Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1520352
MD5:cf2cd80a393670f0241c8c3740ac1ff2
SHA1:5b964539130e93ea7ec8a36e0c08a0da84624ce9
SHA256:64c99465ec6ccad13433eb32c6069b3f636efa881f027015d518576aa2bc6b31
Tags:exeuser-Bitsight
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of debugger detection
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sleep loop found (likely to delay execution)
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 2428 cmdline: "C:\Users\user\Desktop\file.exe" MD5: CF2CD80A393670F0241C8C3740AC1FF2)
    • chrome.exe (PID: 1868 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 6084 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 --field-trial-handle=2028,i,5939366904044384475,4979484463348327368,262144 /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 7856 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5536 --field-trial-handle=2028,i,5939366904044384475,4979484463348327368,262144 /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 7868 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 --field-trial-handle=2028,i,5939366904044384475,4979484463348327368,262144 /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: file.exeReversingLabs: Detection: 28%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.4% probability
Source: file.exeJoe Sandbox ML: detected
Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.5:49717 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.5:49721 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.5:49749 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.5:49760 version: TLS 1.2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0048DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0048DBBE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0045C2A2 FindFirstFileExW,0_2_0045C2A2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004968EE FindFirstFileW,FindClose,0_2_004968EE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0049698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0049698F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0048D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0048D076
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0048D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0048D3A9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00499642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00499642
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0049979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0049979D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00499B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00499B2B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00495C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00495C97
Source: Joe Sandbox ViewIP Address: 239.255.255.250 239.255.255.250
Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0049CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_0049CE44
Source: global trafficHTTP traffic detected: GET /account?=https://accounts.google.com/v3/signin/challenge/pwd HTTP/1.1Host: youtube.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIk6HLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
Source: global trafficHTTP traffic detected: GET /accounts/CheckConnection?pmpo=https%3A%2F%2Faccounts.google.com&v=1216369817&timestamp=1727419211953 HTTP/1.1Host: accounts.youtube.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-full-version: "117.0.5938.132"sec-ch-ua-arch: "x86"sec-ch-ua-platform: "Windows"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-model: ""sec-ch-ua-bitness: "64"sec-ch-ua-wow64: ?0sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIk6HLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=Sec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: iframeReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Host: www.google.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-arch: "x86"sec-ch-ua-full-version: "117.0.5938.132"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIk6HLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=Sec-Fetch-Site: same-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: NID=517=BITQKqQfWS3c3Ka2V3chnU-38StwTNcdk_AUbMvPVorKofReGs2V0KXZbpI78Q6Ho0xqPE1IrLKIDWOqIqohzHiPxOEWDsuFVxNGh7_3c2tCNekW8Nv5ok33C-pjOlrXgoDrEAnHjESvrFDtECrRO-z4NEzWoNJoppyK-dpX1b_qKPa7_a8
Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=3A3ob3ZR9dDYPdg&MD=eGCMR9HE HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: global trafficHTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=3A3ob3ZR9dDYPdg&MD=eGCMR9HE HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: chromecache_105.4.drString found in binary or memory: _.iq(p)+"/familylink/privacy/notice/embedded?langCountry="+_.iq(p);break;case "PuZJUb":a+="https://www.youtube.com/t/terms?chromeless=1&hl="+_.iq(m);break;case "fxTQxb":a+="https://youtube.com/t/terms?gl="+_.iq(_.rq(c))+"&hl="+_.iq(d)+"&override_hl=1"+(f?"&linkless=1":"");break;case "prAmvd":a+="https://www.google.com/intl/"+_.iq(m)+"/chromebook/termsofservice.html?languageCode="+_.iq(d)+"&regionCode="+_.iq(c);break;case "NfnTze":a+="https://policies.google.com/privacy/google-partners"+(f?"/embedded": equals www.youtube.com (Youtube)
Source: global trafficDNS traffic detected: DNS query: youtube.com
Source: global trafficDNS traffic detected: DNS query: www.youtube.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: accounts.youtube.com
Source: global trafficDNS traffic detected: DNS query: play.google.com
Source: unknownHTTP traffic detected: POST /log?format=json&hasfast=true&authuser=0 HTTP/1.1Host: play.google.comConnection: keep-aliveContent-Length: 1401sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-arch: "x86"Content-Type: application/x-www-form-urlencoded;charset=UTF-8sec-ch-ua-full-version: "117.0.5938.132"sec-ch-ua-platform-version: "10.0.0"X-Goog-AuthUser: 0sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: */*Origin: https://accounts.google.comX-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIk6HLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: NID=517=jOf0cdVIayIKH6EEhuVwAZueUHeNQpQbzu7Z7fmkAXyXgLlApLjOEkRTD5VphjISDLOtlRdrEHGjQE_U2HsEuW8voX5iOJ9B-E-P_CWRGBOjbHXNk9vc5t0u4UpKF862OnLyAtd_SubSn74LYcNwxnzSgY0VqjQDjooxuMuby43qMwc0JxCVcM1sBcg
Source: chromecache_105.4.drString found in binary or memory: https://accounts.google.com
Source: chromecache_105.4.drString found in binary or memory: https://accounts.google.com/TOS?loc=
Source: chromecache_107.4.drString found in binary or memory: https://apis.google.com/js/api.js
Source: chromecache_105.4.drString found in binary or memory: https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessage
Source: chromecache_105.4.drString found in binary or memory: https://families.google.com/intl/
Source: chromecache_107.4.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/drive_2020q4/v10/192px.svg
Source: chromecache_107.4.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/gmail_2020q4/v10/web-48dp/logo_gmail_2020q4_color_2x_web_
Source: chromecache_107.4.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/maps/v7/192px.svg
Source: chromecache_105.4.drString found in binary or memory: https://g.co/recover
Source: chromecache_105.4.drString found in binary or memory: https://play.google.com/log?format=json&hasfast=true
Source: chromecache_105.4.drString found in binary or memory: https://play.google.com/work/enroll?identifier=
Source: chromecache_105.4.drString found in binary or memory: https://play.google/intl/
Source: chromecache_105.4.drString found in binary or memory: https://policies.google.com/privacy
Source: chromecache_105.4.drString found in binary or memory: https://policies.google.com/privacy/additional
Source: chromecache_105.4.drString found in binary or memory: https://policies.google.com/privacy/google-partners
Source: chromecache_105.4.drString found in binary or memory: https://policies.google.com/technologies/cookies
Source: chromecache_105.4.drString found in binary or memory: https://policies.google.com/technologies/location-data
Source: chromecache_105.4.drString found in binary or memory: https://policies.google.com/terms
Source: chromecache_105.4.drString found in binary or memory: https://policies.google.com/terms/location
Source: chromecache_105.4.drString found in binary or memory: https://policies.google.com/terms/service-specific
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-email-pin.gif
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-password.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-sms-or-voice-pin.gif
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-sms-pin.gif
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-stop-go-landing-page_1x.png
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/animation/
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/ble_device.png
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/ble_pin.png
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync.png
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_1x.png
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_2x.png
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_darkmode_1x.png
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/continue_on_your_phone.png
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_phone_number_verification.png
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_silent_tap_yes_darkmode.gif
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_tap_yes.gif
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_tap_yes_darkmode.gif
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kid_success.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kid_success_darkmode.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_dark_v2.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_updated.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_updated_darkmode.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_v2.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_not_ready.png
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_stick_around_1.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_stick_around_dark_1.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_account_1.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_account_darkmode_1.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_privacy_1.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_privacy_darkmode_1.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_created.png
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_double_device.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_double_device_darkmode.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_full_house.png
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_link_accounts_1.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_link_accounts_darkmode_1.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_app_decision.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_app_decision_darkmode.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_supervision_1.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_supervision_darkmode_1.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_respect_others_1.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_respect_others_darkmode_1.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_single_device.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_single_device_darkmode.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_stop.png
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/personalization_reminders.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/phone_number_sign_in_2x.png
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/return_to_desktop.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/return_to_desktop_darkmode.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key.gif
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_ios_center.png
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_laptop.gif
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_nfc_discovered.gif
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_nfc_discovered_darkmode.gif
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_phone.gif
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_googleapp_ios.gif
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_googleapp_pulldown.gif
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_tapyes.gif
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/smart_lock_2x.png
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/usb_key.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/web_and_app_activity.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/who_will_be_using_this_device.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/you_tube_history.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/feature_not_available.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/feature_not_available_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/gmail_ios_authzen.gif
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/paaskey.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_challenge.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_challenge_darkmode.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_darkmode.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_cross_device.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_cross_device_darkmode.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_darkmode.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_error.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_error_darkmode.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_reauth.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_reauth_darkmode.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_success.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_success_darkmode.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkeyerror.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkeyerror_darkmode.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/red_globe_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/red_globe_light.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/screenlock.png
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_ipad.gif
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone.gif
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone_nfc.gif
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone_usb.gif
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_phone.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_keys.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/success_checkmark_2.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/success_checkmark_2_darkmode.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/loading_spinner_gm.gif
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/progress_spinner_color_20dp_4x.gif
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/success-gm-default_2x.png
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/apps/signup/resources/custom-email-address.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/images/hpp/shield_security_checkup_green_2x_web_96dp.png
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/account_setup_chapter_dark_1.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/account_setup_chapter_v1.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/device_setup_chapter_dark_v1.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/device_setup_chapter_v1.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/parental_control_chapter_dark_v1.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/parental_control_chapter_v1.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_accountslinked.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_accountslinked_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_childneedshelp.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_childneedshelp_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_nextstepsforparents.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_nextstepsforparents_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_allset.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_allset_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_apps_devices.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_apps_devices_darkmode.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_areyousurekid.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_areyousurekid_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_birthdayemail.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_birthdayemail_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_choose_apps.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_choose_apps_darkmode.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_confirmation.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_exploremore.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_exploremore_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_intro.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_intro_darkmode.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacy_terms_a18.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacy_terms_a18_darkmode.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacyterms.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacyterms_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_review_settings.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_review_settings_darkmode.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_safe_search.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_safe_search_darkmode.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_unchanged_a18.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_unchanged_a18_darkmode.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_update_a18.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_update_a18_darkmode.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_a18.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_a18_darkmode.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_darkmode.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervisiongrad.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervisiongrad_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/guardianlinking/linking_complete_0.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/guardianlinking/linking_complete_dark_0.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/ads_personalization.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/ads_personalization_darkmode.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/confirmation.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/confirmation_darkmode.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/eligibility_error.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/eligibility_error_darkmode.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/fork.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/fork_darkmode.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/intro.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/intro_darkmode.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/personal_results.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/personal_results_darkmode.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/safe_search.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/safe_search_darkmode.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/check_notifications.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/check_notifications_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_installing_family_link_2.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_installing_family_link_dark_2.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_location_sharing_2.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_location_sharing_dark_2.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_parental_controls_2.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_parental_controls_dark_2.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_school_time_2.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_school_time_dark_2.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/location_sharing_enabled_2.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/location_sharing_enabled_dark_3.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/parent_sign_in_prologue_1.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/parent_sign_in_prologue_dark_1.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_complete_1.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_complete_dark_1.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_contacts_2.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_contacts_dark_2.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_boy_1.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_boy_dark_1.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_girl_2.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_girl_dark_2.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/ulp_continue_without_gmail_dark_v2.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/ulp_continue_without_gmail_v2.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/all_set.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/all_set_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/are_you_sure_parent.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/are_you_sure_parent_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/content_restriction.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/content_restriction_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/error.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/error_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/how_controls_work.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/how_controls_work_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/next_steps.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/next_steps_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/setup_controls.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/setup_controls_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_parent.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_parent_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_teen.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_teen_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teentoadultgraduation/supervision_choice.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teentoadultgraduation/supervision_choice_darkmode.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/kid_setup_parent_escalation.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/kid_setup_parent_escalation_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/send_email_confirmation.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/send_email_confirmation_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/success_sent_email.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/success_sent_email_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulpupgrade/kidprofileupgrade_all_set.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulpupgrade/kidprofileupgrade_all_set_darkmode.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/all_set.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/all_set_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/almost_done_kids_space_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/almost_done_kids_space_v2.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_tablet_v2.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_tablet_v2_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_v2.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_v2_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/emailinstallfamilylink.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/emailinstallfamilylink_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/familylinkinstalling.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/familylinkinstalling_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/hand_over_device_dark_v2.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/hand_over_device_v2.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/linking_accounts_v2.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/linking_accounts_v2_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/locationsetup.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/locationsetup_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email_v2.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email_v2_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_v2.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_v2_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/open_family_link_v2.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/open_family_link_v2_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/parents_help.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/parents_help_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/set_up_kids_space.png
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/set_up_kids_space_dark.png
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setupcontrol.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setupcontrol_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuplocation.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuplocation_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuptimelimits.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuptimelimits_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/supervision_ready_v2.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/supervision_ready_v2_dark.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/youtubeaccess.svg
Source: chromecache_107.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/youtubeaccess_dark.svg
Source: chromecache_105.4.drString found in binary or memory: https://support.google.com/accounts?hl=
Source: chromecache_105.4.drString found in binary or memory: https://support.google.com/accounts?p=new-si-ui
Source: chromecache_105.4.drString found in binary or memory: https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072
Source: chromecache_107.4.drString found in binary or memory: https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=
Source: chromecache_105.4.drString found in binary or memory: https://www.google.com
Source: chromecache_105.4.drString found in binary or memory: https://www.google.com/intl/
Source: chromecache_107.4.drString found in binary or memory: https://www.gstatic.com/accounts/speedbump/authzen_optin_illustration.gif
Source: chromecache_107.4.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/chrome_48dp.png
Source: chromecache_107.4.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/googleg_48dp.png
Source: chromecache_107.4.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/gsa_48dp.png
Source: chromecache_107.4.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/play_prism_48dp.png
Source: chromecache_107.4.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/youtube_48dp.png
Source: chromecache_105.4.drString found in binary or memory: https://www.gstatic.com/images/branding/productlogos/googleg/v6/36px.svg
Source: chromecache_105.4.drString found in binary or memory: https://www.youtube.com/t/terms?chromeless=1&hl=
Source: file.exe, 00000000.00000002.3316152920.0000000003CA0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3314859233.0000000001338000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
Source: file.exe, 00000000.00000002.3316102046.00000000038F2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd2f0
Source: file.exe, 00000000.00000002.3314415891.00000000010B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdPer
Source: file.exe, 00000000.00000002.3314859233.0000000001338000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdion;
Source: file.exe, 00000000.00000002.3316152920.0000000003C60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdn
Source: file.exe, 00000000.00000002.3314859233.0000000001338000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdstruc
Source: chromecache_105.4.drString found in binary or memory: https://youtube.com/t/terms?gl=
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.5:49717 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.5:49721 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.5:49749 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.5:49760 version: TLS 1.2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0049EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0049EAFF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0049ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0049ED6A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0049EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0049EAFF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0048AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_0048AA57
Source: file.exe, 00000000.00000002.3315900115.0000000003863000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _WINAPI_REGISTERRAWINPUTDEVICES[memstr_663d4528-2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004B9576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_004B9576

System Summary

barindex
Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.
