807b7af15cc239b315132fe390d73459e4b9246b5fb9dd14cef6968fe800
                                                                    • Instruction ID: c0a9c59d56c9f8eaa46dab977450ed5eb86c750dfde2996a30e19a27ca502d02
                                                                    • Opcode Fuzzy Hash: 93cc807b7af15cc239b315132fe390d73459e4b9246b5fb9dd14cef6968fe800
                                                                    • Instruction Fuzzy Hash: 9C51F0726063419BD7949F28C885BBBB7E8AF49315F040A2DF995E32B1DB70D844CBD2
                                                                    APIs
                                                                    • ShellExecuteExW.SHELL32(0000003C), ref: 0016AEA3
                                                                      • Part of subcall function 000E7620: _wcslen.LIBCMT ref: 000E7625
                                                                    • GetProcessId.KERNEL32(00000000), ref: 0016AF38
                                                                    • CloseHandle.KERNEL32(00000000), ref: 0016AF67
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CloseExecuteHandleProcessShell_wcslen
                                                                    • String ID: <$@
                                                                    • API String ID: 146682121-1426351568
                                                                    • Opcode ID: 61b279145ed86075e56a3d8bf6c25b7d5d870a6a7a586cd9ac667f912cad5dbf
                                                                    • Instruction ID: 6b6995750cf5d642d9cc1b79018b5e10fbc2b65f005b0d442bbe1174c41a6c97
                                                                    • Opcode Fuzzy Hash: 61b279145ed86075e56a3d8bf6c25b7d5d870a6a7a586cd9ac667f912cad5dbf
                                                                    • Instruction Fuzzy Hash: FA716671A00659DFCB14DF65C884A9EBBF0BF08310F448499E81AAB3A2CB71ED41CF91
                                                                    APIs
                                                                    • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00147206
                                                                    • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0014723C
                                                                    • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0014724D
                                                                    • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 001472CF
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorMode$AddressCreateInstanceProc
                                                                    • String ID: DllGetClassObject
                                                                    • API String ID: 753597075-1075368562
                                                                    • Opcode ID: 03ce1db4fd26dcc1307509e52c9d547d59903ea42e526d39ed953362d0fd05c4
                                                                    • Instruction ID: 4a35da40e4cbc9033440ef6f4c3dd217cce8d29acf32800452fd0fa8f486f3d0
                                                                    • Opcode Fuzzy Hash: 03ce1db4fd26dcc1307509e52c9d547d59903ea42e526d39ed953362d0fd05c4
                                                                    • Instruction Fuzzy Hash: 0D416171604204EFDB15CF64C884EAA7BB9EF44310F1580ADBD099F29AD7F1DA45CBA0
                                                                    APIs
                                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00173E35
                                                                    • IsMenu.USER32(?), ref: 00173E4A
                                                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00173E92
                                                                    • DrawMenuBar.USER32 ref: 00173EA5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Menu$Item$DrawInfoInsert
                                                                    • String ID: 0
                                                                    • API String ID: 3076010158-4108050209
                                                                    • Opcode ID: 06bd67859aaafb92c9bce292863bbab74c6d2e186fc0ae1e97b139c559c603c3
                                                                    • Instruction ID: ef1614cd3712485011dfbec0b9bfb712f1e86f9f777c2f0be1e50c6131058c9a
                                                                    • Opcode Fuzzy Hash: 06bd67859aaafb92c9bce292863bbab74c6d2e186fc0ae1e97b139c559c603c3
                                                                    • Instruction Fuzzy Hash: 87415B75A01209EFDB10DF50D884EEABBB5FF49354F048129F919A7250DB30AE45DF90
                                                                    APIs
                                                                      • Part of subcall function 000E9CB3: _wcslen.LIBCMT ref: 000E9CBD
                                                                      • Part of subcall function 00143CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00143CCA
                                                                    • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00141E66
                                                                    • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00141E79
                                                                    • SendMessageW.USER32(?,00000189,?,00000000), ref: 00141EA9
                                                                      • Part of subcall function 000E6B57: _wcslen.LIBCMT ref: 000E6B6A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$_wcslen$ClassName
                                                                    • String ID: ComboBox$ListBox
                                                                    • API String ID: 2081771294-1403004172
                                                                    • Opcode ID: 8ebd964aae29f5aad45ff3571cb609f83b445d37bf19e52d303358ae42cd68b1
                                                                    • Instruction ID: 771b3c50dc522558d8ad7ec46e002d493507ceb9068c61c01014ba93bcfd544d
                                                                    • Opcode Fuzzy Hash: 8ebd964aae29f5aad45ff3571cb609f83b445d37bf19e52d303358ae42cd68b1
                                                                    • Instruction Fuzzy Hash: FD216875A00104BEDB19ABA5DC86CFFB7B9EF42350B50411DF825B32F2EB344D8A8620
                                                                    APIs
                                                                    • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00172F8D
                                                                    • LoadLibraryW.KERNEL32(?), ref: 00172F94
                                                                    • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00172FA9
                                                                    • DestroyWindow.USER32(?), ref: 00172FB1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$DestroyLibraryLoadWindow
                                                                    • String ID: SysAnimate32
                                                                    • API String ID: 3529120543-1011021900
                                                                    • Opcode ID: 5b6b80d9cce0217fd3660733058f9469d25ca84bb2b381ca5f247475c81d6d96
                                                                    • Instruction ID: fa275cf67f889ca066f60fbcf53bcf7840a1515d63ba7a0e3196093c28f64639
                                                                    • Opcode Fuzzy Hash: 5b6b80d9cce0217fd3660733058f9469d25ca84bb2b381ca5f247475c81d6d96
                                                                    • Instruction Fuzzy Hash: BA218C72204205ABEB104F64DC80EBB77B9EB59364F108619F958D6190D771DC929760
                                                                    APIs
                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00104D1E,001128E9,?,00104CBE,001128E9,001A88B8,0000000C,00104E15,001128E9,00000002), ref: 00104D8D
                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00104DA0
                                                                    • FreeLibrary.KERNEL32(00000000,?,?,?,00104D1E,001128E9,?,00104CBE,001128E9,001A88B8,0000000C,00104E15,001128E9,00000002,00000000), ref: 00104DC3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                    • API String ID: 4061214504-1276376045
                                                                    • Opcode ID: d94faedcf87e2eaf33df1d3a57e1f9853e8e69d310652498fdaa621b03c88d51
                                                                    • Instruction ID: f16e31c7d783e2ee13ee89b768f70cbc0747cf519153020f00cfdc88043512d0
                                                                    • Opcode Fuzzy Hash: d94faedcf87e2eaf33df1d3a57e1f9853e8e69d310652498fdaa621b03c88d51
                                                                    • Instruction Fuzzy Hash: 1DF04F75A40208FBDB119F94DC49BEDBBB5EF58751F4400A8F949A26A0CB705AC0CBD1
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,?,000E4EDD,?,001B1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 000E4E9C
                                                                    • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 000E4EAE
                                                                    • FreeLibrary.KERNEL32(00000000,?,?,000E4EDD,?,001B1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 000E4EC0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Library$AddressFreeLoadProc
                                                                    • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                    • API String ID: 145871493-3689287502
                                                                    • Opcode ID: a0d5a6b7986f722ed12e084b8133e1474ca76431b23078193e979887062665eb
                                                                    • Instruction ID: abc9974678ad0e4bcdd4b4c6cdf3aef375d175d8c3719d3eecd6578b4227ae3c
                                                                    • Opcode Fuzzy Hash: a0d5a6b7986f722ed12e084b8133e1474ca76431b23078193e979887062665eb
                                                                    • Instruction Fuzzy Hash: C5E0CD35E015629FD2711B2A6C18B5FA6F4AFC1F62B050129FC08F3700DB60CD8185E0
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00123CDE,?,001B1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 000E4E62
                                                                    • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 000E4E74
                                                                    • FreeLibrary.KERNEL32(00000000,?,?,00123CDE,?,001B1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 000E4E87
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Library$AddressFreeLoadProc
                                                                    • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                    • API String ID: 145871493-1355242751
                                                                    • Opcode ID: fbbbd98da796957b3d89b583a7c39815a5f2b914336d614a766d286501ee56a8
                                                                    • Instruction ID: 255a4afc599c5e24859213285951522deb2beab0e812acbccc04e013d7b31346
                                                                    • Opcode Fuzzy Hash: fbbbd98da796957b3d89b583a7c39815a5f2b914336d614a766d286501ee56a8
                                                                    • Instruction Fuzzy Hash: F4D05B359027719B96761B2A7C1CECF6AB8AF8AF513494539F909F3614CF60CE81C5D0
                                                                    APIs
                                                                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00152C05
                                                                    • DeleteFileW.KERNEL32(?), ref: 00152C87
                                                                    • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00152C9D
                                                                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00152CAE
                                                                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00152CC0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: File$Delete$Copy
                                                                    • String ID:
                                                                    • API String ID: 3226157194-0
                                                                    • Opcode ID: cb0ff46aabab365135d91351160c618a6cb7743d85c194d89e0392ea3e0b8f3d
                                                                    • Instruction ID: 94513efb5f6a419de7ec9199e7e566a886af90c79491df4182b4295ef9955421
                                                                    • Opcode Fuzzy Hash: cb0ff46aabab365135d91351160c618a6cb7743d85c194d89e0392ea3e0b8f3d
                                                                    • Instruction Fuzzy Hash: D8B17072A00119ABDF25DBA4CC85EDE77BDEF59301F1040A6F919EB142EB309A488F61
                                                                    APIs
                                                                    • GetCurrentProcessId.KERNEL32 ref: 0016A427
                                                                    • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0016A435
                                                                    • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0016A468
                                                                    • CloseHandle.KERNEL32(?), ref: 0016A63D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Process$CloseCountersCurrentHandleOpen
                                                                    • String ID:
                                                                    • API String ID: 3488606520-0
                                                                    • Opcode ID: 5e53893b1741a4551a0d1793b0b2f4ffa8743a34dcc9a2267bfcd04e60e3f7ed
                                                                    • Instruction ID: c1be067e4862aa488c6be5ada1f1d150cecab2dd230bd4f8956bff0ba417447a
                                                                    • Opcode Fuzzy Hash: 5e53893b1741a4551a0d1793b0b2f4ffa8743a34dcc9a2267bfcd04e60e3f7ed
                                                                    • Instruction Fuzzy Hash: 24A1C1716043019FE720DF24DC82F6AB7E1AF84714F54881DF55AAB293DBB1EC418B92
                                                                    APIs
                                                                    • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00183700), ref: 0011BB91
                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,001B121C,000000FF,00000000,0000003F,00000000,?,?), ref: 0011BC09
                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,001B1270,000000FF,?,0000003F,00000000,?), ref: 0011BC36
                                                                    • _free.LIBCMT ref: 0011BB7F
                                                                      • Part of subcall function 001129C8: HeapFree.KERNEL32(00000000,00000000,?,0011D7D1,00000000,00000000,00000000,00000000,?,0011D7F8,00000000,00000007,00000000,?,0011DBF5,00000000), ref: 001129DE
                                                                      • Part of subcall function 001129C8: GetLastError.KERNEL32(00000000,?,0011D7D1,00000000,00000000,00000000,00000000,?,0011D7F8,00000000,00000007,00000000,?,0011DBF5,00000000,00000000), ref: 001129F0
                                                                    • _free.LIBCMT ref: 0011BD4B
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                                    • String ID:
                                                                    • API String ID: 1286116820-0
                                                                    • Opcode ID: 1e7103c80db1dff2977f0377667bf159ed50f77283f17ac2c816a73813ffa7c8
                                                                    • Instruction ID: a31910da9ff680f0a8d4301af46ccbaae09fd37bff80725cdbb291edc8dede86
                                                                    • Opcode Fuzzy Hash: 1e7103c80db1dff2977f0377667bf159ed50f77283f17ac2c816a73813ffa7c8
                                                                    • Instruction Fuzzy Hash: 6051D871908209AFCB18EF65DCC19EEB7B8BF54310B6102BAE464D7591DB305ED08B90
                                                                    APIs
                                                                      • Part of subcall function 0014DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0014CF22,?), ref: 0014DDFD
                                                                      • Part of subcall function 0014DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0014CF22,?), ref: 0014DE16
                                                                      • Part of subcall function 0014E199: GetFileAttributesW.KERNEL32(?,0014CF95), ref: 0014E19A
                                                                    • lstrcmpiW.KERNEL32(?,?), ref: 0014E473
                                                                    • MoveFileW.KERNEL32(?,?), ref: 0014E4AC
                                                                    • _wcslen.LIBCMT ref: 0014E5EB
                                                                    • _wcslen.LIBCMT ref: 0014E603
                                                                    • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 0014E650
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                                    • String ID:
                                                                    • API String ID: 3183298772-0
                                                                    • Opcode ID: d436a471f1b82f3b8cb08541756f7046167cddf836ba1f415a7b5b64805d118f
                                                                    • Instruction ID: afeab50fcf176e64adbe8ba5b6b44b8a60a997bdb9d82c955a563fb1c3ef342d
                                                                    • Opcode Fuzzy Hash: d436a471f1b82f3b8cb08541756f7046167cddf836ba1f415a7b5b64805d118f
                                                                    • Instruction Fuzzy Hash: 425153B25083859FC724EB90DC819DB73ECAF94340F44491EF589D31A2EF74A588CB66
                                                                    APIs
                                                                      • Part of subcall function 000E9CB3: _wcslen.LIBCMT ref: 000E9CBD
                                                                      • Part of subcall function 0016C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0016B6AE,?,?), ref: 0016C9B5
                                                                      • Part of subcall function 0016C998: _wcslen.LIBCMT ref: 0016C9F1
                                                                      • Part of subcall function 0016C998: _wcslen.LIBCMT ref: 0016CA68
                                                                      • Part of subcall function 0016C998: _wcslen.LIBCMT ref: 0016CA9E
                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0016BAA5
                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0016BB00