Source: file.exe, 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_ef8f2419-4
Source: file.exe, 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_3f54c40f-3
Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_de553ecc-8
Source: file.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_97677966-f
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0048D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_0048D5EB
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00481201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00481201
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0048E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_0048E8F6
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0042BF400_2_0042BF40
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004920460_2_00492046
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004280600_2_00428060
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004882980_2_00488298
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0045E4FF0_2_0045E4FF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0045676B0_2_0045676B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004B48730_2_004B4873
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0042CAF00_2_0042CAF0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0044CAA00_2_0044CAA0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0043CC390_2_0043CC39
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00456DD90_2_00456DD9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0043B1190_2_0043B119
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004291C00_2_004291C0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004413940_2_00441394
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004417060_2_00441706
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0044781B0_2_0044781B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0043997D0_2_0043997D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004279200_2_00427920
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004419B00_2_004419B0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00447A4A0_2_00447A4A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00441C770_2_00441C77
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00447CA70_2_00447CA7
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004ABE440_2_004ABE44
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00459EEE0_2_00459EEE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00441F320_2_00441F32
Source: C:\Users\user\Desktop\file.exeCode function: String function: 0043F9F2 appears 40 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00429CB3 appears 31 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00440A30 appears 46 times
Source: file.exe, 00000000.00000002.3316152920.0000000003CA0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamechrome.exe< vs file.exe
Source: file.exe, 00000000.00000002.3314415891.00000000010B1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameD vs file.exe
Source: file.exe, 00000000.00000002.3314415891.00000000010B1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FV_ORIGINALFILENAME vs file.exe
Source: file.exe, 00000000.00000002.3315431263.0000000003755000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Comments|CompanyName|FileDescription|FileVersion|InternalName|LegalCopyright|LegalTrademarks|OriginalFilename|ProductName|ProductVersion|PrivateBuild|SpecialBuildUnkno vs file.exe
Source: file.exe, 00000000.00000002.3314341669.0000000001058000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FV_ORIGINALFILENAMEW:2 vs file.exe
Source: file.exe, 00000000.00000002.3315354546.00000000036F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Comments|CompanyName|FileDescription|FileVersion|InternalName|LegalCopyright|LegalTrademarks|OriginalFilename|ProductName|ProductVersion|PrivateBuild|SpecialBuildFileO vs file.exe
Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: classification engineClassification label: mal68.evad.winEXE@31/38@12/7
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004937B5 GetLastError,FormatMessageW,0_2_004937B5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004810BF AdjustTokenPrivileges,CloseHandle,0_2_004810BF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004816C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_004816C3
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004951CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_004951CD
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004AA67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_004AA67C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0049648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_0049648E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004242A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_004242A2
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: file.exeReversingLabs: Detection: 28%
Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 --field-trial-handle=2028,i,5939366904044384475,4979484463348327368,262144 /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5536 --field-trial-handle=2028,i,5939366904044384475,4979484463348327368,262144 /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 --field-trial-handle=2028,i,5939366904044384475,4979484463348327368,262144 /prefetch:8
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 --field-trial-handle=2028,i,5939366904044384475,4979484463348327368,262144 /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5536 --field-trial-handle=2028,i,5939366904044384475,4979484463348327368,262144 /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 --field-trial-handle=2028,i,5939366904044384475,4979484463348327368,262144 /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: Google Drive.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: YouTube.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Sheets.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Gmail.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Slides.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Docs.lnk.1.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: file.exeStatic file information: File size 1167360 > 1048576
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004242DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_004242DE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00440A76 push ecx; ret 0_2_00440A89
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnkJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0043F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_0043F98E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004B1C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_004B1C41
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\file.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-96084
Source: C:\Users\user\Desktop\file.exeWindow / User API: threadDelayed 6747Jump to behavior
Source: C:\Users\user\Desktop\file.exeAPI coverage: 3.4 %
Source: C:\Users\user\Desktop\file.exe TID: 2668Thread sleep time: -67470s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\file.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\file.exeThread sleep count: Count: 6747 delay: -10Jump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0048DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0048DBBE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0045C2A2 FindFirstFileExW,0_2_0045C2A2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004968EE FindFirstFileW,FindClose,0_2_004968EE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0049698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0049698F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0048D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0048D076
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0048D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0048D3A9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00499642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00499642
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0049979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0049979D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00499B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00499B2B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00495C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00495C97
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004242DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_004242DE
Source: file.exe, 00000000.00000002.3316102046.00000000038F2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: file.exe, 00000000.00000002.3316102046.00000000038F2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\

Anti Debugging

barindex
Source: C:\Users\user\Desktop\file.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_0-96262
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0049EAA2 BlockInput,0_2_0049EAA2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00452622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00452622
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004242DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_004242DE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00444CE8 mov eax, dword ptr fs:[00000030h]0_2_00444CE8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00480B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00480B62
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00452622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00452622
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0044083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0044083F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004409D5 SetUnhandledExceptionFilter,0_2_004409D5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00440C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00440C21
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00481201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00481201
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00462BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00462BA5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0048B226 SendInput,keybd_event,0_2_0048B226
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004A22DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_004A22DA
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00480B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00480B62
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00481663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00481663
Source: file.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
Source: file.exeBinary or memory string: Shell_TrayWnd
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00440698 cpuid 0_2_00440698
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00498195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00498195
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0047D27A GetUserNameW,0_2_0047D27A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0045B952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_0045B952
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004242DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_004242DE
Source: file.exeBinary or memory string: WIN_81
Source: file.exe, 00000000.00000002.3314415891.00000000010B1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WIN_XP
Source: file.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
Source: file.exeBinary or memory string: WIN_XPe
Source: file.exeBinary or memory string: WIN_VISTA
Source: file.exeBinary or memory string: WIN_7
Source: file.exeBinary or memory string: WIN_8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004A1204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004A1204
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004A1806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_004A1806
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure2
Valid Accounts
1
Native API
1
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Disable or Modify Tools
31
Input Capture
2
System Time Discovery
Remote Services1
Archive Collected Data
2
Ingress Tool Transfer
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/Job2
Valid Accounts
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory1
Account Discovery
Remote Desktop Protocol31
Input Capture
11
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
Registry Run Keys / Startup Folder
2
Valid Accounts
2
Obfuscated Files or Information
Security Account Manager2
File and Directory Discovery
SMB/Windows Admin Shares3
Clipboard Data
3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
Access Token Manipulation
1
DLL Side-Loading
NTDS15
System Information Discovery
Distributed Component Object ModelInput Capture4
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
Process Injection
1
Masquerading
LSA Secrets221
Security Software Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
Registry Run Keys / Startup Folder
2
Valid Accounts
Cached Domain Credentials22
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
Virtualization/Sandbox Evasion
DCSync2
Process Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
Access Token Manipulation
Proc Filesystem11
Application Window Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt12
Process Injection
/etc/passwd and /etc/shadow1
System Owner/User Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe29%ReversingLabs
file.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://apis.google.com/js/api.js0%URL Reputationsafe
https://policies.google.com/terms0%URL Reputationsafe
https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=0%URL Reputationsafe
https://policies.google.com/privacy0%URL Reputationsafe
https://play.google/intl/0%Avira URL Cloudsafe
https://families.google.com/intl/0%Avira URL Cloudsafe
https://youtube.com/t/terms?gl=0%Avira URL Cloudsafe
https://www.google.com/intl/0%Avira URL Cloudsafe
https://g.co/recover0%Avira URL Cloudsafe
https://policies.google.com/technologies/location-data0%Avira URL Cloudsafe
https://policies.google.com/privacy/google-partners0%Avira URL Cloudsafe
https://policies.google.com/terms/service-specific0%Avira URL Cloudsafe
https://play.google.com/work/enroll?identifier=0%Avira URL Cloudsafe
https://policies.google.com/privacy/additional0%Avira URL Cloudsafe
https://play.google.com/log?format=json&hasfast=true0%Avira URL Cloudsafe
https://play.google.com/log?format=json&hasfast=true&authuser=00%Avira URL Cloudsafe
https://www.google.com/favicon.ico0%Avira URL Cloudsafe
https://www.google.com0%Avira URL Cloudsafe
https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=32850720%Avira URL Cloudsafe
https://www.youtube.com/t/terms?chromeless=1&hl=0%Avira URL Cloudsafe
https://support.google.com/accounts?hl=0%Avira URL Cloudsafe
https://policies.google.com/terms/location0%Avira URL Cloudsafe
https://policies.google.com/technologies/cookies0%Avira URL Cloudsafe
https://support.google.com/accounts?p=new-si-ui0%Avira URL Cloudsafe
https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessage0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
youtube-ui.l.google.com
142.250.181.238
truefalse
    unknown
    www3.l.google.com
    172.217.16.206
    truefalse
      unknown
      play.google.com
      142.250.181.238
      truefalse
        unknown
        www.google.com
        216.58.212.164
        truefalse
          unknown
          youtube.com
          142.250.185.78
          truefalse
            unknown
            accounts.youtube.com
            unknown
            unknownfalse
              unknown
              www.youtube.com
              unknown
              unknownfalse
                unknown
                NameMaliciousAntivirus DetectionReputation
                https://play.google.com/log?format=json&hasfast=true&authuser=0false
                • Avira URL Cloud: safe
                unknown
                https://www.google.com/favicon.icofalse
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                https://play.google/intl/chromecache_105.4.drfalse
                • Avira URL Cloud: safe
                unknown
                https://families.google.com/intl/chromecache_105.4.drfalse
                • Avira URL Cloud: safe
                unknown
                https://youtube.com/t/terms?gl=chromecache_105.4.drfalse
                • Avira URL Cloud: safe
                unknown
                https://policies.google.com/technologies/location-datachromecache_105.4.drfalse
                • Avira URL Cloud: safe
                unknown
                https://www.google.com/intl/chromecache_105.4.drfalse
                • Avira URL Cloud: safe
                unknown
                https://apis.google.com/js/api.jschromecache_107.4.drfalse
                • URL Reputation: safe
                unknown
                https://policies.google.com/privacy/google-partnerschromecache_105.4.drfalse
                • Avira URL Cloud: safe
                unknown
                https://play.google.com/work/enroll?identifier=chromecache_105.4.drfalse
                • Avira URL Cloud: safe
                unknown
                https://policies.google.com/terms/service-specificchromecache_105.4.drfalse
                • Avira URL Cloud: safe
                unknown
                https://g.co/recoverchromecache_105.4.drfalse
                • Avira URL Cloud: safe
                unknown
                https://policies.google.com/privacy/additionalchromecache_105.4.drfalse
                • Avira URL Cloud: safe
                unknown
                https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072chromecache_105.4.drfalse
                • Avira URL Cloud: safe
                unknown
                https://policies.google.com/technologies/cookieschromecache_105.4.drfalse
                • Avira URL Cloud: safe
                unknown
                https://policies.google.com/termschromecache_105.4.drfalse
                • URL Reputation: safe
                unknown
                https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=chromecache_107.4.drfalse
                • URL Reputation: safe
                unknown
                https://www.google.comchromecache_105.4.drfalse
                • Avira URL Cloud: safe
                unknown
                https://play.google.com/log?format=json&hasfast=truechromecache_105.4.drfalse
                • Avira URL Cloud: safe
                unknown
                https://www.youtube.com/t/terms?chromeless=1&hl=chromecache_105.4.drfalse
                • Avira URL Cloud: safe
                unknown
                https://support.google.com/accounts?hl=chromecache_105.4.drfalse
                • Avira URL Cloud: safe
                unknown
                https://policies.google.com/terms/locationchromecache_105.4.drfalse
                • Avira URL Cloud: safe
                unknown
                https://policies.google.com/privacychromecache_105.4.drfalse
                • URL Reputation: safe
                unknown
                https://support.google.com/accounts?p=new-si-uichromecache_105.4.drfalse
                • Avira URL Cloud: safe
                unknown
                https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessagechromecache_105.4.drfalse
                • Avira URL Cloud: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                142.250.185.78
                youtube.comUnited States
                15169GOOGLEUSfalse
                216.58.212.164
                www.google.comUnited States
                15169GOOGLEUSfalse
                216.58.212.142
                unknownUnited States
                15169GOOGLEUSfalse
                172.217.16.206
                www3.l.google.comUnited States
                15169GOOGLEUSfalse
                239.255.255.250
                unknownReserved
                unknownunknownfalse
                IP
                192.168.2.7
                192.168.2.5
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1520352
                Start date and time:2024-09-27 08:39:08 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 5m 5s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:10
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:file.exe
                Detection:MAL
                Classification:mal68.evad.winEXE@31/38@12/7
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:
                • Successful, ratio: 98%
                • Number of executed functions: 46
                • Number of non-executed functions: 302
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                • Excluded IPs from analysis (whitelisted): 142.250.185.195, 142.250.181.238, 74.125.133.84, 34.104.35.123, 142.250.185.234, 142.250.186.42, 172.217.23.106, 172.217.18.10, 142.250.186.74, 142.250.185.138, 142.250.74.202, 142.250.186.138, 172.217.16.202, 142.250.185.202, 142.250.185.74, 216.58.206.74, 142.250.184.234, 142.250.185.106, 142.250.185.170, 142.250.186.106, 142.250.185.99, 172.217.16.195, 216.58.206.42, 216.58.212.138, 172.217.18.106, 142.250.184.202, 142.250.181.234, 142.250.186.170, 199.232.214.172, 192.229.221.95, 142.250.74.195, 74.125.71.84, 142.250.186.174
                • Excluded domains from analysis (whitelisted): clients1.google.com, fs.microsoft.com, accounts.google.com, content-autofill.googleapis.com, slscr.update.microsoft.com, fonts.gstatic.com, ctldl.windowsupdate.com, clientservices.googleapis.com, fe3cr.delivery.mp.microsoft.com, clients2.google.com, ocsp.digicert.com, edgedl.me.gvt1.com, update.googleapis.com, clients.l.google.com, www.gstatic.com, optimizationguide-pa.googleapis.com
                • Not all processes where analyzed, report is missing behavior information
                • Report size exceeded maximum capacity and may have missing disassembly code.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                • VT rate limit hit for: file.exe
                No simulations
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                239.255.255.250http://home-103607.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
                  http://breach-ads-notification.netlify.app/sample-appeal-id856193/Get hashmaliciousUnknownBrowse
                    http://www.dh91l.icu/Get hashmaliciousUnknownBrowse
                      https://d2y5b082yylhnc.cloudfront.net/Get hashmaliciousUnknownBrowse
                        http://brawllstars.ru/Get hashmaliciousHTMLPhisherBrowse
                          https://tiktomallapp.top/Get hashmaliciousUnknownBrowse
                            http://steephan2003.github.io/Get hashmaliciousHTMLPhisherBrowse
                              http://ee-charge-recovery.web.app/Get hashmaliciousUnknownBrowse
                                https://business-helpcenter-case-review.d1qp3r75retmpg.amplifyapp.com/Get hashmaliciousUnknownBrowse
                                  http://dashing-brioche-5d3921.netlify.app/Get hashmaliciousHTMLPhisherBrowse
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    play.google.comhttp://ee-charge-recovery.web.app/Get hashmaliciousUnknownBrowse
                                    • 172.217.23.110
                                    https://pdf-online.on-fleek.app/Get hashmaliciousUnknownBrowse
                                    • 172.217.18.14
                                    http://paypalloginin-usa.blogspot.is/Get hashmaliciousPayPal PhisherBrowse
                                    • 216.58.206.46
                                    http://ee-debit.web.app/Get hashmaliciousUnknownBrowse
                                    • 216.58.206.78
                                    https://telagremn.com/Get hashmaliciousUnknownBrowse
                                    • 172.217.18.14
                                    http://www.tinu.be/WOwwytwpD/Get hashmaliciousUnknownBrowse
                                    • 142.250.186.174
                                    http://metamask-wallett.blogspot.ie/Get hashmaliciousUnknownBrowse
                                    • 142.250.181.238
                                    https://arjunshaw.github.io/4.7-Project-1-Netflix-/Get hashmaliciousHTMLPhisherBrowse
                                    • 172.217.16.206
                                    http://sg2.putrivpn.us.kg/Get hashmaliciousUnknownBrowse
                                    • 142.250.185.174
                                    https://94837-coinbase.com/Get hashmaliciousUnknownBrowse
                                    • 142.250.185.142
                                    youtube-ui.l.google.comhttp://ee-charge-recovery.web.app/Get hashmaliciousUnknownBrowse
                                    • 142.250.185.174
                                    https://pdf-online.on-fleek.app/Get hashmaliciousUnknownBrowse
                                    • 216.58.206.78
                                    http://ee-debit.web.app/Get hashmaliciousUnknownBrowse
                                    • 216.58.212.142
                                    file.exeGet hashmaliciousUnknownBrowse
                                    • 142.250.185.110
                                    http://instagram.totalh.net/Get hashmaliciousUnknownBrowse
                                    • 216.58.212.174
                                    https://flintstone.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                                    • 172.217.16.206
                                    http://datechf.cc/de/receive/79469380Get hashmaliciousUnknownBrowse
                                    • 142.250.186.142
                                    file.exeGet hashmaliciousUnknownBrowse
                                    • 142.250.186.46
                                    file.exeGet hashmaliciousLummaC, Amadey, CryptOne, LummaC Stealer, PureLog Stealer, RedLine, Socks5SystemzBrowse
                                    • 216.58.212.174
                                    file.exeGet hashmaliciousUnknownBrowse
                                    • 142.250.181.238
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    28a2c9bd18a11de089ef85a160da29e4http://home-103607.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
                                    • 52.165.165.26
                                    • 184.28.90.27
                                    http://breach-ads-notification.netlify.app/sample-appeal-id856193/Get hashmaliciousUnknownBrowse
                                    • 52.165.165.26
                                    • 184.28.90.27
                                    http://www.dh91l.icu/Get hashmaliciousUnknownBrowse
                                    • 52.165.165.26
                                    • 184.28.90.27
                                    https://d2y5b082yylhnc.cloudfront.net/Get hashmaliciousUnknownBrowse
                                    • 52.165.165.26
                                    • 184.28.90.27
                                    http://brawllstars.ru/Get hashmaliciousHTMLPhisherBrowse
                                    • 52.165.165.26
                                    • 184.28.90.27
                                    https://tiktomallapp.top/Get hashmaliciousUnknownBrowse
                                    • 52.165.165.26
                                    • 184.28.90.27
                                    http://steephan2003.github.io/Get hashmaliciousHTMLPhisherBrowse
                                    • 52.165.165.26
                                    • 184.28.90.27
                                    http://ee-charge-recovery.web.app/Get hashmaliciousUnknownBrowse
                                    • 52.165.165.26
                                    • 184.28.90.27
                                    https://business-helpcenter-case-review.d1qp3r75retmpg.amplifyapp.com/Get hashmaliciousUnknownBrowse
                                    • 52.165.165.26
                                    • 184.28.90.27
                                    http://dashing-brioche-5d3921.netlify.app/Get hashmaliciousHTMLPhisherBrowse
                                    • 52.165.165.26
                                    • 184.28.90.27
                                    No context
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Sep 27 05:40:04 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                    Category:dropped
                                    Size (bytes):2677
                                    Entropy (8bit):3.9706069978452607
                                    Encrypted:false
                                    SSDEEP:48:83d9Tl1lHeidAKZdA19ehwiZUklqehSy+3:8jP61y
                                    MD5:3C90EA7053F8E4917B7F8F1DFA6BDC70
                                    SHA1:9C9EA4BEA8FC7E41C5E4292A2B64280127324C06
                                    SHA-256:4B2A8C72C67BFE0DCE562A2E0EA2A017D39D02A74FFEB6A0F899382CD52C0553
                                    SHA-512:40FF38AACC2A1E626D387B285DB2794DF6D16636E72D6891CE9663226DA918FD3730CE1FB9B952E38782BC42607C3451809490E0C50E3C23736DFCB96F3BF030
                                    Malicious:false
                                    Reputation:low
                                    Preview:L..................F.@.. ...$+.,............N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I;Y.5....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V;Y.5....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V;Y.5....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V;Y.5..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V;Y.5...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............AWs.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Sep 27 05:40:04 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                    Category:dropped
                                    Size (bytes):2679
                                    Entropy (8bit):3.9849266322821517
                                    Encrypted:false
                                    SSDEEP:48:8dd9Tl1lHeidAKZdA1weh/iZUkAQkqehly+2:8tPQ9Q0y
                                    MD5:18ECAA03604B55BD310CC8800DC9B4E9
                                    SHA1:A1C39E3E278F6B6C47EA3EE10257B0BA8EE06953
                                    SHA-256:6E0B01C3D15D0FAA54F26EFBF0D804FCB59B04D520016D527562BCFF82A86A95
                                    SHA-512:736D024D88E8B4230F676AE0986C55933F3C3586A3ABE50A4AC6C99140BBBDD4DB803D8FFB0AFD4ED3B18C07B4B7D68EEB0479592C551E41460BE2C86A80566F
                                    Malicious:false
                                    Reputation:low
                                    Preview:L..................F.@.. ...$+.,............N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I;Y.5....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V;Y.5....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V;Y.5....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V;Y.5..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V;Y.5...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............AWs.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                    Category:dropped
                                    Size (bytes):2693
                                    Entropy (8bit):3.9979372303030885
                                    Encrypted:false
                                    SSDEEP:48:8xmd9Tl1sHeidAKZdA14tseh7sFiZUkmgqeh7svy+BX:8xEPjnhy
                                    MD5:8B943D2CB44D4B4CDB11676F5BF7C059
                                    SHA1:4235153A3FE7C2490A1F2FFABA58EE83EE9327C1
                                    SHA-256:8E830AECB0C4055B11FD48FAA7E0B835EC6F8078CF823481BAD8163B80B855D2
                                    SHA-512:EC8787E6C7B334EFDDDD578A6679F870A8533750323DC661C29AE0EFB914347DE7BA3644E3538DE5068625C6789BE4FB8E086FC876194DD03EBBFCE5FA214680
                                    Malicious:false
                                    Reputation:low
                                    Preview:L..................F.@.. ...$+.,......e>....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I;Y.5....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V;Y.5....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V;Y.5....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V;Y.5..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VDW.n...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............AWs.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Sep 27 05:40:04 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                    Category:dropped
                                    Size (bytes):2681
                                    Entropy (8bit):3.9860896652013635
                                    Encrypted:false
                                    SSDEEP:48:8xSd9Tl1lHeidAKZdA1vehDiZUkwqehZy+R:8xIP7ny
                                    MD5:6B1F4B56A3A268DEC68078E9087591A2
                                    SHA1:7A94F6211986D8DA33713617FBBA40D150E5B3D5
                                    SHA-256:FED2B45243DE7331DD1CF3EF633BD38C31BB100A67B2511DFED620A4D85F5AAB
                                    SHA-512:B4203DBA1989036B2A096AF807A97FE5DA0DCD3EF19BFF11C9D12626FCEEDD2CDEBB33392CE2EC8A7CA9963060003092DE48E24114336249D8A7018FFB2A8622
                                    Malicious:false
                                    Reputation:low
                                    Preview:L..................F.@.. ...$+.,............N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I;Y.5....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V;Y.5....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V;Y.5....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V;Y.5..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V;Y.5...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............AWs.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Sep 27 05:40:04 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                    Category:dropped
                                    Size (bytes):2681
                                    Entropy (8bit):3.9731147443201515
                                    Encrypted:false
                                    SSDEEP:48:8kd9Tl1lHeidAKZdA1hehBiZUk1W1qehry+C:8mPb9Ly
                                    MD5:A75AFAFA761C66B2BD9C83BD16F342B7
                                    SHA1:1E07665FF063F1895181BB98975FA92B6106F206
                                    SHA-256:40117A4360D97E1EB7BF7E5A8DD7AE2F728E883EFCB32084DA8F205BA89AE235
                                    SHA-512:13426604C2892CCE3D20F47D0530472F874B37C52A010327F4BF1522976D371F9144162CF9530C483AB16B72FE2E960684588E9FC2F26F09793DC36C3E6F367F
                                    Malicious:false
                                    Reputation:low
                                    Preview:L..................F.@.. ...$+.,............N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I;Y.5....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V;Y.5....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V;Y.5....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V;Y.5..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V;Y.5...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............AWs.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Sep 27 05:40:04 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                    Category:dropped
                                    Size (bytes):2683
                                    Entropy (8bit):3.98442496422768
                                    Encrypted:false
                                    SSDEEP:48:81d9Tl1lHeidAKZdA1duT+ehOuTbbiZUk5OjqehOuTbhy+yT+:8VP7T/TbxWOvTbhy7T
                                    MD5:D188E055A3B63E6029CE27B9D0940C78
                                    SHA1:437BBCC4DF34607F24DA4246747F43322CB532DC
                                    SHA-256:7EC8C08B3B8654EB7B4C4FA74E6FB2245530E14AAFA8BC5186A97152C6CC961B
                                    SHA-512:6551CD0C35A0012836910FD483D1D4776F9425E4E72BA645971F6B89F7FC52666DCD62D40114401770B21B845B1D241CDF13BCA6E8FDC5F6018573A61DA34AB7
                                    Malicious:false
                                    Reputation:low
                                    Preview:L..................F.@.. ...$+.,............N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.I;Y.5....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V;Y.5....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V;Y.5....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V;Y.5..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V;Y.5...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............AWs.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:Web Open Font Format (Version 2), TrueType, length 52280, version 1.0
                                    Category:downloaded
                                    Size (bytes):52280
                                    Entropy (8bit):7.995413196679271
                                    Encrypted:true
                                    SSDEEP:1536:1rvqtK8DZilXxwJ8mMwAZy7phqsFLdG3B4d:xytBZits8bw4wzbFxG3B4d
                                    MD5:F61F0D4D0F968D5BBA39A84C76277E1A
                                    SHA1:AA3693EA140ECA418B4B2A30F6A68F6F43B4BEB2
                                    SHA-256:57147F08949ABABE7DEEF611435AE418475A693E3823769A25C2A39B6EAD9CCC
                                    SHA-512:6C3BD90F709BCF9151C9ED9FFEA55C4F6883E7FDA2A4E26BF018C83FE1CFBE4F4AA0DB080D6D024070D53B2257472C399C8AC44EEFD38B9445640EFA85D5C487
                                    Malicious:false
                                    Reputation:high, very likely benign file
                                    URL:https://fonts.gstatic.com/s/googlesans/v58/4UaRrENHsxJlGDuGo1OIlJfC6l_24rlCK1Yo_Iq2vgCI.woff2
                                    Preview:wOF2.......8.....................................^...$..4?HVAR..?MVAR9.`?STAT.*',..J/.......`..(..Z.0..R.6.$.... .....K..[..q..c..T.....>.P.j.`.w..#...%......N.".....$..3.0.6......... .L.rX/r[j.y.|*(.4.%#.....2.v.m..-..%.....;-.Y.{..&..O=#l@...k..7g..ZI...#.Z./+T..r7...M..3).Z%.x....s..sL..[A!.5*1w'/.8V..2Z..%.X.h.o.).]..9..Q`.$.....7..kZ.~O........d..g.n.d.Rw+&....Cz..uy#..fz,(.J....v.%..`..9.....h...?O..:...c%.....6s....xl..#...5..._......1.>.)"U.4 W....?%......6//!$...!.n9C@n...........!""^.....W..Z<.7.x.."UT.T....E.."R>.R..t.....H d..e_.K../.+8.Q.P.ZQ....;...U....]......._.e*......71.?.7.ORv.?...l...G|.P...|:...I.X..2.,.L........d.g.]}W#uW]QnuP-s.;.-Y.....].......C..j_.M0...y.......J..........NY..@A...,....-.F......'..w./j5g.vUS...U..0.&...y7.LP.....%.....Y......Y..D. e.A..G.?.$.......6...eaK.n5.m...N...,...+BCl..L> .E9~.b[.w.x....6<...}.e...%V....O.......*.?...a..#[eE.4..p..$...].....%......o._......N.._~..El....b..A.0.r8.....|..D.d..
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:ASCII text, with very long lines (569)
                                    Category:downloaded
                                    Size (bytes):3471
                                    Entropy (8bit):5.5174491302699495