                                                                    • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0016BB63
                                                                    • RegCloseKey.ADVAPI32(?,?), ref: 0016BBA6
                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 0016BBB3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                                    • String ID:
                                                                    • API String ID: 826366716-0
                                                                    • Opcode ID: bf5351c081526e3e5433666b15c769eb4fe689b10d71b4125924c637d7690ca9
                                                                    • Instruction ID: 1e42263e5e20229016d45a80296d127e81ac6be1c424e8c5341689a9fd37b316
                                                                    • Opcode Fuzzy Hash: bf5351c081526e3e5433666b15c769eb4fe689b10d71b4125924c637d7690ca9
                                                                    • Instruction Fuzzy Hash: B5618F31208241AFD714DF64C8D1E6ABBE5FF84308F54895CF4998B2A2DB31ED85CB92
                                                                    APIs
                                                                    • VariantInit.OLEAUT32(?), ref: 00148BCD
                                                                    • VariantClear.OLEAUT32 ref: 00148C3E
                                                                    • VariantClear.OLEAUT32 ref: 00148C9D
                                                                    • VariantClear.OLEAUT32(?), ref: 00148D10
                                                                    • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00148D3B
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Variant$Clear$ChangeInitType
                                                                    • String ID:
                                                                    • API String ID: 4136290138-0
                                                                    • Opcode ID: 69c4cdd8bc3fde9a5600e2f10564f8e7ee682ef35e32860a0db3e2bc128de47c
                                                                    • Instruction ID: 07a953415e4a6e84f65ea156670234a52263aea1874658e48a2150aeb02f40fd
                                                                    • Opcode Fuzzy Hash: 69c4cdd8bc3fde9a5600e2f10564f8e7ee682ef35e32860a0db3e2bc128de47c
                                                                    • Instruction Fuzzy Hash: A1515AB5A01219EFCB14CF68C894AAAB7F8FF89314B158559E909DB360E730E911CF90
                                                                    APIs
                                                                    • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00158BAE
                                                                    • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00158BDA
                                                                    • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00158C32
                                                                    • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00158C57
                                                                    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00158C5F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: PrivateProfile$SectionWrite$String
                                                                    • String ID:
                                                                    • API String ID: 2832842796-0
                                                                    • Opcode ID: 5cbe7b59828cdd8aa5a9696cd81f4fc5120b92612368e65a2e17df3d10098329
                                                                    • Instruction ID: 9f7b196e7ed88b362cabd805598378159f4a3bcf0e772f027e304cf9cf3b4eb4
                                                                    • Opcode Fuzzy Hash: 5cbe7b59828cdd8aa5a9696cd81f4fc5120b92612368e65a2e17df3d10098329
                                                                    • Instruction Fuzzy Hash: 86513835A00619EFCB05DF65C881AAEBBF5FF48314F088458E859AB362DB31ED55CB90
                                                                    APIs
                                                                    • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00168F40
                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00168FD0
                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00168FEC
                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00169032
                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00169052
                                                                      • Part of subcall function 000FF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00151043,?,7644E610), ref: 000FF6E6
                                                                      • Part of subcall function 000FF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,0013FA64,00000000,00000000,?,?,00151043,?,7644E610,?,0013FA64), ref: 000FF70D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                                    • String ID:
                                                                    • API String ID: 666041331-0
                                                                    • Opcode ID: 860b5662198bb95fb378977bbea60daf46e142fae332faac90bd57d3b068fa46
                                                                    • Instruction ID: 2f2c692f775602c35b1eb2f81611cf35050bfeee3fcbef14495b35a768330bb2
                                                                    • Opcode Fuzzy Hash: 860b5662198bb95fb378977bbea60daf46e142fae332faac90bd57d3b068fa46
                                                                    • Instruction Fuzzy Hash: D7515A35600245DFCB14DF68C8848EDBBF5FF49314B4981A8E80AAB762DB31ED85CB90
                                                                    APIs
                                                                    • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00176C33
                                                                    • SetWindowLongW.USER32(?,000000EC,?), ref: 00176C4A
                                                                    • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00176C73
                                                                    • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,0015AB79,00000000,00000000), ref: 00176C98
                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00176CC7
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Long$MessageSendShow
                                                                    • String ID:
                                                                    • API String ID: 3688381893-0
                                                                    • Opcode ID: 474a42f9088c1c0b87fe5d33e2eebc0faeaf42ee9b0e75c9ebe4f07a0972b99f
                                                                    • Instruction ID: fd09000fb3d1249197755839b88ad93374dc801202fdcb1c158d7719b345cc0d
                                                                    • Opcode Fuzzy Hash: 474a42f9088c1c0b87fe5d33e2eebc0faeaf42ee9b0e75c9ebe4f07a0972b99f
                                                                    • Instruction Fuzzy Hash: 7941D435604504AFD725CF38CC58FE97BB5EB0A350F158268F89DA72E0C771AD81DA80
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: _free
                                                                    • String ID:
                                                                    • API String ID: 269201875-0
                                                                    • Opcode ID: 963382a8eae740d8eb5af73e5e2ad3f05533904e93badad0d7c02846d7c6e385
                                                                    • Instruction ID: cd8e0e338dd325878959cc66da88e1ec8c25b0fe4e0fd25736d6f95da834a1f7
                                                                    • Opcode Fuzzy Hash: 963382a8eae740d8eb5af73e5e2ad3f05533904e93badad0d7c02846d7c6e385
                                                                    • Instruction Fuzzy Hash: 8D41D336A00204AFCB28DF78C981AADB7F5EF89314F154578E615EB392DB31AD51CB80
                                                                    APIs
                                                                    • GetCursorPos.USER32(?), ref: 000F9141
                                                                    • ScreenToClient.USER32(00000000,?), ref: 000F915E
                                                                    • GetAsyncKeyState.USER32(00000001), ref: 000F9183
                                                                    • GetAsyncKeyState.USER32(00000002), ref: 000F919D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: AsyncState$ClientCursorScreen
                                                                    • String ID:
                                                                    • API String ID: 4210589936-0
                                                                    • Opcode ID: 9d72e4e767aa0119d8ac173f8fd7ea70c6c570c32faaea1017c047dfd83f76b9
                                                                    • Instruction ID: 599536b91b612e7d5e691d5e25f19db4565e57e2c5f12e68a7ccc4f1106ab60b
                                                                    • Opcode Fuzzy Hash: 9d72e4e767aa0119d8ac173f8fd7ea70c6c570c32faaea1017c047dfd83f76b9
                                                                    • Instruction Fuzzy Hash: 09415071A0861AFBDF199F64C844BFEB774FF05324F208229E529A72D0C7306994DB91
                                                                    APIs
                                                                    • GetInputState.USER32 ref: 001538CB
                                                                    • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00153922
                                                                    • TranslateMessage.USER32(?), ref: 0015394B
                                                                    • DispatchMessageW.USER32(?), ref: 00153955
                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00153966
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                                    • String ID:
                                                                    • API String ID: 2256411358-0
                                                                    • Opcode ID: 2c3c27bb9e2a20da237023ece5adeeb721135b658f47b71be88b2f8f30b3d7ee
                                                                    • Instruction ID: 38f1b02334eacbd2d3b46121a100642013ad7fa75a4659593de52a000ecc61d9
                                                                    • Opcode Fuzzy Hash: 2c3c27bb9e2a20da237023ece5adeeb721135b658f47b71be88b2f8f30b3d7ee
                                                                    • Instruction Fuzzy Hash: 3F31EAB0504385EEEB39CB34D858BB637E4AB0138AF55065DE876CB4A0E7B096CDCB11
                                                                    APIs
                                                                    • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0015CF38
                                                                    • InternetReadFile.WININET(?,00000000,?,?), ref: 0015CF6F
                                                                    • GetLastError.KERNEL32(?,00000000,?,?,?,0015C21E,00000000), ref: 0015CFB4
                                                                    • SetEvent.KERNEL32(?,?,00000000,?,?,?,0015C21E,00000000), ref: 0015CFC8
                                                                    • SetEvent.KERNEL32(?,?,00000000,?,?,?,0015C21E,00000000), ref: 0015CFF2
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                                    • String ID:
                                                                    • API String ID: 3191363074-0
                                                                    • Opcode ID: facb47eac466be8a102bc93bcd191d264e9be59f61190bf5f0f55d2f94620706
                                                                    • Instruction ID: 68af65aaf7168d741a07112e94d40b612b976ea613cebf89b5e2d6234b624db9
                                                                    • Opcode Fuzzy Hash: facb47eac466be8a102bc93bcd191d264e9be59f61190bf5f0f55d2f94620706
                                                                    • Instruction Fuzzy Hash: 60318071600305EFDB24DFA5C8849ABBBF9EF14312B10442EF926D6501DB30AD84DBA0
                                                                    APIs
                                                                    • GetWindowRect.USER32(?,?), ref: 00141915
                                                                    • PostMessageW.USER32(00000001,00000201,00000001), ref: 001419C1
                                                                    • Sleep.KERNEL32(00000000,?,?,?), ref: 001419C9
                                                                    • PostMessageW.USER32(00000001,00000202,00000000), ref: 001419DA
                                                                    • Sleep.KERNEL32(00000000,?,?,?,?), ref: 001419E2
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: MessagePostSleep$RectWindow
                                                                    • String ID:
                                                                    • API String ID: 3382505437-0
                                                                    • Opcode ID: 9c397b154f809f3e55a13238e13d66b10d6eeb32250a2bc8417aab3054b927dd
                                                                    • Instruction ID: 8f0f6771c20af4233fee54c3d9f105c6b44d0a34fdb30d28f5ef31a68305e405
                                                                    • Opcode Fuzzy Hash: 9c397b154f809f3e55a13238e13d66b10d6eeb32250a2bc8417aab3054b927dd
                                                                    • Instruction Fuzzy Hash: 0D31A271A00219FFCB04CFA8CD99ADE7BB5FB44319F104229F925A72E1C7709994CB90
                                                                    APIs
                                                                    • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00175745
                                                                    • SendMessageW.USER32(?,00001074,?,00000001), ref: 0017579D
                                                                    • _wcslen.LIBCMT ref: 001757AF
                                                                    • _wcslen.LIBCMT ref: 001757BA
                                                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00175816
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$_wcslen
                                                                    • String ID:
                                                                    • API String ID: 763830540-0
                                                                    • Opcode ID: 3e985de87a6d1120a9608e623f89f1c5899f00ad148afabac393a174d0368993
                                                                    • Instruction ID: 6293481757e6ad4da9f415451a325699c0d83d99ef786f7af1f7bf1541e82048
                                                                    • Opcode Fuzzy Hash: 3e985de87a6d1120a9608e623f89f1c5899f00ad148afabac393a174d0368993
                                                                    • Instruction Fuzzy Hash: 682165759046189ADB209FA4CC85AEE7BB9FF14724F50C21AFA1DEA1C0E7B099C5CF50
                                                                    APIs
                                                                    • IsWindow.USER32(00000000), ref: 00160951
                                                                    • GetForegroundWindow.USER32 ref: 00160968
                                                                    • GetDC.USER32(00000000), ref: 001609A4
                                                                    • GetPixel.GDI32(00000000,?,00000003), ref: 001609B0
                                                                    • ReleaseDC.USER32(00000000,00000003), ref: 001609E8
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Window$ForegroundPixelRelease
                                                                    • String ID:
                                                                    • API String ID: 4156661090-0
                                                                    • Opcode ID: 9d8bc42672f1689895a3472810a4ff54b89cf35ac48201cd1c06dfe4462b5bd8
                                                                    • Instruction ID: 2c59f3612117cdc29282a5b16dfb3b03d5d000fb34ada475a37f79205726e9b7
                                                                    • Opcode Fuzzy Hash: 9d8bc42672f1689895a3472810a4ff54b89cf35ac48201cd1c06dfe4462b5bd8
                                                                    • Instruction Fuzzy Hash: 8B216F35600214AFD704EF65DC85AAEBBF5EF48701F14846CF85AA7752DB70AD44CB90
                                                                    APIs
                                                                    • GetEnvironmentStringsW.KERNEL32 ref: 0011CDC6
                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0011CDE9
                                                                      • Part of subcall function 00113820: RtlAllocateHeap.NTDLL(00000000,?,001B1444,?,000FFDF5,?,?,000EA976,00000010,001B1440,000E13FC,?,000E13C6,?,000E1129), ref: 00113852
                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0011CE0F
                                                                    • _free.LIBCMT ref: 0011CE22
                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0011CE31
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                    • String ID:
                                                                    • API String ID: 336800556-0
                                                                    • Opcode ID: fe1f66323585b97cd340666a6cea9140e1534c6ac8b755057a40374c6941ed60
                                                                    • Instruction ID: 1ca913e422e0c4c6c78887ff5abb46c7247a1e872ce9bf7bc170c4cd8bcd474d
                                                                    • Opcode Fuzzy Hash: fe1f66323585b97cd340666a6cea9140e1534c6ac8b755057a40374c6941ed60
                                                                    • Instruction Fuzzy Hash: A80184726422157F272916BA6C89DFF6D6EEFC6BA1315013DF909C7201EB618D9181F0
                                                                    APIs
                                                                    • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 000F9693
                                                                    • SelectObject.GDI32(?,00000000), ref: 000F96A2
                                                                    • BeginPath.GDI32(?), ref: 000F96B9
                                                                    • SelectObject.GDI32(?,00000000), ref: 000F96E2
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ObjectSelect$BeginCreatePath
                                                                    • String ID:
                                                                    • API String ID: 3225163088-0
                                                                    • Opcode ID: 6f26502fbdf8e76887d3eb94c82d80aaf124e4890ef0b0623ff6af4a519e961a
                                                                    • Instruction ID: 0f695620f9a0c309a9a08a1e1650328e99120c5dd03b7031d38a16b17c0a5b01
                                                                    • Opcode Fuzzy Hash: 6f26502fbdf8e76887d3eb94c82d80aaf124e4890ef0b0623ff6af4a519e961a
                                                                    • Instruction Fuzzy Hash: 6A217C70802349FBDB219F24EC287B93BB9BB0032AF51031AF514A69B0D37098D1DB94
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: _memcmp
                                                                    • String ID:
                                                                    • API String ID: 2931989736-0
                                                                    • Opcode ID: 2e4e38696b8439fba8df52f8532ce97d4f9e7af90870be196d286ad27598eec4
                                                                    • Instruction ID: ba232ddc1756aadd39fe7f4cd5789c60907fbf00efb3e1af781ced7945a9ade5
                                                                    • Opcode Fuzzy Hash: 2e4e38696b8439fba8df52f8532ce97d4f9e7af90870be196d286ad27598eec4
                                                                    • Instruction Fuzzy Hash: 810196B1641605BBE30855109E42EBB736EAB213A5B808035FD089F293F764ED12C2B1
                                                                    APIs
                                                                    • GetLastError.KERNEL32(?,?,?,0010F2DE,00113863,001B1444,?,000FFDF5,?,?,000EA976,00000010,001B1440,000E13FC,?,000E13C6), ref: 00112DFD
                                                                    • _free.LIBCMT ref: 00112E32
                                                                    • _free.LIBCMT ref: 00112E59
                                                                    • SetLastError.KERNEL32(00000000,000E1129), ref: 00112E66
                                                                    • SetLastError.KERNEL32(00000000,000E1129), ref: 00112E6F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$_free
                                                                    • String ID:
                                                                    • API String ID: 3170660625-0
                                                                    • Opcode ID: 28b0e08da4f79bd2a82e92d637968c1737b9b7a3c1082e2917690e7673b590b9
                                                                    • Instruction ID: 37fe70692fc9eebb1ea1eaedea28da3c79071f31ffa1af573ffa82a67cef650d
                                                                    • Opcode Fuzzy Hash: 28b0e08da4f79bd2a82e92d637968c1737b9b7a3c1082e2917690e7673b590b9
                                                                    • Instruction Fuzzy Hash: 5401CD3264660067C62E77746C45DEB156DABE5775B25403CF429E31D2EF748CE14160
                                                                    APIs
                                                                    • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0013FF41,80070057,?,?,?,0014035E), ref: 0014002B
                                                                    • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0013FF41,80070057,?,?), ref: 00140046
                                                                    • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0013FF41,80070057,?,?), ref: 00140054
                                                                    • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0013FF41,80070057,?), ref: 00140064
                                                                    • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0013FF41,80070057,?,?), ref: 00140070
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                    • String ID:
                                                                    • API String ID: 3897988419-0
                                                                    • Opcode ID: 2a8dd84acbd3f2463b0280d05754d2fbda305005e60f61f2cf58fc261e13967c
                                                                    • Instruction ID: 9cf5c7151632995a85d5fbc5732a20f846e81b898dc132985ca9b0023211efdc
                                                                    • Opcode Fuzzy Hash: 2a8dd84acbd3f2463b0280d05754d2fbda305005e60f61f2cf58fc261e13967c
                                                                    • Instruction Fuzzy Hash: A4016276600214BFDB224F6ADC44BAA7AFDEF48791F144128FE09D7220D775DE809BA0
                                                                    APIs
                                                                    • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00141114
                                                                    • GetLastError.KERNEL32(?,00000000,00000000,?,?,00140B9B,?,?,?), ref: 00141120
                                                                    • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00140B9B,?,?,?), ref: 0014112F
                                                                    • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00140B9B,?,?,?), ref: 00141136
                                                                    • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0014114D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                    • String ID:
                                                                    • API String ID: 842720411-0
                                                                    • Opcode ID: 3129621cb2eb7ebe50de28951e689989c7071d476bc7ca10e915bcbe4b66650b
                                                                    • Instruction ID: 049d5e8321588a92647b2b1c50a0a5203a26251c4163f1da310bb4be79900589
                                                                    • Opcode Fuzzy Hash: 3129621cb2eb7ebe50de28951e689989c7071d476bc7ca10e915bcbe4b66650b
                                                                    • Instruction Fuzzy Hash: 01013779200205BFDB154FA5DC49E6A3F7EEF897A1B244429FA49D7360DB31DCC09AA0
                                                                    APIs
                                                                    • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00140FCA
                                                                    • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00140FD6
                                                                    • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00140FE5
                                                                    • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00140FEC
                                                                    • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00141002
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                    • String ID:
                                                                    • API String ID: 44706859-0
                                                                    • Opcode ID: cfddcdbcd8867d1f37b73cf6b85f9872c79b7c7150afdd25b1aa2687e7598878
                                                                    • Instruction ID: 72bc33360a50d9d9021a29bf4d1a4c05d16ce3941961339709bffe02f812e0a1
                                                                    • Opcode Fuzzy Hash: cfddcdbcd8867d1f37b73cf6b85f9872c79b7c7150afdd25b1aa2687e7598878
                                                                    • Instruction Fuzzy Hash: 33F04979200301FBDB214FA4AC49F563FBDEF89762F604428FA49D7261CA70DCC08AA0
                                                                    APIs
                                                                    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0014102A
                                                                    • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00141036
                                                                    • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00141045
                                                                    • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0014104C
                                                                    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00141062
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                    • String ID:
                                                                    • API String ID: 44706859-0
                                                                    • Opcode ID: 32b00c7f5d752a7f2b051905be879f2c2d778ae57af938db1745917d4676f67d
                                                                    • Instruction ID: abd62440fb54c2f7525623d932d5b0627fd959ad7b7fca4ba1175421e1a6382f
                                                                    • Opcode Fuzzy Hash: 32b00c7f5d752a7f2b051905be879f2c2d778ae57af938db1745917d4676f67d
                                                                    • Instruction Fuzzy Hash: 24F04939200301FBDB215FA4EC49F563BBDEF89761F200828FA4DD7260CA70D8D08AA0
                                                                    APIs
                                                                    • CloseHandle.KERNEL32(?,?,?,?,0015017D,?,001532FC,?,00000001,00122592,?), ref: 00150324
                                                                    • CloseHandle.KERNEL32(?,?,?,?,0015017D,?,001532FC,?,00000001,00122592,?), ref: 00150331
                                                                    • CloseHandle.KERNEL32(?,?,?,?,0015017D,?,001532FC,?,00000001,00122592,?), ref: 0015033E
                                                                    • CloseHandle.KERNEL32(?,?,?,?,0015017D,?,001532FC,?,00000001,00122592,?), ref: 0015034B
                                                                    • CloseHandle.KERNEL32(?,?,?,?,0015017D,?,001532FC,?,00000001,00122592,?), ref: 00150358
                                                                    • CloseHandle.KERNEL32(?,?,?,?,0015017D,?,001532FC,?,00000001,00122592,?), ref: 00150365
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CloseHandle
                                                                    • String ID:
                                                                    • API String ID: 2962429428-0
                                                                    • Opcode ID: 674d665eeab2ea16d94dfe7bc7f84efa26fcd642d25abfec173df3cc498fb2fb
                                                                    • Instruction ID: 691d17700bb41d8312b76fce37f0d69737d337facc65175983cdc06452c77d61
                                                                    • Opcode Fuzzy Hash: 674d665eeab2ea16d94dfe7bc7f84efa26fcd642d25abfec173df3cc498fb2fb
                                                                    • Instruction Fuzzy Hash: A101A272800B15DFC7319FA6D880412F7F5BF543163158A3FD1A652931C371A998CF80
                                                                    APIs
                                                                    • _free.LIBCMT ref: 0011D752
                                                                      • Part of subcall function 001129C8: HeapFree.KERNEL32(00000000,00000000,?,0011D7D1,00000000,00000000,00000000,00000000,?,0011D7F8,00000000,00000007,00000000,?,0011DBF5,00000000), ref: 001129DE
                                                                      • Part of subcall function 001129C8: GetLastError.KERNEL32(00000000,?,0011D7D1,00000000,00000000,00000000,00000000,?,0011D7F8,00000000,00000007,00000000,?,0011DBF5,00000000,00000000), ref: 001129F0
                                                                    • _free.LIBCMT ref: 0011D764
                                                                    • _free.LIBCMT ref: 0011D776
                                                                    • _free.LIBCMT ref: 0011D788
                                                                    • _free.LIBCMT ref: 0011D79A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                    • String ID:
                                                                    • API String ID: 776569668-0
                                                                    • Opcode ID: 001da1c31f129ab9e92b2cdeaa82faf45c7bcc4e15a50ac2b3ed53f265831376
                                                                    • Instruction ID: 13799edca9b0e54c7bc2881df8d1387d7e1d85971183b8d0f403e20b291c0a2a
                                                                    • Opcode Fuzzy Hash: 001da1c31f129ab9e92b2cdeaa82faf45c7bcc4e15a50ac2b3ed53f265831376
                                                                    • Instruction Fuzzy Hash: E3F09632500218ABC629FB68F9C6C9777DDBB05728B940C25F048DB941CB34FCD086E0
                                                                    APIs
                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00145C58
                                                                    • GetWindowTextW.USER32(00000000,?,00000100), ref: 00145C6F
                                                                    • MessageBeep.USER32(00000000), ref: 00145C87
                                                                    • KillTimer.USER32(?,0000040A), ref: 00145CA3
                                                                    • EndDialog.USER32(?,00000001), ref: 00145CBD
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                    • String ID:
                                                                    • API String ID: 3741023627-0
                                                                    • Opcode ID: 144a5009956f2be2d43be7345c1661c2c89bcc43f3725151b91abb8f59adb189
                                                                    • Instruction ID: 6666824cd00f67a142ef1f5653cb2bd821d22fa3e0569906d05d6dba1dcc0d71
                                                                    • Opcode Fuzzy Hash: 144a5009956f2be2d43be7345c1661c2c89bcc43f3725151b91abb8f59adb189
                                                                    • Instruction Fuzzy Hash: 18016D30500B04ABEB255B10ED8EFA67BBDBB00B06F00055DB587A15E2DBF0A9C48BD1
                                                                    APIs
                                                                    • _free.LIBCMT ref: 001122BE
                                                                      • Part of subcall function 001129C8: HeapFree.KERNEL32(00000000,00000000,?,0011D7D1,00000000,00000000,00000000,00000000,?,0011D7F8,00000000,00000007,00000000,?,0011DBF5,00000000), ref: 001129DE
                                                                      • Part of subcall function 001129C8: GetLastError.KERNEL32(00000000,?,0011D7D1,00000000,00000000,00000000,00000000,?,0011D7F8,00000000,00000007,00000000,?,0011DBF5,00000000,00000000), ref: 001129F0
                                                                    • _free.LIBCMT ref: 001122D0
                                                                    • _free.LIBCMT ref: 001122E3
                                                                    • _free.LIBCMT ref: 001122F4
                                                                    • _free.LIBCMT ref: 00112305
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                    • String ID:
                                                                    • API String ID: 776569668-0
                                                                    • Opcode ID: ee10dedb5bbc38608769af7a3d7c1fc3e97bd7d3e7c936c662f49d3d2a0e3470
                                                                    • Instruction ID: 21b4fb8285657f43c6e44a0ffdd2925c1058f11ad269f07172d47e3779624410
                                                                    • Opcode Fuzzy Hash: ee10dedb5bbc38608769af7a3d7c1fc3e97bd7d3e7c936c662f49d3d2a0e3470
                                                                    • Instruction Fuzzy Hash: 72F05EB59001249B861BBF58BC018AD3B64F729B60751076AF410DBBB1C73448F1AFE4
                                                                    APIs
                                                                    • EndPath.GDI32(?), ref: 000F95D4
                                                                    • StrokeAndFillPath.GDI32(?,?,001371F7,00000000,?,?,?), ref: 000F95F0
                                                                    • SelectObject.GDI32(?,00000000), ref: 000F9603
                                                                    • DeleteObject.GDI32 ref: 000F9616
                                                                    • StrokePath.GDI32(?), ref: 000F9631
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                    • String ID:
                                                                    • API String ID: 2625713937-0
                                                                    • Opcode ID: 23ad8779f1dabd3e30f459ceabeba5ad67f9fa6f16408308b627de59ba33d8c7
                                                                    • Instruction ID: 5456c016605972763e5432d089d1ff91ccde5dde5e5b2f1b4c88f0b2f5937b18
                                                                    • Opcode Fuzzy Hash: 23ad8779f1dabd3e30f459ceabeba5ad67f9fa6f16408308b627de59ba33d8c7
                                                                    • Instruction Fuzzy Hash: FAF03C34005748EBDB225F65ED2C7B83BB5AB0032AF548318F529958F0C73089D1EFA0
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: __freea$_free
                                                                    • String ID: a/p$am/pm
                                                                    • API String ID: 3432400110-3206640213
                                                                    • Opcode ID: fda1d78468693c0e8e47e0e09ed4764c52adcb5a21560b71789e193ec2b5e70b
                                                                    • Instruction ID: 302916a100aa0642fa6d737f39c036d92f7682855bd4fb929040951083cecc8c
                                                                    • Opcode Fuzzy Hash: fda1d78468693c0e8e47e0e09ed4764c52adcb5a21560b71789e193ec2b5e70b
                                                                    • Instruction Fuzzy Hash: DCD1CE31924206BACB2C9F68C845AFAF7B1FF15310F290179EB219B654E3759DC0CB91
                                                                    APIs
                                                                      • Part of subcall function 00100242: EnterCriticalSection.KERNEL32(001B070C,001B1884,?,?,000F198B,001B2518,?,?,?,000E12F9,00000000), ref: 0010024D
                                                                      • Part of subcall function 00100242: LeaveCriticalSection.KERNEL32(001B070C,?,000F198B,001B2518,?,?,?,000E12F9,00000000), ref: 0010028A
                                                                      • Part of subcall function 000E9CB3: _wcslen.LIBCMT ref: 000E9CBD
                                                                      • Part of subcall function 001000A3: __onexit.LIBCMT ref: 001000A9
                                                                    • __Init_thread_footer.LIBCMT ref: 00167BFB
                                                                      • Part of subcall function 001001F8: EnterCriticalSection.KERNEL32(001B070C,?,?,000F8747,001B2514), ref: 00100202
                                                                      • Part of subcall function 001001F8: LeaveCriticalSection.KERNEL32(001B070C,?,000F8747,001B2514), ref: 00100235
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                                    • String ID: 5$G$Variable must be of type 'Object'.