                                    Encrypted:false
                                    SSDEEP:96:ojAmjTJ/fJgpIcB7Fd2tilGBEMO/A6VxV08w:vUTJpgDJXM0ApJ
                                    MD5:2D999C87DD54C7FE6400D267C33FBB23
                                    SHA1:414C3A329C2760325EDBACBD7A221D7F8DBFEEE8
                                    SHA-256:76D55A1AFC1D39CB04D60EB04E45A538A0E75EE2871561C84CC89B1C13596BCC
                                    SHA-512:72D923BB71DD147139962FF8E2BD0E336E0F6409C212AC2F25387D0F3B4FC9365F5A6D40E2980BB1065534888362C97D6B7663E362D29166B5915D2A9DA7D238
                                    Malicious:false
                                    URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBimEQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,iAskyc,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,wg1P6b,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziXSP,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlGbG-r9dBZftM0U0ZDPTNCqugT4jw/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=Wt6vjf,hhhU8,FCpbqb,WhJNk"
                                    Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("Wt6vjf");.var Txa=function(){var a=_.Ke();return _.L(a,1)},Tt=function(a){this.Da=_.t(a,0,Tt.messageId)};_.J(Tt,_.w);Tt.prototype.Ha=function(){return _.Hj(this,1)};Tt.prototype.Va=function(a){return _.Yj(this,1,a)};Tt.messageId="f.bo";var Ut=function(){_.km.call(this)};_.J(Ut,_.km);Ut.prototype.ud=function(){this.jT=!1;Uxa(this);_.km.prototype.ud.call(this)};Ut.prototype.aa=function(){Vxa(this);if(this.hC)return Wxa(this),!1;if(!this.sV)return Vt(this),!0;this.dispatchEvent("p");if(!this.fP)return Vt(this),!0;this.jM?(this.dispatchEvent("r"),Vt(this)):Wxa(this);return!1};.var Xxa=function(a){var b=new _.gp(a.z4);a.WP!=null&&_.Mn(b,"authuser",a.WP);return b},Wxa=function(a){a.hC=!0;var b=Xxa(a),c="rt=r&f_uid="+_.sk(a.fP);_.fn(b,(0,_.eg)(a.ea,a),"POST",c)};.Ut.prototype.ea=function(a){a=a.target;Vxa(this);if(_.jn(a)){this.RJ=0;if(this.jM)this.hC=!1,this.dispatchEvent("r")
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:ASCII text, with very long lines (468)
                                    Category:downloaded
                                    Size (bytes):1858
                                    Entropy (8bit):5.253939888205379
                                    Encrypted:false
                                    SSDEEP:48:o7BNJfeFb8L3A6FHqIy5Z+d70OCzSfvi/3fM/r8ZQzRrw:oFuILhFHrVCz0vLZz9w
                                    MD5:10FF6F99E3228E96AFD6E2C30EF97C0A
                                    SHA1:4AE3DCB8D1F5A0C302D5BAD9DFF5050A7A5E8130
                                    SHA-256:95E5546E1C7F311D07BB5050CC456A973E43BCC4777BA6014757376016537679
                                    SHA-512:116C0B1CAC98A27044100005545AB66BE5F4801D75DC259093A9F145B3A4ACD8DC1C360AF525F6DC8421CD54B675A78023D2ED8B57F5946A3969543758C673C9
                                    Malicious:false
                                    URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBimEQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlGbG-r9dBZftM0U0ZDPTNCqugT4jw/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=iAskyc,ziXSP"
                                    Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("iAskyc");._.$Z=function(a){_.X.call(this,a.Fa);this.window=a.Ea.window.get();this.Mc=a.Ea.Mc};_.J(_.$Z,_.X);_.$Z.Ba=function(){return{Ea:{window:_.lu,Mc:_.vE}}};_.$Z.prototype.Mo=function(){};_.$Z.prototype.addEncryptionRecoveryMethod=function(){};_.a_=function(a){return(a==null?void 0:a.Go)||function(){}};_.b_=function(a){return(a==null?void 0:a.N2)||function(){}};_.OOb=function(a){return(a==null?void 0:a.Mp)||function(){}};._.POb=function(a){return new Map(Array.from(a,function(b){var c=_.n(b);b=c.next().value;c=c.next().value;return[b,c.map(function(d){return{epoch:d.epoch,key:new Uint8Array(d.key)}})]}))};_.QOb=function(a){setTimeout(function(){throw a;},0)};_.$Z.prototype.WN=function(){return!0};_.iu(_.Dn,_.$Z);._.l();._.k("ziXSP");.var t_=function(a){_.$Z.call(this,a.Fa)};_.J(t_,_.$Z);t_.Ba=_.$Z.Ba;t_.prototype.Mo=function(a,b,c){var d;if((d=this.window.chrome)==nu
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:ASCII text, with very long lines (3346)
                                    Category:downloaded
                                    Size (bytes):22827
                                    Entropy (8bit):5.420322672717721
                                    Encrypted:false
                                    SSDEEP:384:/jqdWXWfyA20UUjDE8BSUxDJs16KHvSN34kaHaN+587SaXD2mLR0H:/jqdWXAUUjDE84Wi6KPSKjHaN+58+0J2
                                    MD5:2B29741A316862EE788996DD29116DD5
                                    SHA1:9D5551916D4452E977C39B8D69CF88DF2AAA462B
                                    SHA-256:62955C853976B722EFBB4C116A10DB3FF54580EDD7495D280177550B8F4289AB
                                    SHA-512:6E37C3258F07F29909763728DADE0CD40A3602D55D9099F78B37756926FCF2A50008B82876B518FEAF3E56617F0F7D1D37A73C346A99A58E6AD8BCD6689E9B15
                                    Malicious:false
                                    URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBimEQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,Rkm0ef,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlGbG-r9dBZftM0U0ZDPTNCqugT4jw/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=RqjULd"
                                    Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.pu.prototype.da=_.ca(38,function(){return _.vj(this,3)});_.Vy=function(a,b){this.key=a;this.defaultValue=!1;this.flagName=b};_.Vy.prototype.ctor=function(a){return typeof a==="boolean"?a:this.defaultValue};_.Wy=function(){this.ka=!0;var a=_.Bj(_.jk(_.Fe("TSDtV",window),_.pya),_.pu,1,_.uj())[0];if(a){var b={};for(var c=_.n(_.Bj(a,_.qya,2,_.uj())),d=c.next();!d.done;d=c.next()){d=d.value;var e=_.Nj(d,1).toString();switch(_.xj(d,_.qu)){case 3:b[e]=_.Lj(d,_.pj(d,_.qu,3));break;case 2:b[e]=_.Nj(d,_.pj(d,_.qu,2));break;case 4:b[e]=_.Oj(d,_.pj(d,_.qu,4));break;case 5:b[e]=_.L(d,_.pj(d,_.qu,5));break;case 6:b[e]=_.Sj(d,_.kf,6,_.qu);break;default:throw Error("id`"+_.xj(d,_.qu));}}}else b={};this.ea=b;this.token=.a?a.da():null};_.Wy.prototype.aa=function(a){if(!this.ka||a.key in this.ea)a=a.ctor(this.ea[a.key]);else if(_.Fe("nQyAE",window)){var b=_.sya(a.flagName);if(b===null)a=a.def
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:ASCII text, with very long lines (522)
                                    Category:downloaded
                                    Size (bytes):5049
                                    Entropy (8bit):5.317800104741948
                                    Encrypted:false
                                    SSDEEP:96:oHX9gPiPrfnHhsB0TR6kg1oDPJzLmM18Vh1z2fEZ54TZtnqj6w:EtEAr6BmPZtOeEvW/ncP
                                    MD5:CE53EF566B68CCF2D62FA044CFB0D138
                                    SHA1:F48EC60289F2B55E8B388601206888F8295B1EB1
                                    SHA-256:E6CC5114D92811D5DE0663266D4B63F367834AFA0FC3BAFA54F707038C59D010
                                    SHA-512:20B434881DE971E263669E6096C01665D4D35B0FBFF47D312A4A442645EE962A8CE6AD7E68246D4EE9691BD30D9B1DDCF7059226492E1B58CD3191B63B001E4D
                                    Malicious:false
                                    URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBimEQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,iAskyc,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziXSP,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlGbG-r9dBZftM0U0ZDPTNCqugT4jw/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=wg1P6b"
                                    Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.$Ma=_.y("wg1P6b",[_.OA,_.Fn,_.Rn]);._.k("wg1P6b");.var M5a;M5a=_.oh(["aria-"]);._.mJ=function(a){_.Y.call(this,a.Fa);this.Ja=this.ta=this.aa=this.viewportElement=this.La=null;this.Tc=a.Ea.qf;this.ab=a.Ea.focus;this.Lc=a.Ea.Lc;this.ea=this.Ei();a=-1*parseInt(_.Fo(this.Ei().el(),"marginTop")||"0",10);var b=parseInt(_.Fo(this.Ei().el(),"marginBottom")||"0",10);this.Ta={top:a,right:0,bottom:b,left:0};a=_.gf(this.getData("isMenuDynamic"),!1);b=_.gf(this.getData("isMenuHoisted"),!1);this.Ga=a?1:b?2:0;this.ka=!1;this.Ca=1;this.Ga!==1&&(this.aa=this.Sa("U0exHf").children().Sc(0),_.fu(this,.N5a(this,this.aa.el())));_.mF(this.oa())&&(a=this.oa().el(),b=this.De.bind(this),a.__soy_skip_handler=b)};_.J(_.mJ,_.Y);_.mJ.Ba=function(){return{Ea:{qf:_.SE,focus:_.BE,Lc:_.mu}}};_.mJ.prototype.pF=function(a){var b=a.source;this.La=b;var c;((c=a.data)==null?0:c.Jy)?(a=a.data.Jy,this.Ca=a==="MOUS
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:ASCII text, with very long lines (5693)
                                    Category:downloaded
                                    Size (bytes):651768
                                    Entropy (8bit):5.598307366742174
                                    Encrypted:false
                                    SSDEEP:6144:TYfRbDTYDh5CTNoygVWyNb5DGDAMpL5gI8seqfh53p+rrvVai:TIbDTYr+KDGX+NT
                                    MD5:B132ED6D9F233EDB6C13BFADF6FAEC4F
                                    SHA1:B64D427495A8ED2DC8B6B774F0BD2F59EB2D0828
                                    SHA-256:A46EFF2E35AED3ACF1EE8151897D8F616B361E85A78EE93DE350D08B7F06895E
                                    SHA-512:6C77A9AB069310F96CC684DE99A005E8291D50C8507B003267F29824877A87DECFE197D296292BB526FDE6514D8E31BB7D45DDBD39CD0D75600DB083B7E0B493
                                    Malicious:false
                                    URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBimEQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=LEikZe,_b,_tp,byfTOb,lsjVmc,soHxf/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlGbG-r9dBZftM0U0ZDPTNCqugT4jw/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=n73qwf,SCuOPb,IZT63,vfuNJf,UUJqVe,ws9Tlc,siKnQd,XVq9Qb,STuCOe,njlZCf,m9oV,vjKJJ,y5vRwf,iyZMqd,NTMZac,mzzZzc,rCcCxc,vvMGie,K1ZKnb,ziZ8Mc,b3kMqb,mvkUhe,CMcBD,Fndnac,t2srLd,EN3i8d,z0u0L,xiZRqc,NOeYWe,O6y8ed,L9OGUe,PrPYRd,MpJwZc,qPfo0c,cYShmd,hc6Ubd,Rkm0ef,KUM7Z,oLggrd,inNHtf,L1AAkb,WpP9Yc,lwddkf,gJzDyc,SpsfSb,aC1iue,tUnxGc,aW3pY,ZakeSe,EFQ78c,xQtZb,I6YDgd,zbML3c,zr1jrb,vHEMJe,YHI3We,YTxL4,bSspM,Uas9Hd,zy0vNb,K0PMbc,AvtSve,qmdT9,MY7mZe,xBaz7b,GwYlN,eVCnO,EIOG1e,LDQI"
                                    Preview:"use strict";_F_installCss(".r4WGQb{position:relative}.Dl08I>:first-child{margin-top:0}.Dl08I>:last-child{margin-bottom:0}.IzwVE{color:#1f1f1f;color:var(--gm3-sys-color-on-surface,#1f1f1f);font-family:\"Google Sans\",roboto,\"Noto Sans Myanmar UI\",arial,sans-serif;font-size:1.25rem;font-weight:400;letter-spacing:0rem;line-height:1.2}.l5PPKe{color:#1f1f1f;color:var(--gm3-sys-color-on-surface,#1f1f1f);font-size:1rem}.l5PPKe .dMNVAe{margin:0;padding:0}.l5PPKe>:first-child{margin-top:0;padding-top:0}.l5PPKe>:last-child{margin-bottom:0;padding-bottom:0}.Dl08I{margin:0;padding:0;position:relative}.Dl08I>.SmR8:only-child{padding-top:1px}.Dl08I>.SmR8:only-child::before{top:0}.Dl08I>.SmR8:not(first-child){padding-bottom:1px}.Dl08I>.SmR8::after{bottom:0}.Dl08I>.SmR8:only-child::before,.Dl08I>.SmR8::after{border-bottom:1px solid #c4c7c5;border-bottom:1px solid var(--gm3-sys-color-outline-variant,#c4c7c5);content:\"\";height:0;left:0;position:absolute;width:100%}.aZvCDf{margin-top:8px;margin-left
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:downloaded
                                    Size (bytes):84
                                    Entropy (8bit):4.875266466142591
                                    Encrypted:false
                                    SSDEEP:3:DZFJu0+WVTBCq2Bjdw2KsJJuYHSKnZ:lFJuuVTBudw29nu4SKZ
                                    MD5:87B6333E98B7620EA1FF98D1A837A39E
                                    SHA1:105DE6815B0885357DE1414BFC0D77FCC9E924EF
                                    SHA-256:DCD3C133C5C40BECD4100BBE6EDAE84C9735E778E4234A5E8395C56FF8A733BA
                                    SHA-512:867D7943D813685FAA76394E53199750C55817E836FD19C933F74D11E9657CE66719A6D6B2E39EE1DE62358BCE364E38A55F4E138DF92337DE6985DDCD5D0994
                                    Malicious:false
                                    URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISHgmA6QC9dWevzxIFDRkBE_oSBQ3oIX6GEgUN05ioBw==?alt=proto
                                    Preview:Cj0KBw0ZARP6GgAKKQ3oIX6GGgQISxgCKhwIClIYCg5AIS4jJF8qLSY/Ky8lLBABGP////8PCgcN05ioBxoA
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:ASCII text, with very long lines (553)
                                    Category:downloaded
                                    Size (bytes):603951
                                    Entropy (8bit):5.789949489744101
                                    Encrypted:false
                                    SSDEEP:3072:x0pApkygA62bwwdnO2YflNYhFGOizdGj008PpVVM96C5bMEPQUhts6FV8eKqtVAT:xlgNmwwdnOsF98oNGuQRAYqXsI1+
                                    MD5:036BC6CEC1912EAA63C716C2A7494AFC
                                    SHA1:C32891F55B0D7A86DCE1BDBB7B84DB21C2A09F4F
                                    SHA-256:1A6181C3DFAEE5919CE57152DCFFCDC4B151C5FB2969CFD62168C1711FF202CF
                                    SHA-512:0AAA2285D109114921B5FD8A15F9A3D1F218AF8C61054B3925965E6753F8A49B45798326EA986C4A6B6180B6C36292A4652E2BA730C7505684DAAA4B5C314675
                                    Malicious:false
                                    URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/am=xIFgKBimEQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/excm=_b,_tp,identifierview/ed=1/dg=0/wt=2/ujg=1/rs=AOaEmlGsNipZrCRRMFQh1-tVmHSsIDzQTA/m=_b,_tp"
                                    Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._._F_toggles_initialize=function(a){(typeof globalThis!=="undefined"?globalThis:typeof self!=="undefined"?self:this)._F_toggles=a||[]};(0,_._F_toggles_initialize)([0x286081c4, 0x20469860, 0x1ce13c40, 0x51407a0, 0x1908, 0x0, 0x1b400000, 0x19a00000, 0x0, ]);./*.. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright Google LLC. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright 2024 Google, Inc. SPDX-License-Identifier: MIT.*/./*. SPDX-License-Identifier: Apache-2.0.*/./*. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/.var baa,daa,Na,Ua,gaa,iaa,lb,qaa,xaa,Daa,Iaa,Laa,Mb,Maa,Rb,Vb,Wb,Naa,Oaa,Xb,Paa,Qaa,Raa,ac,Waa,Yaa,ic,jc,kc,cba,dba,hba,kba,mba,nba,rba,uba,oba,tba,sba,qba,pba,vba,zba,Dba,Eba,Bba,Kc,Lc,Hba,Jba,Nba,Oba,Pba,Qba,Mba,Rba,Tba,gd,Vba,Wba,Yba,$ba,Zba,bca,cca,dca,eca,gca,fca,ica,jca,kca,lca,oca,r
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:ASCII text, with very long lines (755)
                                    Category:downloaded
                                    Size (bytes):1460
                                    Entropy (8bit):5.316515499943097
                                    Encrypted:false
                                    SSDEEP:24:kMYD7DduJqrxsNL90YIzFK/Hb5eNhz1uktdDuvKKKGbLZ99GbSSF/ZR8OkdnprGJ:o7DQJopFN+ASCKKGbF99GbSS3RY7rw
                                    MD5:D97AB4594FC610665FF2763A650EE6A8
                                    SHA1:5C7459CA838D27BE45745571D8D96D156F4B9F8D
                                    SHA-256:767D778369623FD8F5FB98D3BCC3130D05D02CBE0B9B88DD226F43281B14E9AF
                                    SHA-512:CE4941B41C3A8CC983C1BBCC87EF682823CB9DB24EA7A570E35BBF832046340D433F7D47211384B61FA38F3527CC35C195A6068CCB24B48E1F492C5B4D4192A1
                                    Malicious:false
                                    URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBimEQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlGbG-r9dBZftM0U0ZDPTNCqugT4jw/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=P6sQOc"
                                    Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("lOO0Vd");._.HZa=new _.uf(_.Km);._.l();._.k("P6sQOc");.var MZa=!!(_.Nh[1]&16);var OZa=function(a,b,c,d,e){this.ea=a;this.ta=b;this.ka=c;this.Ca=d;this.Ga=e;this.aa=0;this.da=NZa(this)},PZa=function(a){var b={};_.Ma(a.hS(),function(e){b[e]=!0});var c=a.WR(),d=a.cS();return new OZa(a.XO(),c.aa()*1E3,a.oR(),d.aa()*1E3,b)},NZa=function(a){return Math.random()*Math.min(a.ta*Math.pow(a.ka,a.aa),a.Ca)},HG=function(a,b){return a.aa>=a.ea?!1:b!=null?!!a.Ga[b]:!0};var IG=function(a){_.X.call(this,a.Fa);this.da=a.Ea.mV;this.ea=a.Ea.metadata;a=a.Ea.lga;this.fetch=a.fetch.bind(a)};_.J(IG,_.X);IG.Ba=function(){return{Ea:{mV:_.KZa,metadata:_.HZa,lga:_.AZa}}};IG.prototype.aa=function(a,b){if(this.ea.getType(a.Md())!==1)return _.Vm(a);var c=this.da.JU;return(c=c?PZa(c):null)&&HG(c)?_.mya(a,QZa(this,a,b,c)):_.Vm(a)};.var QZa=function(a,b,c,d){return c.then(function(e){return e},function(e)
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:ASCII text, with very long lines (683)
                                    Category:downloaded
                                    Size (bytes):3131
                                    Entropy (8bit):5.3750044852869046
                                    Encrypted:false
                                    SSDEEP:48:o7zfN/cD498xdg+Y5jNQ8js6npwk0OmNAEZbpMzR4EQBcW5QcHj9KWfGAeFKRrw:oCD9dA5jOEGh+EFqR4rhqUhzff9w
                                    MD5:39693D34EE3D1829DBB1627C4FC6687B
                                    SHA1:A03303C2F027F3749B48D5134D1F8FB3E495C6E9
                                    SHA-256:03B0C1B4E402E0BCF75D530DD9085B25357EEFD09E238453DE1F3A042542C076
                                    SHA-512:AC0749EDC33DA0EC0E40470388DD797B6528AD08B8FAC1C2AC42F85198131052BA1B533E90409D35DA237607E8B07D591FA6BA580B6A90B0D0AB2282A01F7585
                                    Malicious:false
                                    URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBimEQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlGbG-r9dBZftM0U0ZDPTNCqugT4jw/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=ZwDk9d,RMhBfe"
                                    Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("ZwDk9d");.var bA=function(a){_.X.call(this,a.Fa)};_.J(bA,_.X);bA.Ba=_.X.Ba;bA.prototype.wR=function(a){return _.af(this,{Wa:{HS:_.ol}}).then(function(b){var c=window._wjdd,d=window._wjdc;return!c&&d?new _.oi(function(e){window._wjdc=function(f){d(f);e(PJa(f,b,a))}}):PJa(c,b,a)})};var PJa=function(a,b,c){return(a=a&&a[c])?a:b.Wa.HS.wR(c)};.bA.prototype.aa=function(a,b){var c=_.csa(b).Gj;if(c.startsWith("$")){var d=_.jm.get(a);_.xq[b]&&(d||(d={},_.jm.set(a,d)),d[c]=_.xq[b],delete _.xq[b],_.yq--);if(d)if(a=d[c])b=_.ef(a);else throw Error("Jb`"+b);else b=null}else b=null;return b};_.iu(_.Mfa,bA);._.l();._.k("SNUn3");._.OJa=new _.uf(_.Ag);._.l();._.k("RMhBfe");.var QJa=function(a){var b=_.wq(a);return b?new _.oi(function(c,d){var e=function(){b=_.wq(a);var f=_.Tfa(a,b);f?c(f.getAttribute("jsdata")):window.document.readyState=="complete"?(f=["Unable to find deferred jsdata wit
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:ASCII text, with very long lines (1694)
                                    Category:downloaded
                                    Size (bytes):32499
                                    Entropy (8bit):5.361345284201954
                                    Encrypted:false
                                    SSDEEP:768:mLX1O+aL6fgyIiREM4RKmh90toLoTswtF3ATcbDR6kIsnJd9DPyMv/FI:U2M4oltoLoTswtFoc/tIsnXFLI
                                    MD5:D5C3FB8EAE24AB7E40009338B5078496
                                    SHA1:5638BF5986A6445A88CD79A9B690B744B126BEC2
                                    SHA-256:597C14D360D690BCFDC2B8D315E6BB8879AEF33DE6C30D274743079BDB63C6B0