                                                                    • API String ID: 535116098-3733170431
                                                                    • Opcode ID: 4edeab7e0925c90e260b91a8abee47ac9e1ac36f5de15ca7830a06fe03a4ff66
                                                                    • Instruction ID: 68142d5b474bff11c911134194ef257ca1e40a5843edc77efc56131b4fdd8460
                                                                    • Opcode Fuzzy Hash: 4edeab7e0925c90e260b91a8abee47ac9e1ac36f5de15ca7830a06fe03a4ff66
                                                                    • Instruction Fuzzy Hash: 96918A70A04209EFCB14EF98D9919FDB7B2FF49308F108459F806AB292DB71AE55CB51
                                                                    APIs
                                                                      • Part of subcall function 0014B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,001421D0,?,?,00000034,00000800,?,00000034), ref: 0014B42D
                                                                    • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00142760
                                                                      • Part of subcall function 0014B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,001421FF,?,?,00000800,?,00001073,00000000,?,?), ref: 0014B3F8
                                                                      • Part of subcall function 0014B32A: GetWindowThreadProcessId.USER32(?,?), ref: 0014B355
                                                                      • Part of subcall function 0014B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00142194,00000034,?,?,00001004,00000000,00000000), ref: 0014B365
                                                                      • Part of subcall function 0014B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00142194,00000034,?,?,00001004,00000000,00000000), ref: 0014B37B
                                                                    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 001427CD
                                                                    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0014281A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                    • String ID: @
                                                                    • API String ID: 4150878124-2766056989
                                                                    • Opcode ID: 9c4e2515b060b273661bba5df7a94d5228d3d60de65ebe43e418d19cdb05c7cb
                                                                    • Instruction ID: 0eddbdab8ab03c6f7e905b46c6c6aac8f1553a435e78164b463ff8e6a9d6ab9f
                                                                    • Opcode Fuzzy Hash: 9c4e2515b060b273661bba5df7a94d5228d3d60de65ebe43e418d19cdb05c7cb
                                                                    • Instruction Fuzzy Hash: 2B412F72900218AFDB10DFA4CD85EDEBBB8EF15700F104099FA55B7191DB70AE85CBA1
                                                                    APIs
                                                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\file.exe,00000104), ref: 00111769
                                                                    • _free.LIBCMT ref: 00111834
                                                                    • _free.LIBCMT ref: 0011183E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: _free$FileModuleName
                                                                    • String ID: C:\Users\user\Desktop\file.exe
                                                                    • API String ID: 2506810119-3695852857
                                                                    • Opcode ID: 6798baf5e3e0bea07a7af501f6ad2201ed03597c3a8252f0dddf8a5d08b4d69d
                                                                    • Instruction ID: 5e6b22feab55c3cd31a6ca8d60f49518d64f6b5ef0cc5edd61ad47c1ea814baf
                                                                    • Opcode Fuzzy Hash: 6798baf5e3e0bea07a7af501f6ad2201ed03597c3a8252f0dddf8a5d08b4d69d
                                                                    • Instruction Fuzzy Hash: 90319C71A04218BBCB29DF999881DDEFBFCEB95310B6141BAEA0497251D7708AC0CB90
                                                                    APIs
                                                                    • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 0014C306
                                                                    • DeleteMenu.USER32(?,00000007,00000000), ref: 0014C34C
                                                                    • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,001B1990,00994A08), ref: 0014C395
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Menu$Delete$InfoItem
                                                                    • String ID: 0
                                                                    • API String ID: 135850232-4108050209
                                                                    • Opcode ID: 94ff7675728669b78ec4ab26f0da7d074ca6f6b3e08d7d165d0446105c338f27
                                                                    • Instruction ID: ab372a5a6f5944e386ffbeecc3ef10cf80941bf812b943e907715db6f76578ab
                                                                    • Opcode Fuzzy Hash: 94ff7675728669b78ec4ab26f0da7d074ca6f6b3e08d7d165d0446105c338f27
                                                                    • Instruction Fuzzy Hash: 5941C0362063019FD724DF25D884B5ABBE8BF85320F008A1DF9A5972E1D770E904CBA2
                                                                    APIs
                                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0017CC08,00000000,?,?,?,?), ref: 001744AA
                                                                    • GetWindowLongW.USER32 ref: 001744C7
                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 001744D7
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Long
                                                                    • String ID: SysTreeView32
                                                                    • API String ID: 847901565-1698111956
                                                                    • Opcode ID: 268b3ef63b52c692f360c92bc713ee02208304323afd85e6496f30dab1dd0cdf
                                                                    • Instruction ID: 4541eb9e976140dbc4292dc1f99d0f25815c691ebf7ad748e38de5ef878bc2d2
                                                                    • Opcode Fuzzy Hash: 268b3ef63b52c692f360c92bc713ee02208304323afd85e6496f30dab1dd0cdf
                                                                    • Instruction Fuzzy Hash: B8319E31210205AFDF218E78DC45BEA77B9EB09334F208715F979A21E1DB70EC909B50
                                                                    APIs
                                                                      • Part of subcall function 0016335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00163077,?,?), ref: 00163378
                                                                    • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0016307A
                                                                    • _wcslen.LIBCMT ref: 0016309B
                                                                    • htons.WSOCK32(00000000,?,?,00000000), ref: 00163106
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                                    • String ID: 255.255.255.255
                                                                    • API String ID: 946324512-2422070025
                                                                    • Opcode ID: 1c3f2bbbe98d32d3fe2080b99138bfd80be4d482feac9528c44af19473d65488
                                                                    • Instruction ID: 62241129d6a822f64e687b6ed14f50f0f51c1ac1b9ef182e8b39405b8e4eb071
                                                                    • Opcode Fuzzy Hash: 1c3f2bbbe98d32d3fe2080b99138bfd80be4d482feac9528c44af19473d65488
                                                                    • Instruction Fuzzy Hash: C63104392002019FCB20CF28C985EAA77F0EF15318F248059E9258B392CB32EF85C761
                                                                    APIs
                                                                    • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00173F40
                                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00173F54
                                                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00173F78
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$Window
                                                                    • String ID: SysMonthCal32
                                                                    • API String ID: 2326795674-1439706946
                                                                    • Opcode ID: 26a95a9602bb9599f0e90b6890d5629f248daee21d24f890b608525678a7cc90
                                                                    • Instruction ID: a5661b528decea06666665d85b1944fc3362c6740b813ae1af9b6bf2cf47e18e
                                                                    • Opcode Fuzzy Hash: 26a95a9602bb9599f0e90b6890d5629f248daee21d24f890b608525678a7cc90
                                                                    • Instruction Fuzzy Hash: 2021BF32600229BFDF118F50DC46FEA3B75EB48754F114214FA19AB1D0D7B1A9909B90
                                                                    APIs
                                                                    • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00174705
                                                                    • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00174713
                                                                    • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0017471A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$DestroyWindow
                                                                    • String ID: msctls_updown32
                                                                    • API String ID: 4014797782-2298589950
                                                                    • Opcode ID: 12dfeafbe3ad0780a926686266f688d36e0a312ed2062c972ac6f8f00243390b
                                                                    • Instruction ID: 1afceae5d28289c892fc20f3f543849632550a994166b29aaef284c13d40b680
                                                                    • Opcode Fuzzy Hash: 12dfeafbe3ad0780a926686266f688d36e0a312ed2062c972ac6f8f00243390b
                                                                    • Instruction Fuzzy Hash: 022190B5600208BFDB10DF64DCD1DA737BDEB9A3A8B004149FA049B391CB30EC51CAA0
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen
                                                                    • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                    • API String ID: 176396367-2734436370
                                                                    • Opcode ID: bbd79d5b21e3fa3a75f861b589e958aa1726da6e0557e5466c10e85fedf16fa2
                                                                    • Instruction ID: 803f1f6484dbfe184aba03a3176f571a9c1f78c46457b3473a1546ad6e23bcb3
                                                                    • Opcode Fuzzy Hash: bbd79d5b21e3fa3a75f861b589e958aa1726da6e0557e5466c10e85fedf16fa2
                                                                    • Instruction Fuzzy Hash: C3216D7210815166C331BB25EC02FB773D89FA5320F11842AF98D9B0A2EB919D42C2D5
                                                                    APIs
                                                                    • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00173840
                                                                    • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00173850
                                                                    • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00173876
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend$MoveWindow
                                                                    • String ID: Listbox
                                                                    • API String ID: 3315199576-2633736733
                                                                    • Opcode ID: 033c231e3dff40e07bcac00420cdf48e0a3e41769b81795a5280357417e70a2a
                                                                    • Instruction ID: 0153998708b4d09059f0ae0e073f34c56ee3a4b38c23aa9a5a95caf778350849
                                                                    • Opcode Fuzzy Hash: 033c231e3dff40e07bcac00420cdf48e0a3e41769b81795a5280357417e70a2a
                                                                    • Instruction Fuzzy Hash: 29218E72610218BBEB258F54DC85FAB377EEF89760F118224F9589B190CB72DC5297A0
                                                                    APIs
                                                                    • SetErrorMode.KERNEL32(00000001), ref: 00154A08
                                                                    • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00154A5C
                                                                    • SetErrorMode.KERNEL32(00000000,?,?,0017CC08), ref: 00154AD0
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorMode$InformationVolume
                                                                    • String ID: %lu
                                                                    • API String ID: 2507767853-685833217
                                                                    • Opcode ID: 5a0706a0e38401b57da7ae50c2e3025aa0338c1c64108f33c0c4a887184d3008
                                                                    • Instruction ID: 61f92e42da769545f9f98e577fa46585b61a92c6f85ce871aec24895f8428105
                                                                    • Opcode Fuzzy Hash: 5a0706a0e38401b57da7ae50c2e3025aa0338c1c64108f33c0c4a887184d3008
                                                                    • Instruction Fuzzy Hash: AA310F75A00109AFDB11DF54C985EAA77F8EF05308F1480A9F909DB252D771EE85CBA1
                                                                    APIs
                                                                    • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 0017424F
                                                                    • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00174264
                                                                    • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00174271
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID: msctls_trackbar32
                                                                    • API String ID: 3850602802-1010561917
                                                                    • Opcode ID: 376cf895730795db88218c2b0b7fb6ea1ffd804d99b80fce1e9110ceb6fb3369
                                                                    • Instruction ID: 50453d11a8ed90d12171cf271fbc3654899316c79f611e93ca0aca2789b76ec6
                                                                    • Opcode Fuzzy Hash: 376cf895730795db88218c2b0b7fb6ea1ffd804d99b80fce1e9110ceb6fb3369
                                                                    • Instruction Fuzzy Hash: 7711E331240248BFEF209E29DC06FAB3BBCEF95B54F114514FA59E2091D371DC619B50
                                                                    APIs
                                                                      • Part of subcall function 000E6B57: _wcslen.LIBCMT ref: 000E6B6A
                                                                      • Part of subcall function 00142DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00142DC5
                                                                      • Part of subcall function 00142DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00142DD6
                                                                      • Part of subcall function 00142DA7: GetCurrentThreadId.KERNEL32 ref: 00142DDD
                                                                      • Part of subcall function 00142DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00142DE4
                                                                    • GetFocus.USER32 ref: 00142F78
                                                                      • Part of subcall function 00142DEE: GetParent.USER32(00000000), ref: 00142DF9
                                                                    • GetClassNameW.USER32(?,?,00000100), ref: 00142FC3
                                                                    • EnumChildWindows.USER32(?,0014303B), ref: 00142FEB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                                    • String ID: %s%d
                                                                    • API String ID: 1272988791-1110647743
                                                                    • Opcode ID: 2da2ec7c9e44e9189083abe541c18a0c7770d804d616ea01f70ff5fd3aab4f37
                                                                    • Instruction ID: 6d4907ae7203061c393224a53aabc735e37144674a244d62a8b9ecce8aba861b
                                                                    • Opcode Fuzzy Hash: 2da2ec7c9e44e9189083abe541c18a0c7770d804d616ea01f70ff5fd3aab4f37
                                                                    • Instruction Fuzzy Hash: CE11B4716002056BCF157FB09CC5EEE37AAAF94314F044079F919AB262DF3199858B60
                                                                    APIs
                                                                    • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 001758C1
                                                                    • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 001758EE
                                                                    • DrawMenuBar.USER32(?), ref: 001758FD
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Menu$InfoItem$Draw
                                                                    • String ID: 0
                                                                    • API String ID: 3227129158-4108050209
                                                                    • Opcode ID: 51f3526508e64d9a067858a133ee88d456138673626a583ede07d24fac988664
                                                                    • Instruction ID: 9b9b8c92197c0fb193c67957560e7412781d4c9a0e3d442bb1a96b96038835a8
                                                                    • Opcode Fuzzy Hash: 51f3526508e64d9a067858a133ee88d456138673626a583ede07d24fac988664
                                                                    • Instruction Fuzzy Hash: 91015731600219EEDB219F11DC44BAEBBB5FF45364F10C0A9E94DDA162EB718AC4EF61
                                                                    APIs
                                                                    • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 0013D3BF
                                                                    • FreeLibrary.KERNEL32 ref: 0013D3E5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: AddressFreeLibraryProc
                                                                    • String ID: GetSystemWow64DirectoryW$X64
                                                                    • API String ID: 3013587201-2590602151
                                                                    • Opcode ID: f5d28f2a0ce7e2431b1e6507bbee5087cbc88e37c920c89b26cebe006ce88ee7
                                                                    • Instruction ID: b8be29743603926c2d3f455be10e2e66623f97cacc90457824337ba61777122b
                                                                    • Opcode Fuzzy Hash: f5d28f2a0ce7e2431b1e6507bbee5087cbc88e37c920c89b26cebe006ce88ee7
                                                                    • Instruction Fuzzy Hash: E7F0E5A1906621DBE7755610BC58AAE3324BF10741F9A8169F80AF6555DB20CFC087D2
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: daf402e4a889023a9ae3132a5b861b60915471737acf555289ed4139056b22bb
                                                                    • Instruction ID: 699ed8469d68c7e5b84759557911c45f5b72a7f48bcc7d2298d384a6224085fa
                                                                    • Opcode Fuzzy Hash: daf402e4a889023a9ae3132a5b861b60915471737acf555289ed4139056b22bb
                                                                    • Instruction Fuzzy Hash: 05C17D75A00206EFCB15CFA5C894EAEBBB5FF48704F118598E605EB261D771EE81CB90
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: __alldvrm$_strrchr
                                                                    • String ID:
                                                                    • API String ID: 1036877536-0
                                                                    • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                                    • Instruction ID: e29c0a93f0b1bd96f96930bfcbd3a4573bb69aed84b57cfabc02a320cc3ef366
                                                                    • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                                    • Instruction Fuzzy Hash: 3BA13472E00296AFEB29CE18C8917EEBBE4EF65350F1841BDE5959B281C33499C2C751
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Variant$ClearInitInitializeUninitialize
                                                                    • String ID:
                                                                    • API String ID: 1998397398-0
                                                                    • Opcode ID: 351792cbe2979a84f9e0e93138ea600497bb1b2abfbf04fd2ac7847d3e266675
                                                                    • Instruction ID: 69eaf52142e97701d500bf3c04cafcaee83e9f6c8166e59c6453373216443369
                                                                    • Opcode Fuzzy Hash: 351792cbe2979a84f9e0e93138ea600497bb1b2abfbf04fd2ac7847d3e266675
                                                                    • Instruction Fuzzy Hash: 76A15B766047009FC700DF29C885A6AB7E5FF89714F04885DF99AAB362DB70EE41CB91
                                                                    APIs
                                                                    • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,0017FC08,?), ref: 001405F0
                                                                    • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,0017FC08,?), ref: 00140608
                                                                    • CLSIDFromProgID.OLE32(?,?,00000000,0017CC40,000000FF,?,00000000,00000800,00000000,?,0017FC08,?), ref: 0014062D
                                                                    • _memcmp.LIBVCRUNTIME ref: 0014064E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: FromProg$FreeTask_memcmp
                                                                    • String ID:
                                                                    • API String ID: 314563124-0
                                                                    • Opcode ID: 99459caba824a34acf26e00a25e0af8d75fd8cbcae5e2ddcc817d86087dc3090
                                                                    • Instruction ID: 0e80d0a90c1c05c05056da6778d040f3d6d7ed403a5b6766f6dbfd8eebc56f12
                                                                    • Opcode Fuzzy Hash: 99459caba824a34acf26e00a25e0af8d75fd8cbcae5e2ddcc817d86087dc3090
                                                                    • Instruction Fuzzy Hash: 6F811B71A00109EFCB05DF95C984EEEB7B9FF89315F204558E606AB260DB71AE46CF60
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: _free
                                                                    • String ID:
                                                                    • API String ID: 269201875-0
                                                                    • Opcode ID: a994c1e8d45c78da9db4eb6cc6206855e30abb9b484ae4382577a64aa96f1415
                                                                    • Instruction ID: 12cb7ce6b87c96d27c129a4e87e9d87d18125df1e51a87a9907cdffe7476fc6d
                                                                    • Opcode Fuzzy Hash: a994c1e8d45c78da9db4eb6cc6206855e30abb9b484ae4382577a64aa96f1415
                                                                    • Instruction Fuzzy Hash: 3B415831A00164BBDB25FBB8BC466AE3AA5EF71330F14027AF41CD61D1E77088A192A1
                                                                    APIs
                                                                    • GetWindowRect.USER32(?,?), ref: 001762E2
                                                                    • ScreenToClient.USER32(?,?), ref: 00176315
                                                                    • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00176382
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Window$ClientMoveRectScreen
                                                                    • String ID:
                                                                    • API String ID: 3880355969-0
                                                                    • Opcode ID: 1c3cc7f049e19a2448bad41d5c766d54f04419adc5ce8a069ead2c3d73684a17
                                                                    • Instruction ID: 88f4a5fcc87f980ac7ba3ffc4842152983402ca78e459c5d6375ec845ff20c41
                                                                    • Opcode Fuzzy Hash: 1c3cc7f049e19a2448bad41d5c766d54f04419adc5ce8a069ead2c3d73684a17
                                                                    • Instruction Fuzzy Hash: C4515C74A00649EFDF10DF68D8809AE7BB6FF55364F108269F8199B2A1D730ED81CB90
                                                                    APIs
                                                                    • socket.WSOCK32(00000002,00000002,00000011), ref: 00161AFD
                                                                    • WSAGetLastError.WSOCK32 ref: 00161B0B
                                                                    • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00161B8A
                                                                    • WSAGetLastError.WSOCK32 ref: 00161B94
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLast$socket
                                                                    • String ID:
                                                                    • API String ID: 1881357543-0
                                                                    • Opcode ID: 595329d58ecf1d1103645e755037c3213f19149cdb3461086bcc7b7af3911221
                                                                    • Instruction ID: f60d896edd6bcc9293443bc6398139e4ec88888b8cc037627264bc9324fe8c18
                                                                    • Opcode Fuzzy Hash: 595329d58ecf1d1103645e755037c3213f19149cdb3461086bcc7b7af3911221
                                                                    • Instruction Fuzzy Hash: 5141A1756002006FE720AF24D886F6977E5AB44718F58845CFA1A9F7D3D772ED418B90
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 3d9c978f4bda2c8401d38b68942f84108a7cac7a5da58cf9236bbe4a952c8b84
                                                                    • Instruction ID: e8a208ccc0ca08c61e32c12fb30375eb36f6cc52196cd2ff3b4f5e3aca7612c0
                                                                    • Opcode Fuzzy Hash: 3d9c978f4bda2c8401d38b68942f84108a7cac7a5da58cf9236bbe4a952c8b84
                                                                    • Instruction Fuzzy Hash: 51410A72A04314BFD728AF78CC81BAA7BE9EB98710F10853EF142DB6C1D77199918790
                                                                    APIs
                                                                    • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00155783
                                                                    • GetLastError.KERNEL32(?,00000000), ref: 001557A9
                                                                    • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 001557CE
                                                                    • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 001557FA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CreateHardLink$DeleteErrorFileLast
                                                                    • String ID:
                                                                    • API String ID: 3321077145-0
                                                                    • Opcode ID: d490086e09c3579f09869b84c769a9068a97d1c06ce89c2348380e002869651f
                                                                    • Instruction ID: 3cf1d266c5212b3c4a6054f91d0e64928052c1e7125f52d292fb0d9aa638a88f
                                                                    • Opcode Fuzzy Hash: d490086e09c3579f09869b84c769a9068a97d1c06ce89c2348380e002869651f
                                                                    • Instruction Fuzzy Hash: E9412C3A600A50DFCB11DF16C444A5EBBF2AF89321B598488EC5A6F362CB70FD45CB91
                                                                    APIs
                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,00106D71,00000000,00000000,001082D9,?,001082D9,?,00000001,00106D71,8BE85006,00000001,001082D9,001082D9), ref: 0011D910
                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0011D999
                                                                    • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 0011D9AB
                                                                    • __freea.LIBCMT ref: 0011D9B4
                                                                      • Part of subcall function 00113820: RtlAllocateHeap.NTDLL(00000000,?,001B1444,?,000FFDF5,?,?,000EA976,00000010,001B1440,000E13FC,?,000E13C6,?,000E1129), ref: 00113852
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                    • String ID:
                                                                    • API String ID: 2652629310-0
                                                                    • Opcode ID: 2f36d4738141358dbcd6ebef1dad457d9b65708a1beb03b2e4bafc5754792e06
                                                                    • Instruction ID: 115ab242fe8e038143bd7ff81185c72a925a7cc5099bbc0594cef8dd23d8d5d5
                                                                    • Opcode Fuzzy Hash: 2f36d4738141358dbcd6ebef1dad457d9b65708a1beb03b2e4bafc5754792e06
                                                                    • Instruction Fuzzy Hash: 30319C72A0020AABDB299F64EC45EEE7BA5EB41314B054178FC0496290EB35DD90CBA0
                                                                    APIs
                                                                    • SendMessageW.USER32(?,00001024,00000000,?), ref: 00175352
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00175375
                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00175382
                                                                    • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 001753A8
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: LongWindow$InvalidateMessageRectSend
                                                                    • String ID:
                                                                    • API String ID: 3340791633-0
                                                                    • Opcode ID: ce6c45ad2d499126862c7e977e4c1f624abb0722b08534687e50878440743530
                                                                    • Instruction ID: 858212c6500a8e505b262fb1df0ae6bdca4ec259470b4ebd21ca6a96eb7eb004
                                                                    • Opcode Fuzzy Hash: ce6c45ad2d499126862c7e977e4c1f624abb0722b08534687e50878440743530
                                                                    • Instruction Fuzzy Hash: 5131BE34A55A08EFEB349A14CC56BE837B7BB043D0F588106FA19962F1C7F0AD80DB91
                                                                    APIs
                                                                    • GetKeyboardState.USER32(?,7694C0D0,?,00008000), ref: 0014ABF1
                                                                    • SetKeyboardState.USER32(00000080,?,00008000), ref: 0014AC0D
                                                                    • PostMessageW.USER32(00000000,00000101,00000000), ref: 0014AC74
                                                                    • SendInput.USER32(00000001,?,0000001C,7694C0D0,?,00008000), ref: 0014ACC6
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: KeyboardState$InputMessagePostSend
                                                                    • String ID:
                                                                    • API String ID: 432972143-0
                                                                    • Opcode ID: 49c48a34c8c904703a34dfff215fdab511ce2f7b0b7950f985750f2d94fe54ce
                                                                    • Instruction ID: a7b3c720be6527f851be4707420248fe386f143b7b66c59f361eb6fbd18df831
                                                                    • Opcode Fuzzy Hash: 49c48a34c8c904703a34dfff215fdab511ce2f7b0b7950f985750f2d94fe54ce
                                                                    • Instruction Fuzzy Hash: F0313730A803186FEF34CB648C84BFA7BB5AF89310F85431AE485972F0C37599818792
                                                                    APIs
                                                                    • ClientToScreen.USER32(?,?), ref: 0017769A
                                                                    • GetWindowRect.USER32(?,?), ref: 00177710
                                                                    • PtInRect.USER32(?,?,00178B89), ref: 00177720
                                                                    • MessageBeep.USER32(00000000), ref: 0017778C
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Rect$BeepClientMessageScreenWindow
                                                                    • String ID:
                                                                    • API String ID: 1352109105-0
                                                                    • Opcode ID: 32ded3f5223f2d57405b2691fb40359453ef3c4633d7c099508d672dcc43e31a
                                                                    • Instruction ID: 0210409f10b178638f1ec456f5c36a7a252c422ff05a1d4a54ef0748f8867ed9
                                                                    • Opcode Fuzzy Hash: 32ded3f5223f2d57405b2691fb40359453ef3c4633d7c099508d672dcc43e31a
                                                                    • Instruction Fuzzy Hash: 43419E34605254EFDB19CF58C898EA977F5FF49318F1581A8E4189F2A1C731E981CF90
                                                                    APIs
                                                                    • GetForegroundWindow.USER32 ref: 001716EB
                                                                      • Part of subcall function 00143A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00143A57
                                                                      • Part of subcall function 00143A3D: GetCurrentThreadId.KERNEL32 ref: 00143A5E
                                                                      • Part of subcall function 00143A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,001425B3), ref: 00143A65
                                                                    • GetCaretPos.USER32(?), ref: 001716FF
                                                                    • ClientToScreen.USER32(00000000,?), ref: 0017174C
                                                                    • GetForegroundWindow.USER32 ref: 00171752
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                    • String ID:
                                                                    • API String ID: 2759813231-0
                                                                    • Opcode ID: 11d5158260d512a8e2ee9445368ea116cf4d799c68e2377427ff859eb60cb881
                                                                    • Instruction ID: 35594f694ba107c116d355b692f0798fd1a82b54bf26a7b4cf5fadb55c960140
                                                                    • Opcode Fuzzy Hash: 11d5158260d512a8e2ee9445368ea116cf4d799c68e2377427ff859eb60cb881
                                                                    • Instruction Fuzzy Hash: 85315271D00149AFD704DFAAC881CEEB7F9EF58304B548069E419E7212D7319E45CBA0
                                                                    APIs
                                                                      • Part of subcall function 000E7620: _wcslen.LIBCMT ref: 000E7625
                                                                    • _wcslen.LIBCMT ref: 0014DFCB
                                                                    • _wcslen.LIBCMT ref: 0014DFE2
                                                                    • _wcslen.LIBCMT ref: 0014E00D
                                                                    • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0014E018
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$ExtentPoint32Text
                                                                    • String ID:
                                                                    • API String ID: 3763101759-0
                                                                    • Opcode ID: 3ad4c0ec09dd44e3a005072f4f2ed898d78dce23417c10a3ec798c03e086ea33
                                                                    • Instruction ID: 1ce20734919b533bbffe8a5c3802402ca4db2b68d1eb18b5d6323549d25e04ba
                                                                    • Opcode Fuzzy Hash: 3ad4c0ec09dd44e3a005072f4f2ed898d78dce23417c10a3ec798c03e086ea33
                                                                    • Instruction Fuzzy Hash: B321B575900214AFCB20EFA8D981BBEB7F8EF59750F144065F905BB292D7B09E41CBA1
                                                                    APIs
                                                                    • CreateToolhelp32Snapshot.KERNEL32 ref: 0014D501
                                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 0014D50F
                                                                    • Process32NextW.KERNEL32(00000000,?), ref: 0014D52F
                                                                    • CloseHandle.KERNEL32(00000000), ref: 0014D5DC
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                    • String ID:
                                                                    • API String ID: 420147892-0
                                                                    • Opcode ID: a6febae02476d15604bd445dca69919747350d777c853f2f38e611d034052900
                                                                    • Instruction ID: ba5f72c2da8ccf13cb709f0a70568d8fe1ad3abfc665edeec61181e677b789dc
                                                                    • Opcode Fuzzy Hash: a6febae02476d15604bd445dca69919747350d777c853f2f38e611d034052900
                                                                    • Instruction Fuzzy Hash: 6331C2311083409FD304EF54D881AAFBBF8EF99344F50092DF585961B2EF719985CB92
                                                                    APIs
                                                                      • Part of subcall function 000F9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 000F9BB2
                                                                    • GetCursorPos.USER32(?), ref: 00179001
                                                                    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00137711,?,?,?,?,?), ref: 00179016
                                                                    • GetCursorPos.USER32(?), ref: 0017905E
                                                                    • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00137711,?,?,?), ref: 00179094
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                    • String ID:
                                                                    • API String ID: 2864067406-0
                                                                    • Opcode ID: 0b2a73add2ab6b29a5947f749f9d57ecbcdf57499a718b1c424175a6437b3d33
                                                                    • Instruction ID: b0801613a44fe8d68c10ad9a45f19a214dc3a1c395baaf9527565cbd938763df
                                                                    • Opcode Fuzzy Hash: 0b2a73add2ab6b29a5947f749f9d57ecbcdf57499a718b1c424175a6437b3d33
                                                                    • Instruction Fuzzy Hash: 8B217F35610018FFDB258F94C858EFA7BF9FB89350F148159F9099B261C7319990DBA0
                                                                    APIs
                                                                    • GetFileAttributesW.KERNEL32(?,0017CB68), ref: 0014D2FB
                                                                    • GetLastError.KERNEL32 ref: 0014D30A