                                    SHA-512:6AE434850D473BEF15AA694AB4862596982CDDA6BD3991991D3ADD8F4A5F61DFBF8756D0DA98B72EF083909D68CF7B6B148A6488E9381F92FBF15CCB20176A0E
                                    Malicious:false
                                    URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBimEQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=_b,_tp/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlGbG-r9dBZftM0U0ZDPTNCqugT4jw/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=byfTOb,lsjVmc,LEikZe"
                                    Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{.var qua=function(a,b){this.da=a;this.ea=b;if(!c){var c=new _.gp("//www.google.com/images/cleardot.gif");_.rp(c)}this.ka=c};_.h=qua.prototype;_.h.Vc=null;_.h.QY=1E4;_.h.Iz=!1;_.h.TP=0;_.h.qJ=null;_.h.DU=null;_.h.setTimeout=function(a){this.QY=a};_.h.start=function(){if(this.Iz)throw Error("dc");this.Iz=!0;this.TP=0;rua(this)};_.h.stop=function(){sua(this);this.Iz=!1};.var rua=function(a){a.TP++;navigator!==null&&"onLine"in navigator&&!navigator.onLine?_.om((0,_.eg)(a.JG,a,!1),0):(a.aa=new Image,a.aa.onload=(0,_.eg)(a.Xia,a),a.aa.onerror=(0,_.eg)(a.Wia,a),a.aa.onabort=(0,_.eg)(a.Via,a),a.qJ=_.om(a.Yia,a.QY,a),a.aa.src=String(a.ka))};_.h=qua.prototype;_.h.Xia=function(){this.JG(!0)};_.h.Wia=function(){this.JG(!1)};_.h.Via=function(){this.JG(!1)};_.h.Yia=function(){this.JG(!1)};._.h.JG=function(a){sua(this);a?(this.Iz=!1,this.da.call(this.ea,!0)):this.TP<=0?rua(this):(this.Iz=!1,
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:ASCII text, with very long lines (1307)
                                    Category:downloaded
                                    Size (bytes):47021
                                    Entropy (8bit):5.479684844658564
                                    Encrypted:false
                                    SSDEEP:768:eZC1Djh425SnoREC7d0qjtPjYXA8CCacqs0hA1rvcTnozAKrHSYBzvpsZWhv0h8s:Z1RDnnf4IcEnsLWY0lNWNFFFaDwbI/Z5
                                    MD5:E8870800DE1151CE3FF7357DA865757F
                                    SHA1:5DB63D8F5A469ED29B415ED3570C839D9319DE04
                                    SHA-256:A067EA188ACB573FE12F6DC7A578198D7C06167AE7CC8E7D29D569454E12AD3A
                                    SHA-512:94BA87D8DE2667D39AC9292265A1AFB82336FFAEFF54972783F49DE0CB561D414583D6C4B77DD45CF91D34BF25B1606E183163B203BC3C04F18EB8103D4A2B3C
                                    Malicious:false
                                    URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBimEQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=LEikZe,_b,_tp,byfTOb,lsjVmc/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlGbG-r9dBZftM0U0ZDPTNCqugT4jw/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=soHxf"
                                    Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{.var Rwa,Swa;Rwa=function(a){var b;return(b=a.Ba)!=null?b:function(){}};.Swa=function(a,b,c){if(a===_.Th)return _.Ye({});var d=Rwa(a).call(a,c),e=_.aea(b,d!=null?d:{});d=Object.getPrototypeOf(a);return Swa(d,b,c).flatMap(function(f){return e.map(function(g){g.Fa=f;return g})}).map(function(f){return f},function(f){var g,m,p=(m=(g=a.displayName)!=null?g:c.toString())!=null?m:a.name;if(typeof f==="string")var q=Error("Bc`"+p+"`"+f);else if(f.message){q=f;f="Failed to retrieve dependencies of service "+p+": "+q.message;try{q.message=f}catch(r){q=Error("Cc`"+f+"`"+r)}}return q})};._.dt=function(a,b,c){return b.ctor?b.Rq?b.nN(a,b.ctor,b.Th,c,void 0,!0):b.nN(a,b.ctor,b.Th,c,!0):b.Rq?b.nN(a,b.Th,c,void 0,!0):b.nN(a,b.Th,c,!0)};_.et=function(a){_.Th.call(this);var b,c;this.Qz=(c=a==null?void 0:(b=a.Xl)==null?void 0:b.Wa)!=null?c:void 0;this.W_=[]};_.J(_.et,_.Th);_.et.prototype.ud=func
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:ASCII text, with very long lines (395)
                                    Category:downloaded
                                    Size (bytes):1608
                                    Entropy (8bit):5.280977407061266
                                    Encrypted:false
                                    SSDEEP:48:o7YNJvl3WlENrpB3stYCIgMxILNH/wf7DVTBpdQrw:oApB8iDwYlGw
                                    MD5:4FB66582D37D04933F00E49C2FBA34D4
                                    SHA1:3DB09C53BBEB1EEB045A001356E498D8EF30915D
                                    SHA-256:A97DAC01ABFE3EB75C7C97D504E21BDDDADDB6EBE0B56B6A9A10CD3700CAB41B
                                    SHA-512:2AEB3A6CFFBF6EFA626EBDC9E11ACBAC04BFE986F98FBC050B2501898B289C67D392ED195D16ACC9565EF8784401ADA1E88188CDE3A7AB12D98BB5ED7D8A5711
                                    Malicious:false
                                    URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBimEQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlGbG-r9dBZftM0U0ZDPTNCqugT4jw/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=w9hDv,ZDZcre,A7fCU"
                                    Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("w9hDv");._.zg(_.Kla);_.$z=function(a){_.X.call(this,a.Fa);this.aa=a.Wa.cache};_.J(_.$z,_.X);_.$z.Ba=function(){return{Wa:{cache:_.Zs}}};_.$z.prototype.execute=function(a){_.Gb(a,function(b){var c;_.df(b)&&(c=b.eb.jc(b.jb));c&&this.aa.oG(c)},this);return{}};_.iu(_.Qla,_.$z);._.l();._.k("ZDZcre");.var ZG=function(a){_.X.call(this,a.Fa);this.Nl=a.Ea.Nl;this.G3=a.Ea.metadata;this.aa=a.Ea.Ws};_.J(ZG,_.X);ZG.Ba=function(){return{Ea:{Nl:_.DG,metadata:_.HZa,Ws:_.AG}}};ZG.prototype.execute=function(a){var b=this;a=this.aa.create(a);return _.Gb(a,function(c){var d=b.G3.getType(c.Md())===2?b.Nl.Pb(c):b.Nl.fetch(c);return _.Jl(c,_.EG)?d.then(function(e){return _.Jd(e)}):d},this)};_.iu(_.Vla,ZG);._.l();._.k("K5nYTd");._.GZa=new _.uf(_.Rla);._.l();._.k("sP4Vbe");.._.l();._.k("kMFpHd");.._.l();._.k("A7fCU");.var GG=function(a){_.X.call(this,a.Fa);this.aa=a.Ea.ZP};_.J(GG,_.X);GG.Ba=func
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:HTML document, ASCII text, with very long lines (681)
                                    Category:downloaded
                                    Size (bytes):4070
                                    Entropy (8bit):5.362700670482359
                                    Encrypted:false
                                    SSDEEP:96:GUpT+TmXtdW1qsHFcn7t7CnyWYvNTcLaQOw:lpT+qXW1PFcn7tGnyWY1TGb
                                    MD5:ED368A20CB303C0E7C6A3E6E43C2E14F
                                    SHA1:429A5C538B45221F80405163D1F87912DD73C05A
                                    SHA-256:93BA77AD4B11E0A70C0D36576F0DF24E27F50001EA02BAA6D357E034532D97F2
                                    SHA-512:DE74BBADE910475DD245FFEFD4E1FD10137DE710B1C920D33BA52554911496E1339EF3C1F6D9D315CBC98A60ABE5687A3E7D8BEE483708E18D25722E794BDBE9
                                    Malicious:false
                                    URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBimEQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlGbG-r9dBZftM0U0ZDPTNCqugT4jw/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=sOXFj,q0xTif,ZZ4WUe"
                                    Preview:"use strict";_F_installCss(".N7rBcd{overflow-x:auto}sentinel{}");.this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.zg(_.dqa);._.k("sOXFj");.var ou=function(a){_.X.call(this,a.Fa)};_.J(ou,_.X);ou.Ba=_.X.Ba;ou.prototype.aa=function(a){return a()};_.iu(_.cqa,ou);._.l();._.k("oGtAuc");._.oya=new _.uf(_.dqa);._.l();._.k("q0xTif");.var iza=function(a){var b=function(d){_.Zn(d)&&(_.Zn(d).Gc=null,_.yu(d,null));d.XyHi9&&(d.XyHi9=null)};b(a);a=a.querySelectorAll("[c-wiz]");for(var c=0;c<a.length;c++)b(a[c])},Ku=function(a){_.et.call(this,a.Fa);this.Qa=this.dom=null;if(this.Vk()){var b=_.Jm(this.Mg(),[_.Om,_.Nm]);b=_.ri([b[_.Om],b[_.Nm]]).then(function(c){this.Qa=c[0];this.dom=c[1]},null,this);_.cu(this,b)}this.Ra=a.Xl.Hda};_.J(Ku,_.et);Ku.Ba=function(){return{Xl:{Hda:function(a){return _.Ye(a)}}}};Ku.prototype.yp=function(a){return this.Ra.yp(a)};.Ku.prototype.getData=function(a){return this.Ra.getData(a)};Ku.prototype.vp=function(){_.Ft(this.d
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:ASCII text, with very long lines (533)
                                    Category:downloaded
                                    Size (bytes):8053
                                    Entropy (8bit):5.374776637575978
                                    Encrypted:false
                                    SSDEEP:192:FK/pAzN7GZ068Hqhqu6DQaVapzYjgKItwdiwGl9:FqI7GZ04dRYjghtgihl9
                                    MD5:969AFCB82B76AEC5A69921AA281BD56A
                                    SHA1:FDC109EE7A5CA36FA09BFADD5563924B1E458F5B
                                    SHA-256:C2A90EC78A4CA321E9885D8B32306331F4574D16E5B973DBB9089943F65C1E46
                                    SHA-512:3D0582046191B99DE95F65BD6B64C85D5E97B54F0DCF023F73DDF46B41687D41FC33E22F2CCB0E1EA4C3B216E5A2D021903E30B12855DE21BB9D83306A7F873C
                                    Malicious:false
                                    URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBimEQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=AvtSve,CMcBD,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PrPYRd,Rkm0ef,SCuOPb,STuCOe,SpsfSb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,byfTOb,cYShmd,eVCnO,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,qPfo0c,qmdT9,rCcCxc,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlGbG-r9dBZftM0U0ZDPTNCqugT4jw/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=ltDFwf,SD8Jgb,rmumx,E87wgc,qPYxq,Tbb4sb,pxq3x,f8Gu1e,YgOFye,yRXbo,bTi8wc,ywOR5c,PHUIyb"
                                    Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.gNa=_.y("SD8Jgb",[]);._.QX=function(a,b){if(typeof b==="string")a.Nc(b);else if(b instanceof _.Ip&&b.ia&&b.ia===_.B)b=_.$a(b.ww()),a.empty().append(b);else if(b instanceof _.Wa)b=_.$a(b),a.empty().append(b);else if(b instanceof Node)a.empty().append(b);else throw Error("Vf");};_.RX=function(a){var b=_.Lo(a,"[jsslot]");if(b.size()>0)return b;b=new _.Jo([_.Qk("span")]);_.Mo(b,"jsslot","");a.empty().append(b);return b};_.TKb=function(a){return a===null||typeof a==="string"&&_.Ki(a)};._.k("SD8Jgb");._.WX=function(a){_.Y.call(this,a.Fa);this.Ua=a.controller.Ua;this.kd=a.controllers.kd[0]||null;this.header=a.controller.header;this.nav=a.controller.nav;var b;(b=this.oa().find("button:not([type])").el())==null||b.setAttribute("type","button")};_.J(_.WX,_.Y);_.WX.Ba=function(){return{controller:{Ua:{jsname:"n7vHCb",ctor:_.hv},header:{jsname:"tJHJj",ctor:_.hv},nav:{jsname:"DH6Rkf",ct
                                    Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    File Type:MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                                    Category:downloaded
                                    Size (bytes):5430
                                    Entropy (8bit):3.6534652184263736
                                    Encrypted:false
                                    SSDEEP:48:wIJct3xIAxG/7nvWDtZcdYLtX7B6QXL3aqG8Q:wIJct+A47v+rcqlBPG9B
                                    MD5:F3418A443E7D841097C714D69EC4BCB8
                                    SHA1:49263695F6B0CDD72F45CF1B775E660FDC36C606
                                    SHA-256:6DA5620880159634213E197FAFCA1DDE0272153BE3E4590818533FAB8D040770
                                    SHA-512:82D017C4B7EC8E0C46E8B75DA0CA6A52FD8BCE7FCF4E556CBDF16B49FC81BE9953FE7E25A05F63ECD41C7272E8BB0A9FD9AEDF0AC06CB6032330B096B3702563
                                    Malicious:false
                                    URL:https://www.google.com/favicon.ico
                                    Preview:............ .h...&... .... .........(....... ..... ............................................0...................................................................................................................................v.].X.:.X.:.r.Y........................................q.X.S.4.S.4.S.4.S.4.S.4.S.4...X....................0........q.W.S.4.X.:.................J...A...g.........................K.H.V.8..........................F..B.....................,.......................................B..............................................B..B..B..B..B...u..........................................B..B..B..B..B...{.................5.......k...........................................................7R..8F.................................................2........Vb..5C..;I..................R^.....................0................Xc..5C..5C..5C..5C..5C..5C..lv..........................................]i..<J..:G..Zf....................................................
                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Entropy (8bit):7.036734519788264
                                    TrID:
                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                    • DOS Executable Generic (2002/1) 0.02%
                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                    File name:file.exe
                                    File size:1'167'360 bytes
                                    MD5:cf2cd80a393670f0241c8c3740ac1ff2
                                    SHA1:5b964539130e93ea7ec8a36e0c08a0da84624ce9
                                    SHA256:64c99465ec6ccad13433eb32c6069b3f636efa881f027015d518576aa2bc6b31
                                    SHA512:870562c47963165ef45c947a78d62ab34356ed288b45efc7b2c82ad10cfe3c7791b3bba4827274b371019a4e3146add2c699553013a90c613d23ae76528bf4d8
                                    SSDEEP:24576:yqDEvCTbMWu7rQYlBQcBiT6rprG8arW2+b+HdiJUK:yTvC/MTQYxsWR7arW2+b+HoJU
                                    TLSH:0745CF027391C062FF9B92734F5AF6115BBC69260123E61F13981DBABE701B1563E7A3
                                    File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                    Icon Hash:aaf3e3e3938382a0
                                    Entrypoint:0x420577
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                    DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x66F647C7 [Fri Sep 27 05:51:03 2024 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:5
                                    OS Version Minor:1
                                    File Version Major:5
                                    File Version Minor:1
                                    Subsystem Version Major:5
                                    Subsystem Version Minor:1
                                    Import Hash:948cc502fe9226992dce9417f952fce3
                                    Instruction
                                    call 00007F2D506D11C3h
                                    jmp 00007F2D506D0ACFh
                                    push ebp
                                    mov ebp, esp
                                    push esi
                                    push dword ptr [ebp+08h]
                                    mov esi, ecx
                                    call 00007F2D506D0CADh
                                    mov dword ptr [esi], 0049FDF0h
                                    mov eax, esi
                                    pop esi
                                    pop ebp
                                    retn 0004h
                                    and dword ptr [ecx+04h], 00000000h
                                    mov eax, ecx
                                    and dword ptr [ecx+08h], 00000000h
                                    mov dword ptr [ecx+04h], 0049FDF8h
                                    mov dword ptr [ecx], 0049FDF0h
                                    ret
                                    push ebp
                                    mov ebp, esp
                                    push esi
                                    push dword ptr [ebp+08h]
                                    mov esi, ecx
                                    call 00007F2D506D0C7Ah
                                    mov dword ptr [esi], 0049FE0Ch
                                    mov eax, esi
                                    pop esi
                                    pop ebp
                                    retn 0004h
                                    and dword ptr [ecx+04h], 00000000h
                                    mov eax, ecx
                                    and dword ptr [ecx+08h], 00000000h
                                    mov dword ptr [ecx+04h], 0049FE14h
                                    mov dword ptr [ecx], 0049FE0Ch
                                    ret
                                    push ebp
                                    mov ebp, esp
                                    push esi
                                    mov esi, ecx
                                    lea eax, dword ptr [esi+04h]
                                    mov dword ptr [esi], 0049FDD0h
                                    and dword ptr [eax], 00000000h
                                    and dword ptr [eax+04h], 00000000h
                                    push eax
                                    mov eax, dword ptr [ebp+08h]
                                    add eax, 04h
                                    push eax
                                    call 00007F2D506D386Dh
                                    pop ecx
                                    pop ecx
                                    mov eax, esi
                                    pop esi
                                    pop ebp
                                    retn 0004h
                                    lea eax, dword ptr [ecx+04h]
                                    mov dword ptr [ecx], 0049FDD0h
                                    push eax
                                    call 00007F2D506D38B8h
                                    pop ecx
                                    ret
                                    push ebp
                                    mov ebp, esp
                                    push esi
                                    mov esi, ecx
                                    lea eax, dword ptr [esi+04h]
                                    mov dword ptr [esi], 0049FDD0h
                                    push eax
                                    call 00007F2D506D38A1h
                                    test byte ptr [ebp+08h], 00000001h
                                    pop ecx
                                    Programming Language:
                                    • [ C ] VS2008 SP1 build 30729
                                    • [IMP] VS2008 SP1 build 30729
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x46464.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x11b0000x7594.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .rsrc0xd40000x464640x46600dc60abdf4d5e28f74bcfd9fa124c33adFalse0.9059655306394316data7.844925484035475IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x11b0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                    RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                    RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                    RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                    RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                    RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                    RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                    RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                    RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                    RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                    RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                    RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                    RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                    RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                    RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                    RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                    RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                    RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                    RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                    RT_RCDATA0xdc7b80x3d72cdata1.0003416874592757
                                    RT_GROUP_ICON0x119ee40x76dataEnglishGreat Britain0.6610169491525424
                                    RT_GROUP_ICON0x119f5c0x14dataEnglishGreat Britain1.25
                                    RT_GROUP_ICON0x119f700x14dataEnglishGreat Britain1.15
                                    RT_GROUP_ICON0x119f840x14dataEnglishGreat Britain1.25
                                    RT_VERSION0x119f980xdcdataEnglishGreat Britain0.6181818181818182
                                    RT_MANIFEST0x11a0740x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                    DLLImport
                                    WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                    VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                    WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                    COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                    MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                    WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                    PSAPI.DLLGetProcessMemoryInfo
                                    IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                    USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                    UxTheme.dllIsThemeActive
                                    KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                    USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                    GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                    COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                    ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                    SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                    ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                    OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                    Language of compilation systemCountry where language is spokenMap
                                    EnglishGreat Britain
                                    TimestampSource PortDest PortSource IPDest IP
                                    Sep 27, 2024 08:39:58.711306095 CEST49674443192.168.2.523.1.237.91
                                    Sep 27, 2024 08:39:58.711314917 CEST49675443192.168.2.523.1.237.91
                                    Sep 27, 2024 08:39:58.820676088 CEST49673443192.168.2.523.1.237.91
                                    Sep 27, 2024 08:40:03.281742096 CEST49706443192.168.2.5142.250.185.78
                                    Sep 27, 2024 08:40:03.281749010 CEST44349706142.250.185.78192.168.2.5
                                    Sep 27, 2024 08:40:03.281838894 CEST49706443192.168.2.5142.250.185.78
                                    Sep 27, 2024 08:40:03.282989979 CEST49706443192.168.2.5142.250.185.78
                                    Sep 27, 2024 08:40:03.282998085 CEST44349706142.250.185.78192.168.2.5
                                    Sep 27, 2024 08:40:03.924787998 CEST44349706142.250.185.78192.168.2.5
                                    Sep 27, 2024 08:40:03.930515051 CEST49706443192.168.2.5142.250.185.78
                                    Sep 27, 2024 08:40:03.930531025 CEST44349706142.250.185.78192.168.2.5
                                    Sep 27, 2024 08:40:03.931183100 CEST44349706142.250.185.78192.168.2.5
                                    Sep 27, 2024 08:40:03.931250095 CEST49706443192.168.2.5142.250.185.78
                                    Sep 27, 2024 08:40:03.932216883 CEST44349706142.250.185.78192.168.2.5
                                    Sep 27, 2024 08:40:03.932274103 CEST49706443192.168.2.5142.250.185.78
                                    Sep 27, 2024 08:40:03.934431076 CEST49706443192.168.2.5142.250.185.78
                                    Sep 27, 2024 08:40:03.934580088 CEST49706443192.168.2.5142.250.185.78
                                    Sep 27, 2024 08:40:03.934585094 CEST44349706142.250.185.78192.168.2.5
                                    Sep 27, 2024 08:40:03.934660912 CEST44349706142.250.185.78192.168.2.5
                                    Sep 27, 2024 08:40:03.979970932 CEST49706443192.168.2.5142.250.185.78
                                    Sep 27, 2024 08:40:03.979979038 CEST44349706142.250.185.78192.168.2.5
                                    Sep 27, 2024 08:40:04.026803017 CEST49706443192.168.2.5142.250.185.78
                                    Sep 27, 2024 08:40:04.201570034 CEST44349706142.250.185.78192.168.2.5
                                    Sep 27, 2024 08:40:04.201766968 CEST44349706142.250.185.78192.168.2.5
                                    Sep 27, 2024 08:40:04.201828003 CEST49706443192.168.2.5142.250.185.78
                                    Sep 27, 2024 08:40:04.202274084 CEST49706443192.168.2.5142.250.185.78
                                    Sep 27, 2024 08:40:04.202287912 CEST44349706142.250.185.78192.168.2.5
                                    Sep 27, 2024 08:40:07.643979073 CEST49715443192.168.2.5216.58.212.164
                                    Sep 27, 2024 08:40:07.644104958 CEST44349715216.58.212.164192.168.2.5
                                    Sep 27, 2024 08:40:07.644200087 CEST49715443192.168.2.5216.58.212.164
                                    Sep 27, 2024 08:40:07.644401073 CEST49715443192.168.2.5216.58.212.164
                                    Sep 27, 2024 08:40:07.644438028 CEST44349715216.58.212.164192.168.2.5
                                    Sep 27, 2024 08:40:07.756165981 CEST49717443192.168.2.5184.28.90.27
                                    Sep 27, 2024 08:40:07.756176949 CEST44349717184.28.90.27192.168.2.5
                                    Sep 27, 2024 08:40:07.756257057 CEST49717443192.168.2.5184.28.90.27
                                    Sep 27, 2024 08:40:07.757697105 CEST49717443192.168.2.5184.28.90.27
                                    Sep 27, 2024 08:40:07.757713079 CEST44349717184.28.90.27192.168.2.5
                                    Sep 27, 2024 08:40:08.280714035 CEST44349715216.58.212.164192.168.2.5
                                    Sep 27, 2024 08:40:08.280909061 CEST49715443192.168.2.5216.58.212.164
                                    Sep 27, 2024 08:40:08.280936956 CEST44349715216.58.212.164192.168.2.5
                                    Sep 27, 2024 08:40:08.282440901 CEST44349715216.58.212.164192.168.2.5
                                    Sep 27, 2024 08:40:08.282505035 CEST49715443192.168.2.5216.58.212.164
                                    Sep 27, 2024 08:40:08.283576012 CEST49715443192.168.2.5216.58.212.164
                                    Sep 27, 2024 08:40:08.283659935 CEST44349715216.58.212.164192.168.2.5
                                    Sep 27, 2024 08:40:08.311305046 CEST49675443192.168.2.523.1.237.91
                                    Sep 27, 2024 08:40:08.311316013 CEST49674443192.168.2.523.1.237.91
                                    Sep 27, 2024 08:40:08.327403069 CEST49715443192.168.2.5216.58.212.164
                                    Sep 27, 2024 08:40:08.327424049 CEST44349715216.58.212.164192.168.2.5
                                    Sep 27, 2024 08:40:08.373512030 CEST49715443192.168.2.5216.58.212.164
                                    Sep 27, 2024 08:40:08.415318012 CEST44349717184.28.90.27192.168.2.5
                                    Sep 27, 2024 08:40:08.415396929 CEST49717443192.168.2.5184.28.90.27
                                    Sep 27, 2024 08:40:08.419653893 CEST49717443192.168.2.5184.28.90.27
                                    Sep 27, 2024 08:40:08.419665098 CEST44349717184.28.90.27192.168.2.5
                                    Sep 27, 2024 08:40:08.419893026 CEST44349717184.28.90.27192.168.2.5
                                    Sep 27, 2024 08:40:08.424143076 CEST49673443192.168.2.523.1.237.91
                                    Sep 27, 2024 08:40:08.468027115 CEST49717443192.168.2.5184.28.90.27
                                    Sep 27, 2024 08:40:08.480958939 CEST49717443192.168.2.5184.28.90.27
                                    Sep 27, 2024 08:40:08.523425102 CEST44349717184.28.90.27192.168.2.5
                                    Sep 27, 2024 08:40:08.691061974 CEST44349717184.28.90.27192.168.2.5
                                    Sep 27, 2024 08:40:08.691123962 CEST44349717184.28.90.27192.168.2.5
                                    Sep 27, 2024 08:40:08.691231966 CEST49717443192.168.2.5184.28.90.27
                                    Sep 27, 2024 08:40:08.694289923 CEST49717443192.168.2.5184.28.90.27
                                    Sep 27, 2024 08:40:08.694303036 CEST44349717184.28.90.27192.168.2.5
                                    Sep 27, 2024 08:40:08.974623919 CEST49721443192.168.2.5184.28.90.27
                                    Sep 27, 2024 08:40:08.974666119 CEST44349721184.28.90.27192.168.2.5
                                    Sep 27, 2024 08:40:08.974730968 CEST49721443192.168.2.5184.28.90.27
                                    Sep 27, 2024 08:40:08.974997997 CEST49721443192.168.2.5184.28.90.27
                                    Sep 27, 2024 08:40:08.975009918 CEST44349721184.28.90.27192.168.2.5
                                    Sep 27, 2024 08:40:09.646096945 CEST44349721184.28.90.27192.168.2.5
                                    Sep 27, 2024 08:40:09.646197081 CEST49721443192.168.2.5184.28.90.27
                                    Sep 27, 2024 08:40:09.647789001 CEST49721443192.168.2.5184.28.90.27
                                    Sep 27, 2024 08:40:09.647798061 CEST44349721184.28.90.27192.168.2.5
                                    Sep 27, 2024 08:40:09.648256063 CEST44349721184.28.90.27192.168.2.5
                                    Sep 27, 2024 08:40:09.650449991 CEST49721443192.168.2.5184.28.90.27
                                    Sep 27, 2024 08:40:09.695435047 CEST44349721184.28.90.27192.168.2.5
                                    Sep 27, 2024 08:40:09.928540945 CEST44349721184.28.90.27192.168.2.5
                                    Sep 27, 2024 08:40:09.928698063 CEST44349721184.28.90.27192.168.2.5
                                    Sep 27, 2024 08:40:09.928759098 CEST49721443192.168.2.5184.28.90.27
                                    Sep 27, 2024 08:40:09.929399967 CEST49721443192.168.2.5184.28.90.27
                                    Sep 27, 2024 08:40:09.929424047 CEST44349721184.28.90.27192.168.2.5
                                    Sep 27, 2024 08:40:09.929440975 CEST49721443192.168.2.5184.28.90.27
                                    Sep 27, 2024 08:40:09.929446936 CEST44349721184.28.90.27192.168.2.5
                                    Sep 27, 2024 08:40:10.182660103 CEST4434970323.1.237.91192.168.2.5
                                    Sep 27, 2024 08:40:10.182739973 CEST49703443192.168.2.523.1.237.91
                                    Sep 27, 2024 08:40:12.668673038 CEST49733443192.168.2.5172.217.16.206
                                    Sep 27, 2024 08:40:12.668759108 CEST44349733172.217.16.206192.168.2.5
                                    Sep 27, 2024 08:40:12.669068098 CEST49733443192.168.2.5172.217.16.206
                                    Sep 27, 2024 08:40:12.669373989 CEST49733443192.168.2.5172.217.16.206
                                    Sep 27, 2024 08:40:12.669409037 CEST44349733172.217.16.206192.168.2.5
                                    Sep 27, 2024 08:40:13.309324980 CEST44349733172.217.16.206192.168.2.5
                                    Sep 27, 2024 08:40:13.309659004 CEST49733443192.168.2.5172.217.16.206
                                    Sep 27, 2024 08:40:13.309686899 CEST44349733172.217.16.206192.168.2.5
                                    Sep 27, 2024 08:40:13.310273886 CEST44349733172.217.16.206192.168.2.5
                                    Sep 27, 2024 08:40:13.310353994 CEST49733443192.168.2.5172.217.16.206
                                    Sep 27, 2024 08:40:13.311275959 CEST44349733172.217.16.206192.168.2.5
                                    Sep 27, 2024 08:40:13.311331034 CEST49733443192.168.2.5172.217.16.206
                                    Sep 27, 2024 08:40:13.313497066 CEST49733443192.168.2.5172.217.16.206
                                    Sep 27, 2024 08:40:13.313600063 CEST44349733172.217.16.206192.168.2.5
                                    Sep 27, 2024 08:40:13.314383984 CEST49733443192.168.2.5172.217.16.206
                                    Sep 27, 2024 08:40:13.314393044 CEST44349733172.217.16.206192.168.2.5
                                    Sep 27, 2024 08:40:13.354319096 CEST49733443192.168.2.5172.217.16.206
                                    Sep 27, 2024 08:40:13.627216101 CEST44349733172.217.16.206192.168.2.5
                                    Sep 27, 2024 08:40:13.627408981 CEST44349733172.217.16.206192.168.2.5
                                    Sep 27, 2024 08:40:13.627513885 CEST49733443192.168.2.5172.217.16.206
                                    Sep 27, 2024 08:40:13.627547026 CEST44349733172.217.16.206192.168.2.5
                                    Sep 27, 2024 08:40:13.627595901 CEST49733443192.168.2.5172.217.16.206
                                    Sep 27, 2024 08:40:13.627713919 CEST44349733172.217.16.206192.168.2.5
                                    Sep 27, 2024 08:40:13.627774954 CEST49733443192.168.2.5172.217.16.206
                                    Sep 27, 2024 08:40:13.632868052 CEST44349733172.217.16.206192.168.2.5
                                    Sep 27, 2024 08:40:13.632958889 CEST49733443192.168.2.5172.217.16.206
                                    Sep 27, 2024 08:40:13.639127970 CEST44349733172.217.16.206192.168.2.5
                                    Sep 27, 2024 08:40:13.639231920 CEST49733443192.168.2.5172.217.16.206
                                    Sep 27, 2024 08:40:13.639239073 CEST44349733172.217.16.206192.168.2.5
                                    Sep 27, 2024 08:40:13.639292002 CEST49733443192.168.2.5172.217.16.206
                                    Sep 27, 2024 08:40:13.645658970 CEST44349733172.217.16.206192.168.2.5
                                    Sep 27, 2024 08:40:13.645726919 CEST49733443192.168.2.5172.217.16.206
                                    Sep 27, 2024 08:40:13.651767015 CEST44349733172.217.16.206192.168.2.5
                                    Sep 27, 2024 08:40:13.651907921 CEST49733443192.168.2.5172.217.16.206
                                    Sep 27, 2024 08:40:13.651935101 CEST44349733172.217.16.206192.168.2.5
                                    Sep 27, 2024 08:40:13.652004957 CEST49733443192.168.2.5172.217.16.206
                                    Sep 27, 2024 08:40:13.715442896 CEST44349733172.217.16.206192.168.2.5
                                    Sep 27, 2024 08:40:13.715553045 CEST44349733172.217.16.206192.168.2.5
                                    Sep 27, 2024 08:40:13.715565920 CEST49733443192.168.2.5172.217.16.206
                                    Sep 27, 2024 08:40:13.715594053 CEST44349733172.217.16.206192.168.2.5
                                    Sep 27, 2024 08:40:13.715689898 CEST49733443192.168.2.5172.217.16.206
                                    Sep 27, 2024 08:40:13.716406107 CEST44349733172.217.16.206192.168.2.5
                                    Sep 27, 2024 08:40:13.716464996 CEST49733443192.168.2.5172.217.16.206
                                    Sep 27, 2024 08:40:13.722882032 CEST44349733172.217.16.206192.168.2.5
                                    Sep 27, 2024 08:40:13.722951889 CEST49733443192.168.2.5172.217.16.206
                                    Sep 27, 2024 08:40:13.729094982 CEST44349733172.217.16.206192.168.2.5
                                    Sep 27, 2024 08:40:13.729185104 CEST49733443192.168.2.5172.217.16.206
                                    Sep 27, 2024 08:40:13.729218006 CEST44349733172.217.16.206192.168.2.5
                                    Sep 27, 2024 08:40:13.729270935 CEST49733443192.168.2.5172.217.16.206
                                    Sep 27, 2024 08:40:13.735321045 CEST44349733172.217.16.206192.168.2.5
                                    Sep 27, 2024 08:40:13.735411882 CEST49733443192.168.2.5172.217.16.206
                                    Sep 27, 2024 08:40:13.735425949 CEST44349733172.217.16.206192.168.2.5
                                    Sep 27, 2024 08:40:13.741719961 CEST44349733172.217.16.206192.168.2.5
                                    Sep 27, 2024 08:40:13.742721081 CEST49733443192.168.2.5172.217.16.206
                                    Sep 27, 2024 08:40:13.742736101 CEST44349733172.217.16.206192.168.2.5
                                    Sep 27, 2024 08:40:13.748011112 CEST44349733172.217.16.206192.168.2.5
                                    Sep 27, 2024 08:40:13.748334885 CEST44349733172.217.16.206192.168.2.5
                                    Sep 27, 2024 08:40:13.748425961 CEST49733443192.168.2.5172.217.16.206
                                    Sep 27, 2024 08:40:13.800153971 CEST49733443192.168.2.5172.217.16.206
                                    Sep 27, 2024 08:40:13.800185919 CEST44349733172.217.16.206192.168.2.5
                                    Sep 27, 2024 08:40:15.995765924 CEST49715443192.168.2.5216.58.212.164
                                    Sep 27, 2024 08:40:16.043435097 CEST44349715216.58.212.164192.168.2.5
                                    Sep 27, 2024 08:40:16.262597084 CEST44349715216.58.212.164192.168.2.5
                                    Sep 27, 2024 08:40:16.262722969 CEST44349715216.58.212.164192.168.2.5
                                    Sep 27, 2024 08:40:16.262797117 CEST49715443192.168.2.5216.58.212.164
                                    Sep 27, 2024 08:40:16.262815952 CEST44349715216.58.212.164192.168.2.5
                                    Sep 27, 2024 08:40:16.262845993 CEST44349715216.58.212.164192.168.2.5
                                    Sep 27, 2024 08:40:16.262896061 CEST49715443192.168.2.5216.58.212.164
                                    Sep 27, 2024 08:40:16.262933016 CEST44349715216.58.212.164192.168.2.5
                                    Sep 27, 2024 08:40:16.263259888 CEST44349715216.58.212.164192.168.2.5
                                    Sep 27, 2024 08:40:16.263324022 CEST49715443192.168.2.5216.58.212.164
                                    Sep 27, 2024 08:40:16.268758059 CEST49715443192.168.2.5216.58.212.164
                                    Sep 27, 2024 08:40:16.268776894 CEST44349715216.58.212.164192.168.2.5
                                    Sep 27, 2024 08:40:19.298839092 CEST49749443192.168.2.552.165.165.26
                                    Sep 27, 2024 08:40:19.298898935 CEST4434974952.165.165.26192.168.2.5