                                                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 0014D319
                                                                    • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0017CB68), ref: 0014D376
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CreateDirectory$AttributesErrorFileLast
                                                                    • String ID:
                                                                    • API String ID: 2267087916-0
                                                                    • Opcode ID: 5fd8817b26589ee964e678f2431b8ea0a5435207c7de7bee23c26f2db039dcb5
                                                                    • Instruction ID: fbbad839d4bd573f032db5c381f460dce77f2a7bf00b5c2d1d322dd840ad1279
                                                                    • Opcode Fuzzy Hash: 5fd8817b26589ee964e678f2431b8ea0a5435207c7de7bee23c26f2db039dcb5
                                                                    • Instruction Fuzzy Hash: D2219FB05092019F8B10DF28D8818AA77E4BF56364F504A5DF499D32B2DB30DD85CB93
                                                                    APIs
                                                                      • Part of subcall function 00141014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0014102A
                                                                      • Part of subcall function 00141014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00141036
                                                                      • Part of subcall function 00141014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00141045
                                                                      • Part of subcall function 00141014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0014104C
                                                                      • Part of subcall function 00141014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00141062
                                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 001415BE
                                                                    • _memcmp.LIBVCRUNTIME ref: 001415E1
                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00141617
                                                                    • HeapFree.KERNEL32(00000000), ref: 0014161E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                                    • String ID:
                                                                    • API String ID: 1592001646-0
                                                                    • Opcode ID: 2f8a23997a91c6ef5c20e70ad9060cdcc2f8b535b31ef38ade902f434235717f
                                                                    • Instruction ID: a4927a8ce43ca1f2da34dde38ab5e4ebc84548f29e9543c0da2443abef5b23c9
                                                                    • Opcode Fuzzy Hash: 2f8a23997a91c6ef5c20e70ad9060cdcc2f8b535b31ef38ade902f434235717f
                                                                    • Instruction Fuzzy Hash: BA219A31E00208FFDF00DFA4C945BEEB7B8EF84354F098459E445AB261E770AA85CBA0
                                                                    APIs
                                                                    • GetWindowLongW.USER32(?,000000EC), ref: 0017280A
                                                                    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00172824
                                                                    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00172832
                                                                    • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00172840
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Long$AttributesLayered
                                                                    • String ID:
                                                                    • API String ID: 2169480361-0
                                                                    • Opcode ID: e0f7f7d0a4b9d9cb59148364255291d15722d1426a6327956564f093712c68fb
                                                                    • Instruction ID: 88bf8f6947e42c532898a6e354e60902f53ec9c7a10181b7247fd7cc3aee61f0
                                                                    • Opcode Fuzzy Hash: e0f7f7d0a4b9d9cb59148364255291d15722d1426a6327956564f093712c68fb
                                                                    • Instruction Fuzzy Hash: 7C21AF31608511AFD7189B24C845FAA7BA5AF95324F14815CF42A8B6E2CB72FC83CBD1
                                                                    APIs
                                                                      • Part of subcall function 00148D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,0014790A,?,000000FF,?,00148754,00000000,?,0000001C,?,?), ref: 00148D8C
                                                                      • Part of subcall function 00148D7D: lstrcpyW.KERNEL32(00000000,?), ref: 00148DB2
                                                                      • Part of subcall function 00148D7D: lstrcmpiW.KERNEL32(00000000,?,0014790A,?,000000FF,?,00148754,00000000,?,0000001C,?,?), ref: 00148DE3
                                                                    • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00148754,00000000,?,0000001C,?,?,00000000), ref: 00147923
                                                                    • lstrcpyW.KERNEL32(00000000,?), ref: 00147949
                                                                    • lstrcmpiW.KERNEL32(00000002,cdecl,?,00148754,00000000,?,0000001C,?,?,00000000), ref: 00147984
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: lstrcmpilstrcpylstrlen
                                                                    • String ID: cdecl
                                                                    • API String ID: 4031866154-3896280584
                                                                    • Opcode ID: 77c7fb520eb164a5728151684705ca002750052ae2c0fcb5faf9050496077124
                                                                    • Instruction ID: 6432c1c01889fa4db9773b94f1bb78df7751d94bad87ca68c9c3c0ebb7b0f29b
                                                                    • Opcode Fuzzy Hash: 77c7fb520eb164a5728151684705ca002750052ae2c0fcb5faf9050496077124
                                                                    • Instruction Fuzzy Hash: AF11263A200342ABCB15AF34C844D7A77A9FF95364B40402AF906C72B4EF319841C7A1
                                                                    APIs
                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00177D0B
                                                                    • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00177D2A
                                                                    • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00177D42
                                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0015B7AD,00000000), ref: 00177D6B
                                                                      • Part of subcall function 000F9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 000F9BB2
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Window$Long
                                                                    • String ID:
                                                                    • API String ID: 847901565-0
                                                                    • Opcode ID: 5424f9f46459e137ce1df4bbe168c46f53cf95c533605bd139ecf7357ecd151e
                                                                    • Instruction ID: 66c9712927b126583affd501524fa5442bea2d3f404e572bf30514cd45c5d7b8
                                                                    • Opcode Fuzzy Hash: 5424f9f46459e137ce1df4bbe168c46f53cf95c533605bd139ecf7357ecd151e
                                                                    • Instruction Fuzzy Hash: 7C11AF31604655AFCB209FA9CC04AA63BB5BF49364F168728F83DD72F0D73199A0CB90
                                                                    APIs
                                                                    • SendMessageW.USER32(?,00001060,?,00000004), ref: 001756BB
                                                                    • _wcslen.LIBCMT ref: 001756CD
                                                                    • _wcslen.LIBCMT ref: 001756D8
                                                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00175816
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend_wcslen
                                                                    • String ID:
                                                                    • API String ID: 455545452-0
                                                                    • Opcode ID: de80f76472c7a5284bc8dce4c37b0b758c2c2a536c1842f994c970175af5ce98
                                                                    • Instruction ID: 43700a5995dc99a82fcae9072a31eda8453ec67a553ed26c9abe5c98100aec63
                                                                    • Opcode Fuzzy Hash: de80f76472c7a5284bc8dce4c37b0b758c2c2a536c1842f994c970175af5ce98
                                                                    • Instruction Fuzzy Hash: 3511D675A00608A6DB209F61CC85AEE777CFF14764F50C02AFA1DD6081E7F0D980CB60
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 234015fee35d76f8293b2c41df1f4860aee6b37d045a3c22c521d3c8b77b6d13
                                                                    • Instruction ID: b4f2bca8e91f4126783e016b58d7b4ec629d0f64732f2b485d3660021605256b
                                                                    • Opcode Fuzzy Hash: 234015fee35d76f8293b2c41df1f4860aee6b37d045a3c22c521d3c8b77b6d13
                                                                    • Instruction Fuzzy Hash: 2A01A2B2209A1A7EFA1926B87CC5FABA65CDF513B8B310339F625511D2DB708CD04160
                                                                    APIs
                                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 00141A47
                                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00141A59
                                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00141A6F
                                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00141A8A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID:
                                                                    • API String ID: 3850602802-0
                                                                    • Opcode ID: 1e9e27b8990d9c39b0167d4b6affae4a55e03a1b4fdbad79b0cf177455e84f48
                                                                    • Instruction ID: 7f34bfcba3ca7ca1327b7331d95f488ba4f60c82b9af33df52450e2dd5ba58fe
                                                                    • Opcode Fuzzy Hash: 1e9e27b8990d9c39b0167d4b6affae4a55e03a1b4fdbad79b0cf177455e84f48
                                                                    • Instruction Fuzzy Hash: 54113C3AD01219FFEB10DBA4CD85FADBB79EB04750F200495E604B7290D7716E90DB94
                                                                    APIs
                                                                    • GetCurrentThreadId.KERNEL32 ref: 0014E1FD
                                                                    • MessageBoxW.USER32(?,?,?,?), ref: 0014E230
                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 0014E246
                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0014E24D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                    • String ID:
                                                                    • API String ID: 2880819207-0
                                                                    • Opcode ID: 6af43c7bfef21d607a7bcd0c1779fd1ba90fd4579602ad99f478c88e9ffa9264
                                                                    • Instruction ID: b38916339c995665393525cc24e60e35dbbf8941d079afb809d8989b3cfcf029
                                                                    • Opcode Fuzzy Hash: 6af43c7bfef21d607a7bcd0c1779fd1ba90fd4579602ad99f478c88e9ffa9264
                                                                    • Instruction Fuzzy Hash: FE110876904214BBC7019BA89C05E9F7FEDBB45320F414329F819E36A0D7B0898087A0
                                                                    APIs
                                                                    • CreateThread.KERNEL32(00000000,?,0010CFF9,00000000,00000004,00000000), ref: 0010D218
                                                                    • GetLastError.KERNEL32 ref: 0010D224
                                                                    • __dosmaperr.LIBCMT ref: 0010D22B
                                                                    • ResumeThread.KERNEL32(00000000), ref: 0010D249
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                                    • String ID:
                                                                    • API String ID: 173952441-0
                                                                    • Opcode ID: 2eb0f05f17c5a865a4205946cc27e738117df33d5094f63fa647fdf5a540a82f
                                                                    • Instruction ID: af47b6da2c73ff088fc5dc64172fd815094fa3635c8bd1d31f34eef071cb0511
                                                                    • Opcode Fuzzy Hash: 2eb0f05f17c5a865a4205946cc27e738117df33d5094f63fa647fdf5a540a82f
                                                                    • Instruction Fuzzy Hash: B101F936805204BBD7216BE5EC05BAF7A69EF91730F104219F965961D0CFF0C981C7E0
                                                                    APIs
                                                                      • Part of subcall function 000F9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 000F9BB2
                                                                    • GetClientRect.USER32(?,?), ref: 00179F31
                                                                    • GetCursorPos.USER32(?), ref: 00179F3B
                                                                    • ScreenToClient.USER32(?,?), ref: 00179F46
                                                                    • DefDlgProcW.USER32(?,00000020,?,00000000,?,?,?), ref: 00179F7A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Client$CursorLongProcRectScreenWindow
                                                                    • String ID:
                                                                    • API String ID: 4127811313-0
                                                                    • Opcode ID: f3444c807d7d745e9e609c8ba98b44768760550bc4fdc76c909f0c48ef3c814e
                                                                    • Instruction ID: 1b9fb42716390304416e76b4caf9b136adf32616a88ac387593b455138c4c718
                                                                    • Opcode Fuzzy Hash: f3444c807d7d745e9e609c8ba98b44768760550bc4fdc76c909f0c48ef3c814e
                                                                    • Instruction Fuzzy Hash: 74114532A0051ABBDB10EFA8D8899EE7BB9FB05311F408455F905E3140D730BAC5CBE1
                                                                    APIs
                                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 000E604C
                                                                    • GetStockObject.GDI32(00000011), ref: 000E6060
                                                                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 000E606A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CreateMessageObjectSendStockWindow
                                                                    • String ID:
                                                                    • API String ID: 3970641297-0
                                                                    • Opcode ID: ac0ff2b110d0112159df5f1dfbd1abe085f983e193ece955ea097b8d4c1f3771
                                                                    • Instruction ID: 083ada10d6531b6b9ca85e9226cc72eda3d04978adb48e2ccffc613ca30d50bd
                                                                    • Opcode Fuzzy Hash: ac0ff2b110d0112159df5f1dfbd1abe085f983e193ece955ea097b8d4c1f3771
                                                                    • Instruction Fuzzy Hash: EF116172501558BFEF565F95AC54EEB7BB9EF183A4F040216FA1462110D732ACA0DB90
                                                                    APIs
                                                                    • ___BuildCatchObject.LIBVCRUNTIME ref: 00103B56
                                                                      • Part of subcall function 00103AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00103AD2
                                                                      • Part of subcall function 00103AA3: ___AdjustPointer.LIBCMT ref: 00103AED
                                                                    • _UnwindNestedFrames.LIBCMT ref: 00103B6B
                                                                    • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00103B7C
                                                                    • CallCatchBlock.LIBVCRUNTIME ref: 00103BA4
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                    • String ID:
                                                                    • API String ID: 737400349-0
                                                                    • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                    • Instruction ID: d72ebd49bd2e4d95381314a9a6e84a991be2835c129bce5d23be0461324989df
                                                                    • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                    • Instruction Fuzzy Hash: A2014072100148BBDF115E95CC42EEB3F6DEF58758F044414FE9896161C772D961EBA0
                                                                    APIs
                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,000E13C6,00000000,00000000,?,0011301A,000E13C6,00000000,00000000,00000000,?,0011328B,00000006,FlsSetValue), ref: 001130A5
                                                                    • GetLastError.KERNEL32(?,0011301A,000E13C6,00000000,00000000,00000000,?,0011328B,00000006,FlsSetValue,00182290,FlsSetValue,00000000,00000364,?,00112E46), ref: 001130B1
                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0011301A,000E13C6,00000000,00000000,00000000,?,0011328B,00000006,FlsSetValue,00182290,FlsSetValue,00000000), ref: 001130BF
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: LibraryLoad$ErrorLast
                                                                    • String ID:
                                                                    • API String ID: 3177248105-0
                                                                    • Opcode ID: 036211bad3518542d08adfee1d4ececf2dd1616dbc422ef1729f3d9d71d10fa0
                                                                    • Instruction ID: ee0869c6d61cb86abb93c9976c7dbee5fb026f78facd6a4ab173c206ec546e72
                                                                    • Opcode Fuzzy Hash: 036211bad3518542d08adfee1d4ececf2dd1616dbc422ef1729f3d9d71d10fa0
                                                                    • Instruction Fuzzy Hash: DE01F732301632ABCB354B799C449AB7BE8AF0DB61B110634F929E3544DB21DAC1C7E0
                                                                    APIs
                                                                    • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 0014747F
                                                                    • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00147497
                                                                    • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 001474AC
                                                                    • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 001474CA
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Type$Register$FileLoadModuleNameUser
                                                                    • String ID:
                                                                    • API String ID: 1352324309-0
                                                                    • Opcode ID: c4832b4c899ae91f1e5ac9323f6b0be2bf364faf89fd8b554bba09e810ca3638
                                                                    • Instruction ID: ee146c39430ad01d54d9daeaea5c865c9c0e8398d26cc51b250365047218f777
                                                                    • Opcode Fuzzy Hash: c4832b4c899ae91f1e5ac9323f6b0be2bf364faf89fd8b554bba09e810ca3638
                                                                    • Instruction Fuzzy Hash: 4511ADB1209310ABE7208F14DC08BA27BFCEB00B10F14856DA61AD65A1D7B0E984DBA0
                                                                    APIs
                                                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0014ACD3,?,00008000), ref: 0014B0C4
                                                                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0014ACD3,?,00008000), ref: 0014B0E9
                                                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0014ACD3,?,00008000), ref: 0014B0F3
                                                                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0014ACD3,?,00008000), ref: 0014B126
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CounterPerformanceQuerySleep
                                                                    • String ID:
                                                                    • API String ID: 2875609808-0
                                                                    • Opcode ID: 270ba9436cdc82beb3a32f4d2c5db0bc3f45c7f4c924206f6f07c8ec72e42407
                                                                    • Instruction ID: 269b8f18a15d5087a516c335cc56549da43a1a5ad761c64025d7e8dd2f8328a4
                                                                    • Opcode Fuzzy Hash: 270ba9436cdc82beb3a32f4d2c5db0bc3f45c7f4c924206f6f07c8ec72e42407
                                                                    • Instruction Fuzzy Hash: 38115B71C0552CEBCF08AFE4E9A86FEBB78FF09711F114099E941B2191CB309690CB91
                                                                    APIs
                                                                    • GetWindowRect.USER32(?,?), ref: 00177E33
                                                                    • ScreenToClient.USER32(?,?), ref: 00177E4B
                                                                    • ScreenToClient.USER32(?,?), ref: 00177E6F
                                                                    • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00177E8A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ClientRectScreen$InvalidateWindow
                                                                    • String ID:
                                                                    • API String ID: 357397906-0
                                                                    • Opcode ID: 1a3bdd63a298da0d42f44aa358b53b462324cc46299eabec6f823937d9e6040b
                                                                    • Instruction ID: 0a7ed6bed726fcafa9720a9a053b26930870032a6339b9d457b259e1a03a9b2d
                                                                    • Opcode Fuzzy Hash: 1a3bdd63a298da0d42f44aa358b53b462324cc46299eabec6f823937d9e6040b
                                                                    • Instruction Fuzzy Hash: F21186B9D0024AAFDB41CF98C8849EEBBF5FF08310F108056E915E3610D734AA94CF90
                                                                    APIs
                                                                    • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00142DC5
                                                                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 00142DD6
                                                                    • GetCurrentThreadId.KERNEL32 ref: 00142DDD
                                                                    • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00142DE4
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                    • String ID:
                                                                    • API String ID: 2710830443-0
                                                                    • Opcode ID: a254073ba56e186e38500d141a96f3fbc11999f1ebb9df8cbf0c1dfeb37743e6
                                                                    • Instruction ID: ab3ec4f259cc6b395380d9ad2c9da7d9352256805dc2c9dc352745ad74dfe8d2
                                                                    • Opcode Fuzzy Hash: a254073ba56e186e38500d141a96f3fbc11999f1ebb9df8cbf0c1dfeb37743e6
                                                                    • Instruction Fuzzy Hash: 54E0ED71541624BAD7201BA29C4DEEB7E6CEB56BB1F800119F509D15909BA589C1C6F0
                                                                    APIs
                                                                      • Part of subcall function 000F9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 000F9693
                                                                      • Part of subcall function 000F9639: SelectObject.GDI32(?,00000000), ref: 000F96A2
                                                                      • Part of subcall function 000F9639: BeginPath.GDI32(?), ref: 000F96B9
                                                                      • Part of subcall function 000F9639: SelectObject.GDI32(?,00000000), ref: 000F96E2
                                                                    • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00178887
                                                                    • LineTo.GDI32(?,?,?), ref: 00178894
                                                                    • EndPath.GDI32(?), ref: 001788A4
                                                                    • StrokePath.GDI32(?), ref: 001788B2
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                    • String ID:
                                                                    • API String ID: 1539411459-0
                                                                    • Opcode ID: dd248918bf355058820583f35693b8b59b8e96800bfcb3cd730a280c3aefdf54
                                                                    • Instruction ID: d28d8cb22436fdebc173ba2b0dc2b4271ad39c10a6dfa83c92a2f35e41294a41
                                                                    • Opcode Fuzzy Hash: dd248918bf355058820583f35693b8b59b8e96800bfcb3cd730a280c3aefdf54
                                                                    • Instruction Fuzzy Hash: B8F05E3A041258FADB126F94AC0DFCE3F69AF0A310F448104FB15654E2C7755591DFE5
                                                                    APIs
                                                                    • GetSysColor.USER32(00000008), ref: 000F98CC
                                                                    • SetTextColor.GDI32(?,?), ref: 000F98D6
                                                                    • SetBkMode.GDI32(?,00000001), ref: 000F98E9
                                                                    • GetStockObject.GDI32(00000005), ref: 000F98F1
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Color$ModeObjectStockText
                                                                    • String ID:
                                                                    • API String ID: 4037423528-0
                                                                    • Opcode ID: e0772469ccb1afd32da06ecac3e477f1f433a1c0a6fe4cee2b76caad9507c5bd
                                                                    • Instruction ID: 2385c1c266ae24dc4cdee045017812eabe1edac82e7e82b97aafe5d9134c054f
                                                                    • Opcode Fuzzy Hash: e0772469ccb1afd32da06ecac3e477f1f433a1c0a6fe4cee2b76caad9507c5bd
                                                                    • Instruction Fuzzy Hash: 46E06D31244284EBDB215B78AC09BE83F61AB52336F14822DF6FA584E1C3B246C09B10
                                                                    APIs
                                                                    • GetCurrentThread.KERNEL32 ref: 00141634
                                                                    • OpenThreadToken.ADVAPI32(00000000,?,?,?,001411D9), ref: 0014163B
                                                                    • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,001411D9), ref: 00141648
                                                                    • OpenProcessToken.ADVAPI32(00000000,?,?,?,001411D9), ref: 0014164F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentOpenProcessThreadToken
                                                                    • String ID:
                                                                    • API String ID: 3974789173-0
                                                                    • Opcode ID: 150ca14f20c06a7499e8a934ac65e90276a5455c98be4bc58183d1b0153dc845
                                                                    • Instruction ID: 639cab8a0b76fd1b50769e372537eecb31090509e6e2366ff1b868aeed0b42bc
                                                                    • Opcode Fuzzy Hash: 150ca14f20c06a7499e8a934ac65e90276a5455c98be4bc58183d1b0153dc845
                                                                    • Instruction Fuzzy Hash: 19E08C36602211EBD7201FA0AE0DB873B7CAF54792F15880CF24AD90A0E77484C0CBE4
                                                                    APIs
                                                                    • GetDesktopWindow.USER32 ref: 0013D858
                                                                    • GetDC.USER32(00000000), ref: 0013D862
                                                                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0013D882
                                                                    • ReleaseDC.USER32(?), ref: 0013D8A3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CapsDesktopDeviceReleaseWindow
                                                                    • String ID:
                                                                    • API String ID: 2889604237-0
                                                                    • Opcode ID: 81a9d5d9dbae0a6ec7946733cd73688509221c30ca035285cacc1ebfee8b1e38
                                                                    • Instruction ID: cf39250026b767f00d24f1d5859545affa10e729d56aae77973a84856239f620
                                                                    • Opcode Fuzzy Hash: 81a9d5d9dbae0a6ec7946733cd73688509221c30ca035285cacc1ebfee8b1e38
                                                                    • Instruction Fuzzy Hash: 6DE01AB4800204DFCB41AFA0E848A6DBBB2FB08310F208059F80AE7750CB3859C1AF80
                                                                    APIs
                                                                    • GetDesktopWindow.USER32 ref: 0013D86C
                                                                    • GetDC.USER32(00000000), ref: 0013D876
                                                                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0013D882
                                                                    • ReleaseDC.USER32(?), ref: 0013D8A3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CapsDesktopDeviceReleaseWindow
                                                                    • String ID:
                                                                    • API String ID: 2889604237-0
                                                                    • Opcode ID: 0134d8476dc5d8338262e96d8a45ef34a15d7dbc9d49f370607cfb3ada93179f
                                                                    • Instruction ID: 8f61553948aa0e42252a9b3c3576497196671dedb7ef486827b6f5d7d4caa9e9
                                                                    • Opcode Fuzzy Hash: 0134d8476dc5d8338262e96d8a45ef34a15d7dbc9d49f370607cfb3ada93179f
                                                                    • Instruction Fuzzy Hash: 6DE09A75800204DFCB51AFA1D84866DBBB5BB08311B148459F95AE7750DB395981AF90
                                                                    APIs
                                                                      • Part of subcall function 000E7620: _wcslen.LIBCMT ref: 000E7625
                                                                    • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00154ED4
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Connection_wcslen
                                                                    • String ID: *$LPT
                                                                    • API String ID: 1725874428-3443410124
                                                                    • Opcode ID: 50c057e65d7e59e0eeed87d690deb59b9e137b106286d3111798be58c55f94c8
                                                                    • Instruction ID: d9bbb08e1740f85844457b3e7c4f70e38a37c7f5b7ff757872fa12837330b226
                                                                    • Opcode Fuzzy Hash: 50c057e65d7e59e0eeed87d690deb59b9e137b106286d3111798be58c55f94c8
                                                                    • Instruction Fuzzy Hash: D8915F75A00244DFCB14DF58C484EAABBF1BF44308F198099E85A9F3A2D775ED89CB91
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: #
                                                                    • API String ID: 0-1885708031
                                                                    • Opcode ID: a3ff3591377be16136da898227d673fa0aaf1a9e44870ea1821c8b8e30698e86
                                                                    • Instruction ID: f2eb93e6efb17880b1169175af9f965b6a84b08867b3a57a0cfaf5b45d8bb69c
                                                                    • Opcode Fuzzy Hash: a3ff3591377be16136da898227d673fa0aaf1a9e44870ea1821c8b8e30698e86
                                                                    • Instruction Fuzzy Hash: F851123590038ADFDB29DF68C481AFE7BE4EF55310F244059E991AB2E1E7349D82DB90
                                                                    APIs
                                                                    • Sleep.KERNEL32(00000000), ref: 000FF2A2
                                                                    • GlobalMemoryStatusEx.KERNEL32(?), ref: 000FF2BB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: GlobalMemorySleepStatus
                                                                    • String ID: @
                                                                    • API String ID: 2783356886-2766056989
                                                                    • Opcode ID: efb54d6f29b2ad0d29ec8f1e2e45cfdd91153e5eeeb2398b6748d1c9016d8293
                                                                    • Instruction ID: b6529731c4d37cd4cf502e14d545c969c41ab312b1f12c8fb89e581c2edfd920
                                                                    • Opcode Fuzzy Hash: efb54d6f29b2ad0d29ec8f1e2e45cfdd91153e5eeeb2398b6748d1c9016d8293
                                                                    • Instruction Fuzzy Hash: C75128714087859FE320AF11E886BABBBF8FB84300F81485DF19951196EB718569CB66
                                                                    APIs
                                                                    • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 001657E0
                                                                    • _wcslen.LIBCMT ref: 001657EC
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: BuffCharUpper_wcslen
                                                                    • String ID: CALLARGARRAY
                                                                    • API String ID: 157775604-1150593374
                                                                    • Opcode ID: 336a01baf20bad88b8701344965223f30678e4d93ecc141bfaaac69fc3310308
                                                                    • Instruction ID: 9344e1aacb9de406b21133a5e7bb76d43c2e2652cfeff256526c183ead6b138c
                                                                    • Opcode Fuzzy Hash: 336a01baf20bad88b8701344965223f30678e4d93ecc141bfaaac69fc3310308
                                                                    • Instruction Fuzzy Hash: 80419171E002099FCB14DFAAC8819FEBBBAFF59324F544069E505A7292E7709D91CB90
                                                                    APIs
                                                                    • _wcslen.LIBCMT ref: 0015D130
                                                                    • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 0015D13A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CrackInternet_wcslen
                                                                    • String ID: |
                                                                    • API String ID: 596671847-2343686810
                                                                    • Opcode ID: cd87cfff64160869b73d4bed26b18f146162e7f02e6d9a1a15073e769e44d706
                                                                    • Instruction ID: c26500f886c34ad17f60948bb6eeb62f45d4f458f645f2660984a17aeef8536a
                                                                    • Opcode Fuzzy Hash: cd87cfff64160869b73d4bed26b18f146162e7f02e6d9a1a15073e769e44d706
                                                                    • Instruction Fuzzy Hash: 8E311B71D00109AFCF15EFA5DC85AEE7FB9FF18340F000059E815B6262DB31A946CB60
                                                                    APIs
                                                                    • DestroyWindow.USER32(?,?,?,?), ref: 00173621
                                                                    • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 0017365C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Window$DestroyMove
                                                                    • String ID: static
                                                                    • API String ID: 2139405536-2160076837
                                                                    • Opcode ID: 2a84207ae0713abbb3227ca4d3ddbd2626d0153a265ab62944ccac7919d9b81c
                                                                    • Instruction ID: b3b52d72401e0e5cdfb8711827bbbeb20e610615583f0038670cc0b50f8be79b
                                                                    • Opcode Fuzzy Hash: 2a84207ae0713abbb3227ca4d3ddbd2626d0153a265ab62944ccac7919d9b81c
                                                                    • Instruction Fuzzy Hash: 38318B71100204AEDB149F28DC80EFB73B9FF98760F10C619F9A997280DB31AE81E760
                                                                    APIs
                                                                    • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 0017461F
                                                                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00174634
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID: '
                                                                    • API String ID: 3850602802-1997036262
                                                                    • Opcode ID: 0d77d067e01fce49b54a5d0a9ab5e3c3672af700ee760851ce676fe897d707a8
                                                                    • Instruction ID: ef382d2e829bc34d3a571adb514371022279cdd839cdb029bfabec9f741afc80
                                                                    • Opcode Fuzzy Hash: 0d77d067e01fce49b54a5d0a9ab5e3c3672af700ee760851ce676fe897d707a8
                                                                    • Instruction Fuzzy Hash: 44311874A01309AFDB14CFA9C991BDA7BB5FF49300F15816AE909AB351D770EA41CF90
                                                                    APIs
                                                                    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0017327C
                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00173287
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: MessageSend
                                                                    • String ID: Combobox
                                                                    • API String ID: 3850602802-2096851135
                                                                    • Opcode ID: f3e8f8898cf009e43215913092ff416c92750aa0f5276bbf34b988010825bdc8
                                                                    • Instruction ID: 857577fe91c1e128668585a9964df44cfd0ea6b157b9793110a2d0ec265ea430
                                                                    • Opcode Fuzzy Hash: f3e8f8898cf009e43215913092ff416c92750aa0f5276bbf34b988010825bdc8