                                    Sep 27, 2024 08:40:19.298973083 CEST49749443192.168.2.552.165.165.26
                                    Sep 27, 2024 08:40:19.299979925 CEST49749443192.168.2.552.165.165.26
                                    Sep 27, 2024 08:40:19.299998045 CEST4434974952.165.165.26192.168.2.5
                                    Sep 27, 2024 08:40:19.976391077 CEST4434974952.165.165.26192.168.2.5
                                    Sep 27, 2024 08:40:19.976475000 CEST49749443192.168.2.552.165.165.26
                                    Sep 27, 2024 08:40:19.978427887 CEST49749443192.168.2.552.165.165.26
                                    Sep 27, 2024 08:40:19.978445053 CEST4434974952.165.165.26192.168.2.5
                                    Sep 27, 2024 08:40:19.978844881 CEST4434974952.165.165.26192.168.2.5
                                    Sep 27, 2024 08:40:20.025809050 CEST49749443192.168.2.552.165.165.26
                                    Sep 27, 2024 08:40:20.546396017 CEST49749443192.168.2.552.165.165.26
                                    Sep 27, 2024 08:40:20.591404915 CEST4434974952.165.165.26192.168.2.5
                                    Sep 27, 2024 08:40:20.766531944 CEST4434974952.165.165.26192.168.2.5
                                    Sep 27, 2024 08:40:20.766591072 CEST4434974952.165.165.26192.168.2.5
                                    Sep 27, 2024 08:40:20.766612053 CEST4434974952.165.165.26192.168.2.5
                                    Sep 27, 2024 08:40:20.766642094 CEST49749443192.168.2.552.165.165.26
                                    Sep 27, 2024 08:40:20.766653061 CEST4434974952.165.165.26192.168.2.5
                                    Sep 27, 2024 08:40:20.766685009 CEST4434974952.165.165.26192.168.2.5
                                    Sep 27, 2024 08:40:20.766688108 CEST49749443192.168.2.552.165.165.26
                                    Sep 27, 2024 08:40:20.766704082 CEST49749443192.168.2.552.165.165.26
                                    Sep 27, 2024 08:40:20.766758919 CEST4434974952.165.165.26192.168.2.5
                                    Sep 27, 2024 08:40:20.766807079 CEST49749443192.168.2.552.165.165.26
                                    Sep 27, 2024 08:40:20.766980886 CEST4434974952.165.165.26192.168.2.5
                                    Sep 27, 2024 08:40:20.767052889 CEST49749443192.168.2.552.165.165.26
                                    Sep 27, 2024 08:40:20.767065048 CEST4434974952.165.165.26192.168.2.5
                                    Sep 27, 2024 08:40:20.767180920 CEST4434974952.165.165.26192.168.2.5
                                    Sep 27, 2024 08:40:20.767239094 CEST49749443192.168.2.552.165.165.26
                                    Sep 27, 2024 08:40:21.262897015 CEST49749443192.168.2.552.165.165.26
                                    Sep 27, 2024 08:40:21.262928963 CEST4434974952.165.165.26192.168.2.5
                                    Sep 27, 2024 08:40:21.262964964 CEST49749443192.168.2.552.165.165.26
                                    Sep 27, 2024 08:40:21.262973070 CEST4434974952.165.165.26192.168.2.5
                                    Sep 27, 2024 08:40:57.833604097 CEST49760443192.168.2.552.165.165.26
                                    Sep 27, 2024 08:40:57.833661079 CEST4434976052.165.165.26192.168.2.5
                                    Sep 27, 2024 08:40:57.833748102 CEST49760443192.168.2.552.165.165.26
                                    Sep 27, 2024 08:40:57.834213972 CEST49760443192.168.2.552.165.165.26
                                    Sep 27, 2024 08:40:57.834233046 CEST4434976052.165.165.26192.168.2.5
                                    Sep 27, 2024 08:40:58.787309885 CEST4434976052.165.165.26192.168.2.5
                                    Sep 27, 2024 08:40:58.787391901 CEST49760443192.168.2.552.165.165.26
                                    Sep 27, 2024 08:40:58.792848110 CEST49760443192.168.2.552.165.165.26
                                    Sep 27, 2024 08:40:58.792870045 CEST4434976052.165.165.26192.168.2.5
                                    Sep 27, 2024 08:40:58.793343067 CEST4434976052.165.165.26192.168.2.5
                                    Sep 27, 2024 08:40:58.802819967 CEST49760443192.168.2.552.165.165.26
                                    Sep 27, 2024 08:40:58.843420029 CEST4434976052.165.165.26192.168.2.5
                                    Sep 27, 2024 08:40:59.044631958 CEST4434976052.165.165.26192.168.2.5
                                    Sep 27, 2024 08:40:59.044668913 CEST4434976052.165.165.26192.168.2.5
                                    Sep 27, 2024 08:40:59.044688940 CEST4434976052.165.165.26192.168.2.5
                                    Sep 27, 2024 08:40:59.044748068 CEST49760443192.168.2.552.165.165.26
                                    Sep 27, 2024 08:40:59.044789076 CEST4434976052.165.165.26192.168.2.5
                                    Sep 27, 2024 08:40:59.044809103 CEST49760443192.168.2.552.165.165.26
                                    Sep 27, 2024 08:40:59.044842005 CEST49760443192.168.2.552.165.165.26
                                    Sep 27, 2024 08:40:59.046530008 CEST4434976052.165.165.26192.168.2.5
                                    Sep 27, 2024 08:40:59.046581030 CEST4434976052.165.165.26192.168.2.5
                                    Sep 27, 2024 08:40:59.046642065 CEST49760443192.168.2.552.165.165.26
                                    Sep 27, 2024 08:40:59.046649933 CEST4434976052.165.165.26192.168.2.5
                                    Sep 27, 2024 08:40:59.046672106 CEST4434976052.165.165.26192.168.2.5
                                    Sep 27, 2024 08:40:59.046700954 CEST49760443192.168.2.552.165.165.26
                                    Sep 27, 2024 08:40:59.046730995 CEST49760443192.168.2.552.165.165.26
                                    Sep 27, 2024 08:40:59.059079885 CEST49760443192.168.2.552.165.165.26
                                    Sep 27, 2024 08:40:59.059108019 CEST4434976052.165.165.26192.168.2.5
                                    Sep 27, 2024 08:40:59.059119940 CEST49760443192.168.2.552.165.165.26
                                    Sep 27, 2024 08:40:59.059128046 CEST4434976052.165.165.26192.168.2.5
                                    Sep 27, 2024 08:41:07.688386917 CEST49762443192.168.2.5216.58.212.164
                                    Sep 27, 2024 08:41:07.688498974 CEST44349762216.58.212.164192.168.2.5
                                    Sep 27, 2024 08:41:07.688632965 CEST49762443192.168.2.5216.58.212.164
                                    Sep 27, 2024 08:41:07.688874006 CEST49762443192.168.2.5216.58.212.164
                                    Sep 27, 2024 08:41:07.688901901 CEST44349762216.58.212.164192.168.2.5
                                    Sep 27, 2024 08:41:08.342519045 CEST44349762216.58.212.164192.168.2.5
                                    Sep 27, 2024 08:41:08.343028069 CEST49762443192.168.2.5216.58.212.164
                                    Sep 27, 2024 08:41:08.343063116 CEST44349762216.58.212.164192.168.2.5
                                    Sep 27, 2024 08:41:08.344266891 CEST44349762216.58.212.164192.168.2.5
                                    Sep 27, 2024 08:41:08.344682932 CEST49762443192.168.2.5216.58.212.164
                                    Sep 27, 2024 08:41:08.344892979 CEST44349762216.58.212.164192.168.2.5
                                    Sep 27, 2024 08:41:08.385070086 CEST49762443192.168.2.5216.58.212.164
                                    Sep 27, 2024 08:41:14.559212923 CEST49764443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:14.559262037 CEST44349764216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:14.559374094 CEST49764443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:14.559705973 CEST49764443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:14.559722900 CEST44349764216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:15.194969893 CEST44349764216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:15.195281029 CEST49764443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:15.195311069 CEST44349764216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:15.196496964 CEST44349764216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:15.196829081 CEST49764443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:15.196913958 CEST44349764216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:15.197005033 CEST49764443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:15.197021008 CEST49764443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:15.197037935 CEST44349764216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:15.576849937 CEST44349764216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:15.576980114 CEST44349764216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:15.577033043 CEST49764443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:15.577554941 CEST49764443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:15.577581882 CEST44349764216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:15.840701103 CEST49765443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:15.840768099 CEST44349765216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:15.840858936 CEST49765443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:15.841476917 CEST49765443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:15.841495037 CEST44349765216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:16.472717047 CEST44349765216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:16.473134995 CEST49765443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:16.473165989 CEST44349765216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:16.473706961 CEST44349765216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:16.474097013 CEST49765443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:16.474191904 CEST44349765216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:16.474287033 CEST49765443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:16.474345922 CEST49765443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:16.474351883 CEST44349765216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:16.854739904 CEST44349765216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:16.854938984 CEST44349765216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:16.855000019 CEST49765443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:16.858194113 CEST49765443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:16.858220100 CEST44349765216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:18.239645004 CEST44349762216.58.212.164192.168.2.5
                                    Sep 27, 2024 08:41:18.239855051 CEST44349762216.58.212.164192.168.2.5
                                    Sep 27, 2024 08:41:18.239939928 CEST49762443192.168.2.5216.58.212.164
                                    Sep 27, 2024 08:41:31.375365019 CEST49762443192.168.2.5216.58.212.164
                                    Sep 27, 2024 08:41:31.375417948 CEST44349762216.58.212.164192.168.2.5
                                    Sep 27, 2024 08:41:44.702163935 CEST49767443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:44.702229023 CEST44349767216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:44.702445030 CEST49767443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:44.705156088 CEST49767443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:44.705173969 CEST44349767216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:45.344362020 CEST44349767216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:45.344665051 CEST49767443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:45.344691038 CEST44349767216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:45.345067024 CEST44349767216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:45.345434904 CEST49767443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:45.345499039 CEST44349767216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:45.345618010 CEST49767443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:45.345633030 CEST49767443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:45.345642090 CEST44349767216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:45.643654108 CEST44349767216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:45.644249916 CEST44349767216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:45.644328117 CEST49767443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:45.644448996 CEST49767443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:45.644470930 CEST44349767216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:49.436755896 CEST49768443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:49.436805010 CEST44349768216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:49.436872959 CEST49768443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:49.437794924 CEST49768443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:49.437813044 CEST44349768216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:50.075807095 CEST44349768216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:50.076093912 CEST49768443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:50.076108932 CEST44349768216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:50.076487064 CEST44349768216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:50.076778889 CEST49768443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:50.076844931 CEST44349768216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:50.076925039 CEST49768443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:50.076971054 CEST49768443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:50.077008963 CEST44349768216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:50.374552011 CEST44349768216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:50.375726938 CEST44349768216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:41:50.375854015 CEST49768443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:50.379625082 CEST49768443192.168.2.5216.58.212.142
                                    Sep 27, 2024 08:41:50.379648924 CEST44349768216.58.212.142192.168.2.5
                                    Sep 27, 2024 08:42:07.743521929 CEST49769443192.168.2.5216.58.212.164
                                    Sep 27, 2024 08:42:07.743585110 CEST44349769216.58.212.164192.168.2.5
                                    Sep 27, 2024 08:42:07.743652105 CEST49769443192.168.2.5216.58.212.164
                                    Sep 27, 2024 08:42:07.743949890 CEST49769443192.168.2.5216.58.212.164
                                    Sep 27, 2024 08:42:07.743968010 CEST44349769216.58.212.164192.168.2.5
                                    Sep 27, 2024 08:42:08.394524097 CEST44349769216.58.212.164192.168.2.5
                                    Sep 27, 2024 08:42:08.396567106 CEST49769443192.168.2.5216.58.212.164
                                    Sep 27, 2024 08:42:08.396605968 CEST44349769216.58.212.164192.168.2.5
                                    Sep 27, 2024 08:42:08.397068977 CEST44349769216.58.212.164192.168.2.5
                                    Sep 27, 2024 08:42:08.400371075 CEST49769443192.168.2.5216.58.212.164
                                    Sep 27, 2024 08:42:08.400460005 CEST44349769216.58.212.164192.168.2.5
                                    Sep 27, 2024 08:42:08.448015928 CEST49769443192.168.2.5216.58.212.164
                                    TimestampSource PortDest PortSource IPDest IP
                                    Sep 27, 2024 08:40:03.228066921 CEST5933353192.168.2.51.1.1.1
                                    Sep 27, 2024 08:40:03.228199005 CEST6430253192.168.2.51.1.1.1
                                    Sep 27, 2024 08:40:03.234786034 CEST53642241.1.1.1192.168.2.5
                                    Sep 27, 2024 08:40:03.235022068 CEST53593331.1.1.1192.168.2.5
                                    Sep 27, 2024 08:40:03.235512972 CEST53643021.1.1.1192.168.2.5
                                    Sep 27, 2024 08:40:03.255368948 CEST53588371.1.1.1192.168.2.5
                                    Sep 27, 2024 08:40:04.204627991 CEST5043353192.168.2.51.1.1.1
                                    Sep 27, 2024 08:40:04.204757929 CEST6045953192.168.2.51.1.1.1
                                    Sep 27, 2024 08:40:04.211282969 CEST53604591.1.1.1192.168.2.5
                                    Sep 27, 2024 08:40:04.211508989 CEST53504331.1.1.1192.168.2.5
                                    Sep 27, 2024 08:40:04.280678034 CEST53579441.1.1.1192.168.2.5
                                    Sep 27, 2024 08:40:07.636009932 CEST5779853192.168.2.51.1.1.1
                                    Sep 27, 2024 08:40:07.636147022 CEST6014953192.168.2.51.1.1.1
                                    Sep 27, 2024 08:40:07.642704964 CEST53577981.1.1.1192.168.2.5
                                    Sep 27, 2024 08:40:07.643173933 CEST53601491.1.1.1192.168.2.5
                                    Sep 27, 2024 08:40:07.752481937 CEST53590031.1.1.1192.168.2.5
                                    Sep 27, 2024 08:40:09.403914928 CEST53566631.1.1.1192.168.2.5
                                    Sep 27, 2024 08:40:12.623945951 CEST5386853192.168.2.51.1.1.1
                                    Sep 27, 2024 08:40:12.624558926 CEST5318353192.168.2.51.1.1.1
                                    Sep 27, 2024 08:40:12.630640030 CEST53538681.1.1.1192.168.2.5
                                    Sep 27, 2024 08:40:12.631274939 CEST53531831.1.1.1192.168.2.5
                                    Sep 27, 2024 08:40:14.122323990 CEST6465953192.168.2.51.1.1.1
                                    Sep 27, 2024 08:40:14.122627020 CEST5290153192.168.2.51.1.1.1
                                    Sep 27, 2024 08:40:14.129134893 CEST53529011.1.1.1192.168.2.5
                                    Sep 27, 2024 08:40:14.129256010 CEST53646591.1.1.1192.168.2.5
                                    Sep 27, 2024 08:40:21.597171068 CEST53601091.1.1.1192.168.2.5
                                    Sep 27, 2024 08:40:40.610719919 CEST53561921.1.1.1192.168.2.5
                                    Sep 27, 2024 08:41:02.989607096 CEST53555791.1.1.1192.168.2.5
                                    Sep 27, 2024 08:41:03.580579996 CEST53576631.1.1.1192.168.2.5
                                    Sep 27, 2024 08:41:14.539335012 CEST53568401.1.1.1192.168.2.5
                                    Sep 27, 2024 08:41:14.551194906 CEST4924153192.168.2.51.1.1.1
                                    Sep 27, 2024 08:41:14.551656961 CEST5786753192.168.2.51.1.1.1
                                    Sep 27, 2024 08:41:14.557737112 CEST53492411.1.1.1192.168.2.5
                                    Sep 27, 2024 08:41:14.558439016 CEST53578671.1.1.1192.168.2.5
                                    Sep 27, 2024 08:41:31.382518053 CEST53615021.1.1.1192.168.2.5
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Sep 27, 2024 08:40:03.228066921 CEST192.168.2.51.1.1.10x9f49Standard query (0)youtube.comA (IP address)IN (0x0001)false
                                    Sep 27, 2024 08:40:03.228199005 CEST192.168.2.51.1.1.10x67a8Standard query (0)youtube.com65IN (0x0001)false
                                    Sep 27, 2024 08:40:04.204627991 CEST192.168.2.51.1.1.10x4c2bStandard query (0)www.youtube.comA (IP address)IN (0x0001)false
                                    Sep 27, 2024 08:40:04.204757929 CEST192.168.2.51.1.1.10xa7eeStandard query (0)www.youtube.com65IN (0x0001)false