                                                                    • Instruction Fuzzy Hash: 7411B2713002087FEF259E54DC84EFB377AEB983A4F118128F92CA7292D7319D51A760
                                                                    APIs
                                                                      • Part of subcall function 000E600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 000E604C
                                                                      • Part of subcall function 000E600E: GetStockObject.GDI32(00000011), ref: 000E6060
                                                                      • Part of subcall function 000E600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 000E606A
                                                                    • GetWindowRect.USER32(00000000,?), ref: 0017377A
                                                                    • GetSysColor.USER32(00000012), ref: 00173794
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                    • String ID: static
                                                                    • API String ID: 1983116058-2160076837
                                                                    • Opcode ID: a8e4fb7d8240d13d1855c0b652cbf51555f6fc82c05e5fd5384f18c57fba4807
                                                                    • Instruction ID: a522db3da00fe8f62619e50335f0a93df89cfa97eb77323ff01e2e1c0b7201aa
                                                                    • Opcode Fuzzy Hash: a8e4fb7d8240d13d1855c0b652cbf51555f6fc82c05e5fd5384f18c57fba4807
                                                                    • Instruction Fuzzy Hash: 3A113AB2610209AFDF05DFB8CC45EEA7BB8FB08354F014918F969E3250D735E9519B50
                                                                    APIs
                                                                    • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0015CD7D
                                                                    • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 0015CDA6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Internet$OpenOption
                                                                    • String ID: <local>
                                                                    • API String ID: 942729171-4266983199
                                                                    • Opcode ID: edc972bb7f24f7e41ab6035d0d5e0e7388d267ec59ec52076350ba6473e3ec80
                                                                    • Instruction ID: 2c702f9519160ec978aa1f3c69ae235c2bbaa2b1a222e57a9c8f8e30caf7c8da
                                                                    • Opcode Fuzzy Hash: edc972bb7f24f7e41ab6035d0d5e0e7388d267ec59ec52076350ba6473e3ec80
                                                                    • Instruction Fuzzy Hash: 3E11A375205735BED7284EA68C45FE7BEB8EB127A5F00422AB929C6080D7609888D6F0
                                                                    APIs
                                                                    • GetWindowTextLengthW.USER32(00000000), ref: 001734AB
                                                                    • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 001734BA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: LengthMessageSendTextWindow
                                                                    • String ID: edit
                                                                    • API String ID: 2978978980-2167791130
                                                                    • Opcode ID: b6128af838ad2fd7978eda4cd93722ecc02724e3f0951232cc67a8f1c056d63b
                                                                    • Instruction ID: ce3dd5ebd2d382e47473e014ddcddf5e1c2f99078481e46ffb64d911bc4204ea
                                                                    • Opcode Fuzzy Hash: b6128af838ad2fd7978eda4cd93722ecc02724e3f0951232cc67a8f1c056d63b
                                                                    • Instruction Fuzzy Hash: 2A114F71100108AFEB164E64DC44AEB377AEB15774F508724FA7A971D0C772DD91A750
                                                                    APIs
                                                                      • Part of subcall function 000E9CB3: _wcslen.LIBCMT ref: 000E9CBD
                                                                    • CharUpperBuffW.USER32(?,?,?), ref: 00146CB6
                                                                    • _wcslen.LIBCMT ref: 00146CC2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen$BuffCharUpper
                                                                    • String ID: STOP
                                                                    • API String ID: 1256254125-2411985666
                                                                    • Opcode ID: 358f8419d90269baa354926a7c231c13943fcc617a6cb011e940e1bdb2cdd240
                                                                    • Instruction ID: 803207b543994df75554f25067fb4dee7d742cd89d5e28aef32eac83b236d11c
                                                                    • Opcode Fuzzy Hash: 358f8419d90269baa354926a7c231c13943fcc617a6cb011e940e1bdb2cdd240
                                                                    • Instruction Fuzzy Hash: 15010432A005268BCB20AFFDCC808BF73B5EF667287500528E892A21A1EB31DC40C651
                                                                    APIs
                                                                      • Part of subcall function 000E9CB3: _wcslen.LIBCMT ref: 000E9CBD
                                                                      • Part of subcall function 00143CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00143CCA
                                                                    • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00141D4C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ClassMessageNameSend_wcslen
                                                                    • String ID: ComboBox$ListBox
                                                                    • API String ID: 624084870-1403004172
                                                                    • Opcode ID: ca2dd83014c888a9ab32696e8162ba633c49a4e799b9b68b7697e9834c2f22f5
                                                                    • Instruction ID: 93918f268cc2b10c586f0c38b4cea92f2cf840c15e4a34abd873827e404f33c5
                                                                    • Opcode Fuzzy Hash: ca2dd83014c888a9ab32696e8162ba633c49a4e799b9b68b7697e9834c2f22f5
                                                                    • Instruction Fuzzy Hash: 01012875A40214BBCB18FFE0CD55DFE7369EB12350B10091AF836673E2EB3059498660
                                                                    APIs
                                                                      • Part of subcall function 000E9CB3: _wcslen.LIBCMT ref: 000E9CBD
                                                                      • Part of subcall function 00143CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00143CCA
                                                                    • SendMessageW.USER32(?,00000180,00000000,?), ref: 00141C46
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ClassMessageNameSend_wcslen
                                                                    • String ID: ComboBox$ListBox
                                                                    • API String ID: 624084870-1403004172
                                                                    • Opcode ID: d563a710821470bc7eb66db5369783bbf3f772c6712a2bd55c65b015b5adb85a
                                                                    • Instruction ID: 8c4e5807b624bd43df536fffc808837527919229cb9271271f0252480c0aff07
                                                                    • Opcode Fuzzy Hash: d563a710821470bc7eb66db5369783bbf3f772c6712a2bd55c65b015b5adb85a
                                                                    • Instruction Fuzzy Hash: 3201A7756811187ACB18FB90CE92AFF77A99B12340F540019B816772A2EB209F4986B1
                                                                    APIs
                                                                      • Part of subcall function 000E9CB3: _wcslen.LIBCMT ref: 000E9CBD
                                                                      • Part of subcall function 00143CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00143CCA
                                                                    • SendMessageW.USER32(?,00000182,?,00000000), ref: 00141CC8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ClassMessageNameSend_wcslen
                                                                    • String ID: ComboBox$ListBox
                                                                    • API String ID: 624084870-1403004172
                                                                    • Opcode ID: 4393375b4eb3e09fac7fea0a65c9a1af4ee34a98c9c627d5d80e53da55bdacd0
                                                                    • Instruction ID: d37a26b13d1e37908b170105a716cb5a8162bb6246c88f96c067bacacb24b143
                                                                    • Opcode Fuzzy Hash: 4393375b4eb3e09fac7fea0a65c9a1af4ee34a98c9c627d5d80e53da55bdacd0
                                                                    • Instruction Fuzzy Hash: DD01D6756801187BCB18FBA1CF82AFE73A99B12340F940019B802732A2FB209F49C671
                                                                    APIs
                                                                      • Part of subcall function 000E9CB3: _wcslen.LIBCMT ref: 000E9CBD
                                                                      • Part of subcall function 00143CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00143CCA
                                                                    • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00141DD3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ClassMessageNameSend_wcslen
                                                                    • String ID: ComboBox$ListBox
                                                                    • API String ID: 624084870-1403004172
                                                                    • Opcode ID: 91f9cb778600f997d20ca38585be6a895075e5d9c033a08568472b304f4cc6e5
                                                                    • Instruction ID: 52f62fcd41ec1b44d9277fb8753e158488f54838ca5996a39f63d43b8e5f195e
                                                                    • Opcode Fuzzy Hash: 91f9cb778600f997d20ca38585be6a895075e5d9c033a08568472b304f4cc6e5
                                                                    • Instruction Fuzzy Hash: 43F0F4B1F402147ACB18F7E4CD96BFE7378AB02350F440919B822732E2EB6059498260
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: _wcslen
                                                                    • String ID: 3, 3, 16, 1
                                                                    • API String ID: 176396367-3042988571
                                                                    • Opcode ID: 12799d00d44bea2b7ccf1a25b953104a0a93bf1bd0485bfc04773a632b23585c
                                                                    • Instruction ID: 79023715ef9816ad4ab8df994eccac8c6915fd174bf568286be95eafd1e644c7
                                                                    • Opcode Fuzzy Hash: 12799d00d44bea2b7ccf1a25b953104a0a93bf1bd0485bfc04773a632b23585c
                                                                    • Instruction Fuzzy Hash: 07E02B5620532011D2311279ACC5A7F5689DFDDB54710183BFEC1C22E6EFD48DA193A0
                                                                    APIs
                                                                    • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00140B23
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Message
                                                                    • String ID: AutoIt$Error allocating memory.
                                                                    • API String ID: 2030045667-4017498283
                                                                    • Opcode ID: 51b88f500ef8e91e59a5edcf023067173924d0e9c08a6c3b9a5d83ef4827126c
                                                                    • Instruction ID: 4e5f3bbce9a0ea78679e47fe5db3e38cecea840392807dc1a54cf3454d31a7d4
                                                                    • Opcode Fuzzy Hash: 51b88f500ef8e91e59a5edcf023067173924d0e9c08a6c3b9a5d83ef4827126c
                                                                    • Instruction Fuzzy Hash: C4E0DF322883082AD2143695BC43FD97A958F09B64F10446EFB8CA98C38BE2249056E9
                                                                    APIs
                                                                      • Part of subcall function 000FF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00100D71,?,?,?,000E100A), ref: 000FF7CE
                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,000E100A), ref: 00100D75
                                                                    • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,000E100A), ref: 00100D84
                                                                    Strings
                                                                    • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00100D7F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                                    • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                    • API String ID: 55579361-631824599
                                                                    • Opcode ID: ce537ae12d87d961c8cb185cfd9b9fa8fb3841abe782b8b81cda3f81b7c85cc2
                                                                    • Instruction ID: f216a7e9ce37f479468b08b5060bca89717c0f654769497746f8c0868824aba3
                                                                    • Opcode Fuzzy Hash: ce537ae12d87d961c8cb185cfd9b9fa8fb3841abe782b8b81cda3f81b7c85cc2
                                                                    • Instruction Fuzzy Hash: BCE06D742007418BD3219FB8E808352BBF1AF04740F01892DE48AC6A92EBF4E5C48BA1
                                                                    APIs
                                                                    • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 0015302F
                                                                    • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00153044
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: Temp$FileNamePath
                                                                    • String ID: aut
                                                                    • API String ID: 3285503233-3010740371
                                                                    • Opcode ID: 17515ca75fe33c3f7644e0536c8144842d9895343bbb9dcbe166e1912dac07ff
                                                                    • Instruction ID: 05723c6e87664678b3dcdbda9248a9b5421c34dfc99b040f24f853120c50c037
                                                                    • Opcode Fuzzy Hash: 17515ca75fe33c3f7644e0536c8144842d9895343bbb9dcbe166e1912dac07ff
                                                                    • Instruction Fuzzy Hash: 8AD05E7650032867DB20A7A4AC0EFCB7A7CDB05750F0002A1B659E2092DAB09AC4CBD0
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: LocalTime
                                                                    • String ID: %.3d$X64
                                                                    • API String ID: 481472006-1077770165
                                                                    • Opcode ID: 0fc34c88ac90119f66e02a1a82a20c70f6e21c5a2e3894c205048d3b5136b338
                                                                    • Instruction ID: be72c51833ef686890e67c7026ab32ba404e2a707b22bf942c778fd5aa2c2210
                                                                    • Opcode Fuzzy Hash: 0fc34c88ac90119f66e02a1a82a20c70f6e21c5a2e3894c205048d3b5136b338
                                                                    • Instruction Fuzzy Hash: 80D01261808109E9CB9496D0FC459BBB37CBF18341F618452F906E1041D734C6486761
                                                                    APIs
                                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0017232C
                                                                    • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 0017233F
                                                                      • Part of subcall function 0014E97B: Sleep.KERNELBASE ref: 0014E9F3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: FindMessagePostSleepWindow
                                                                    • String ID: Shell_TrayWnd
                                                                    • API String ID: 529655941-2988720461
                                                                    • Opcode ID: a87e1fccfa922217db24bb68b6e97c4869c9abac974bad2637b95fb5b978cdec
                                                                    • Instruction ID: 67a1faeaccc1b1d256f9d6cf7d0c1597fd76939abc2fb7bf261ed372cc6fbf13
                                                                    • Opcode Fuzzy Hash: a87e1fccfa922217db24bb68b6e97c4869c9abac974bad2637b95fb5b978cdec
                                                                    • Instruction Fuzzy Hash: D6D012363D4310B7E664B770DC4FFC67A64AB14B14F00491AB749AA1E0CAF0A881CE94
                                                                    APIs
                                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0017236C
                                                                    • PostMessageW.USER32(00000000), ref: 00172373
                                                                      • Part of subcall function 0014E97B: Sleep.KERNELBASE ref: 0014E9F3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: FindMessagePostSleepWindow
                                                                    • String ID: Shell_TrayWnd
                                                                    • API String ID: 529655941-2988720461
                                                                    • Opcode ID: a7d34e6c6ae6955f29aa17980601e2f15c4db46abe7a92eaf6d23549660b0a64
                                                                    • Instruction ID: 6d5eecc9faae58654c066db7e41ff0a854b607cf2f043f673f414a994ea3f63e
                                                                    • Opcode Fuzzy Hash: a7d34e6c6ae6955f29aa17980601e2f15c4db46abe7a92eaf6d23549660b0a64
                                                                    • Instruction Fuzzy Hash: 4AD012363D1310BBE664B770DC4FFC67664AB15B14F00491AB749EA1E0CAF0B881CE94
                                                                    APIs
                                                                    • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 0011BE93
                                                                    • GetLastError.KERNEL32 ref: 0011BEA1
                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0011BEFC
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3368367952.00000000000E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 000E0000, based on PE: true
                                                                    • Associated: 00000000.00000002.3368348265.00000000000E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368431565.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368486166.00000000001AC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                    • Associated: 00000000.00000002.3368509136.00000000001B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_e0000_file.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide$ErrorLast
                                                                    • String ID:
                                                                    • API String ID: 1717984340-0
                                                                    • Opcode ID: 37c4b5463764080bc1c39c80f408ef837b057e4adbccf036af06f2eab0a60a69
                                                                    • Instruction ID: 2941d538eae3954aaac284f6c033012741090db0a192bd1f7d0c5e30cfd5907c
                                                                    • Opcode Fuzzy Hash: 37c4b5463764080bc1c39c80f408ef837b057e4adbccf036af06f2eab0a60a69
                                                                    • Instruction Fuzzy Hash: 8741D434609207AFCF299F64CCC4AFA7BA5AF41320F254179F9599B1E1DB308D82CB60