                                    Sep 27, 2024 08:40:07.636009932 CEST192.168.2.51.1.1.10x8a9dStandard query (0)www.google.comA (IP address)IN (0x0001)false
                                    Sep 27, 2024 08:40:07.636147022 CEST192.168.2.51.1.1.10x4cf5Standard query (0)www.google.com65IN (0x0001)false
                                    Sep 27, 2024 08:40:12.623945951 CEST192.168.2.51.1.1.10x5396Standard query (0)accounts.youtube.comA (IP address)IN (0x0001)false
                                    Sep 27, 2024 08:40:12.624558926 CEST192.168.2.51.1.1.10x4bbaStandard query (0)accounts.youtube.com65IN (0x0001)false
                                    Sep 27, 2024 08:40:14.122323990 CEST192.168.2.51.1.1.10x108cStandard query (0)play.google.comA (IP address)IN (0x0001)false
                                    Sep 27, 2024 08:40:14.122627020 CEST192.168.2.51.1.1.10x7b8bStandard query (0)play.google.com65IN (0x0001)false
                                    Sep 27, 2024 08:41:14.551194906 CEST192.168.2.51.1.1.10x2e01Standard query (0)play.google.comA (IP address)IN (0x0001)false
                                    Sep 27, 2024 08:41:14.551656961 CEST192.168.2.51.1.1.10xdcbcStandard query (0)play.google.com65IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Sep 27, 2024 08:40:03.235022068 CEST1.1.1.1192.168.2.50x9f49No error (0)youtube.com142.250.185.78A (IP address)IN (0x0001)false
                                    Sep 27, 2024 08:40:03.235512972 CEST1.1.1.1192.168.2.50x67a8No error (0)youtube.com65IN (0x0001)false
                                    Sep 27, 2024 08:40:04.211282969 CEST1.1.1.1192.168.2.50xa7eeNo error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                                    Sep 27, 2024 08:40:04.211282969 CEST1.1.1.1192.168.2.50xa7eeNo error (0)youtube-ui.l.google.com65IN (0x0001)false
                                    Sep 27, 2024 08:40:04.211508989 CEST1.1.1.1192.168.2.50x4c2bNo error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                                    Sep 27, 2024 08:40:04.211508989 CEST1.1.1.1192.168.2.50x4c2bNo error (0)youtube-ui.l.google.com142.250.181.238A (IP address)IN (0x0001)false
                                    Sep 27, 2024 08:40:04.211508989 CEST1.1.1.1192.168.2.50x4c2bNo error (0)youtube-ui.l.google.com172.217.16.206A (IP address)IN (0x0001)false
                                    Sep 27, 2024 08:40:04.211508989 CEST1.1.1.1192.168.2.50x4c2bNo error (0)youtube-ui.l.google.com142.250.185.238A (IP address)IN (0x0001)false
                                    Sep 27, 2024 08:40:04.211508989 CEST1.1.1.1192.168.2.50x4c2bNo error (0)youtube-ui.l.google.com142.250.186.174A (IP address)IN (0x0001)false
                                    Sep 27, 2024 08:40:04.211508989 CEST1.1.1.1192.168.2.50x4c2bNo error (0)youtube-ui.l.google.com216.58.206.78A (IP address)IN (0x0001)false
                                    Sep 27, 2024 08:40:04.211508989 CEST1.1.1.1192.168.2.50x4c2bNo error (0)youtube-ui.l.google.com216.58.206.46A (IP address)IN (0x0001)false
                                    Sep 27, 2024 08:40:04.211508989 CEST1.1.1.1192.168.2.50x4c2bNo error (0)youtube-ui.l.google.com142.250.184.238A (IP address)IN (0x0001)false
                                    Sep 27, 2024 08:40:04.211508989 CEST1.1.1.1192.168.2.50x4c2bNo error (0)youtube-ui.l.google.com142.250.74.206A (IP address)IN (0x0001)false
                                    Sep 27, 2024 08:40:04.211508989 CEST1.1.1.1192.168.2.50x4c2bNo error (0)youtube-ui.l.google.com142.250.185.142A (IP address)IN (0x0001)false
                                    Sep 27, 2024 08:40:04.211508989 CEST1.1.1.1192.168.2.50x4c2bNo error (0)youtube-ui.l.google.com142.250.186.110A (IP address)IN (0x0001)false
                                    Sep 27, 2024 08:40:04.211508989 CEST1.1.1.1192.168.2.50x4c2bNo error (0)youtube-ui.l.google.com142.250.185.206A (IP address)IN (0x0001)false
                                    Sep 27, 2024 08:40:04.211508989 CEST1.1.1.1192.168.2.50x4c2bNo error (0)youtube-ui.l.google.com142.250.186.46A (IP address)IN (0x0001)false
                                    Sep 27, 2024 08:40:04.211508989 CEST1.1.1.1192.168.2.50x4c2bNo error (0)youtube-ui.l.google.com172.217.16.142A (IP address)IN (0x0001)false
                                    Sep 27, 2024 08:40:04.211508989 CEST1.1.1.1192.168.2.50x4c2bNo error (0)youtube-ui.l.google.com172.217.18.14A (IP address)IN (0x0001)false
                                    Sep 27, 2024 08:40:04.211508989 CEST1.1.1.1192.168.2.50x4c2bNo error (0)youtube-ui.l.google.com142.250.184.206A (IP address)IN (0x0001)false
                                    Sep 27, 2024 08:40:04.211508989 CEST1.1.1.1192.168.2.50x4c2bNo error (0)youtube-ui.l.google.com142.250.185.174A (IP address)IN (0x0001)false
                                    Sep 27, 2024 08:40:07.642704964 CEST1.1.1.1192.168.2.50x8a9dNo error (0)www.google.com216.58.212.164A (IP address)IN (0x0001)false
                                    Sep 27, 2024 08:40:07.643173933 CEST1.1.1.1192.168.2.50x4cf5No error (0)www.google.com65IN (0x0001)false
                                    Sep 27, 2024 08:40:12.630640030 CEST1.1.1.1192.168.2.50x5396No error (0)accounts.youtube.comwww3.l.google.comCNAME (Canonical name)IN (0x0001)false
                                    Sep 27, 2024 08:40:12.630640030 CEST1.1.1.1192.168.2.50x5396No error (0)www3.l.google.com172.217.16.206A (IP address)IN (0x0001)false
                                    Sep 27, 2024 08:40:12.631274939 CEST1.1.1.1192.168.2.50x4bbaNo error (0)accounts.youtube.comwww3.l.google.comCNAME (Canonical name)IN (0x0001)false
                                    Sep 27, 2024 08:40:14.129256010 CEST1.1.1.1192.168.2.50x108cNo error (0)play.google.com142.250.181.238A (IP address)IN (0x0001)false
                                    Sep 27, 2024 08:41:14.557737112 CEST1.1.1.1192.168.2.50x2e01No error (0)play.google.com216.58.212.142A (IP address)IN (0x0001)false
                                    • youtube.com
                                    • fs.microsoft.com
                                    • https:
                                      • accounts.youtube.com
                                      • www.google.com
                                      • play.google.com
                                    • slscr.update.microsoft.com
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.549706142.250.185.784436084C:\Program Files\Google\Chrome\Application\chrome.exe
                                    TimestampBytes transferredDirectionData
                                    2024-09-27 06:40:03 UTC859OUTGET /account?=https://accounts.google.com/v3/signin/challenge/pwd HTTP/1.1
                                    Host: youtube.com
                                    Connection: keep-alive
                                    sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                    sec-ch-ua-mobile: ?0
                                    sec-ch-ua-platform: "Windows"
                                    Upgrade-Insecure-Requests: 1
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                    X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIk6HLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                                    Sec-Fetch-Site: none
                                    Sec-Fetch-Mode: navigate
                                    Sec-Fetch-User: ?1
                                    Sec-Fetch-Dest: document
                                    Accept-Encoding: gzip, deflate, br
                                    Accept-Language: en-US,en;q=0.9
                                    2024-09-27 06:40:04 UTC1726INHTTP/1.1 301 Moved Permanently
                                    Content-Type: application/binary
                                    X-Content-Type-Options: nosniff
                                    Expires: Fri, 27 Sep 2024 06:40:04 GMT
                                    Date: Fri, 27 Sep 2024 06:40:04 GMT
                                    Cache-Control: private, max-age=31536000
                                    Location: https://www.youtube.com/account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd
                                    X-Frame-Options: SAMEORIGIN
                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                    Vary: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                    Origin-Trial: AmhMBR6zCLzDDxpW+HfpP67BqwIknWnyMOXOQGfzYswFmJe+fgaI6XZgAzcxOrzNtP7hEDsOo1jdjFnVr2IdxQ4AAAB4eyJvcmlnaW4iOiJodHRwczovL3lvdXR1YmUuY29tOjQ0MyIsImZlYXR1cmUiOiJXZWJWaWV3WFJlcXVlc3RlZFdpdGhEZXByZWNhdGlvbiIsImV4cGlyeSI6MTc1ODA2NzE5OSwiaXNTdWJkb21haW4iOnRydWV9
                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /cspreport
                                    Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="youtube_main"
                                    Report-To: {"group":"youtube_main","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/youtube_main"}]}
                                    Server: ESF
                                    Content-Length: 0
                                    X-XSS-Protection: 0
                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                    Connection: close


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    1192.168.2.549717184.28.90.27443
                                    TimestampBytes transferredDirectionData
                                    2024-09-27 06:40:08 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
                                    Connection: Keep-Alive
                                    Accept: */*
                                    Accept-Encoding: identity
                                    User-Agent: Microsoft BITS/7.8
                                    Host: fs.microsoft.com
                                    2024-09-27 06:40:08 UTC466INHTTP/1.1 200 OK
                                    Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                                    Content-Type: application/octet-stream
                                    ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                                    Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                                    Server: ECAcc (lpl/EF67)
                                    X-CID: 11
                                    X-Ms-ApiVersion: Distribute 1.2
                                    X-Ms-Region: prod-weu-z1
                                    Cache-Control: public, max-age=36366
                                    Date: Fri, 27 Sep 2024 06:40:08 GMT
                                    Connection: close
                                    X-CID: 2


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    2192.168.2.549721184.28.90.27443
                                    TimestampBytes transferredDirectionData
                                    2024-09-27 06:40:09 UTC239OUTGET /fs/windows/config.json HTTP/1.1
                                    Connection: Keep-Alive
                                    Accept: */*
                                    Accept-Encoding: identity
                                    If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
                                    Range: bytes=0-2147483646
                                    User-Agent: Microsoft BITS/7.8
                                    Host: fs.microsoft.com
                                    2024-09-27 06:40:09 UTC514INHTTP/1.1 200 OK
                                    ApiVersion: Distribute 1.1
                                    Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                                    Content-Type: application/octet-stream
                                    ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                                    Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                                    Server: ECAcc (lpl/EF06)
                                    X-CID: 11
                                    X-Ms-ApiVersion: Distribute 1.2
                                    X-Ms-Region: prod-weu-z1
                                    Cache-Control: public, max-age=36311
                                    Date: Fri, 27 Sep 2024 06:40:09 GMT
                                    Content-Length: 55
                                    Connection: close
                                    X-CID: 2
                                    2024-09-27 06:40:09 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
                                    Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    3192.168.2.549733172.217.16.2064436084C:\Program Files\Google\Chrome\Application\chrome.exe
                                    TimestampBytes transferredDirectionData
                                    2024-09-27 06:40:13 UTC1244OUTGET /accounts/CheckConnection?pmpo=https%3A%2F%2Faccounts.google.com&v=1216369817&timestamp=1727419211953 HTTP/1.1
                                    Host: accounts.youtube.com
                                    Connection: keep-alive
                                    sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                    sec-ch-ua-mobile: ?0
                                    sec-ch-ua-full-version: "117.0.5938.132"
                                    sec-ch-ua-arch: "x86"
                                    sec-ch-ua-platform: "Windows"
                                    sec-ch-ua-platform-version: "10.0.0"
                                    sec-ch-ua-model: ""
                                    sec-ch-ua-bitness: "64"
                                    sec-ch-ua-wow64: ?0
                                    sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                    Upgrade-Insecure-Requests: 1
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                    X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIk6HLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                                    Sec-Fetch-Site: cross-site
                                    Sec-Fetch-Mode: navigate
                                    Sec-Fetch-User: ?1
                                    Sec-Fetch-Dest: iframe
                                    Referer: https://accounts.google.com/
                                    Accept-Encoding: gzip, deflate, br
                                    Accept-Language: en-US,en;q=0.9
                                    2024-09-27 06:40:13 UTC1979INHTTP/1.1 200 OK
                                    Content-Type: text/html; charset=utf-8
                                    X-Frame-Options: ALLOW-FROM https://accounts.google.com
                                    Content-Security-Policy: frame-ancestors https://accounts.google.com
                                    Content-Security-Policy: script-src 'report-sample' 'nonce-LBBiW33gqKSBBofM380INA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport;worker-src 'self'
                                    Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport/allowlist
                                    Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport
                                    Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                    Pragma: no-cache
                                    Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                    Date: Fri, 27 Sep 2024 06:40:13 GMT
                                    Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                    Cross-Origin-Opener-Policy: same-origin
                                    Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                    Cross-Origin-Resource-Policy: cross-origin
                                    reporting-endpoints: default="/_/AccountsDomainCookiesCheckConnectionHttp/web-reports?context=eJzjctDikmJw05BikPj6kkkDiJ3SZ7AGAXHSv_OsRUC8JOIi66HEi6yXuy-xXgdi1Z5LrKZAXCRxhbUJiIV4OM4uu7mdTeDGpUefGJX0kvIL4zNTUvNKMksqU_JzEzPzkvPzszNTi4tTi8pSi-KNDIxMDCyNjPQMLOILDAC_zDIC"
                                    Server: ESF
                                    X-XSS-Protection: 0
                                    X-Content-Type-Options: nosniff
                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                    Accept-Ranges: none
                                    Vary: Accept-Encoding
                                    Connection: close
                                    Transfer-Encoding: chunked
                                    2024-09-27 06:40:13 UTC1979INData Raw: 37 36 31 39 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 20 6e 6f 6e 63 65 3d 22 4c 42 42 69 57 33 33 67 71 4b 53 42 42 6f 66 4d 33 38 30 49 4e 41 22 3e 22 75 73 65 20 73 74 72 69 63 74 22 3b 74 68 69 73 2e 64 65 66 61 75 6c 74 5f 41 63 63 6f 75 6e 74 73 44 6f 6d 61 69 6e 63 6f 6f 6b 69 65 73 43 68 65 63 6b 63 6f 6e 6e 65 63 74 69 6f 6e 4a 73 3d 74 68 69 73 2e 64 65 66 61 75 6c 74 5f 41 63 63 6f 75 6e 74 73 44 6f 6d 61 69 6e 63 6f 6f 6b 69 65 73 43 68 65 63 6b 63 6f 6e 6e 65 63 74 69 6f 6e 4a 73 7c 7c 7b 7d 3b 28 66 75 6e 63 74 69 6f 6e 28 5f 29 7b 76 61 72 20 77 69 6e 64 6f 77 3d 74 68 69 73 3b 0a 74 72 79 7b 0a 5f 2e 5f 46 5f 74 6f 67 67 6c 65 73 5f 69 6e 69 74 69 61 6c 69 7a 65 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 28 74 79 70 65 6f
                                    Data Ascii: 7619<html><head><script nonce="LBBiW33gqKSBBofM380INA">"use strict";this.default_AccountsDomaincookiesCheckconnectionJs=this.default_AccountsDomaincookiesCheckconnectionJs||{};(function(_){var window=this;try{_._F_toggles_initialize=function(a){(typeo
                                    2024-09-27 06:40:13 UTC1979INData Raw: 5c 64 2e 5c 64 29 2f 2e 65 78 65 63 28 62 29 2c 0a 63 5b 31 5d 3d 3d 22 37 2e 30 22 29 69 66 28 62 26 26 62 5b 31 5d 29 73 77 69 74 63 68 28 62 5b 31 5d 29 7b 63 61 73 65 20 22 34 2e 30 22 3a 61 3d 22 38 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 35 2e 30 22 3a 61 3d 22 39 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 36 2e 30 22 3a 61 3d 22 31 30 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 37 2e 30 22 3a 61 3d 22 31 31 2e 30 22 7d 65 6c 73 65 20 61 3d 22 37 2e 30 22 3b 65 6c 73 65 20 61 3d 63 5b 31 5d 3b 62 3d 61 7d 65 6c 73 65 20 62 3d 22 22 3b 72 65 74 75 72 6e 20 62 7d 76 61 72 20 64 3d 52 65 67 45 78 70 28 22 28 5b 41 2d 5a 5d 5b 5c 5c 77 20 5d 2b 29 2f 28 5b 5e 5c 5c 73 5d 2b 29 5c 5c 73 2a 28 3f 3a 5c 5c 28 28 2e 2a 3f 29 5c 5c 29 29 3f
                                    Data Ascii: \d.\d)/.exec(b),c[1]=="7.0")if(b&&b[1])switch(b[1]){case "4.0":a="8.0";break;case "5.0":a="9.0";break;case "6.0":a="10.0";break;case "7.0":a="11.0"}else a="7.0";else a=c[1];b=a}else b="";return b}var d=RegExp("([A-Z][\\w ]+)/([^\\s]+)\\s*(?:\\((.*?)\\))?
                                    2024-09-27 06:40:13 UTC1979INData Raw: 6e 75 6d 62 65 72 22 3a 72 65 74 75 72 6e 20 69 73 46 69 6e 69 74 65 28 61 29 3f 61 3a 53 74 72 69 6e 67 28 61 29 3b 63 61 73 65 20 22 62 69 67 69 6e 74 22 3a 72 65 74 75 72 6e 28 41 61 3f 0a 61 3e 3d 42 61 26 26 61 3c 3d 43 61 3a 61 5b 30 5d 3d 3d 3d 22 2d 22 3f 75 61 28 61 2c 44 61 29 3a 75 61 28 61 2c 45 61 29 29 3f 4e 75 6d 62 65 72 28 61 29 3a 53 74 72 69 6e 67 28 61 29 3b 63 61 73 65 20 22 62 6f 6f 6c 65 61 6e 22 3a 72 65 74 75 72 6e 20 61 3f 31 3a 30 3b 63 61 73 65 20 22 6f 62 6a 65 63 74 22 3a 69 66 28 61 29 69 66 28 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 61 29 29 7b 69 66 28 43 28 61 29 29 72 65 74 75 72 6e 7d 65 6c 73 65 20 69 66 28 46 61 26 26 61 21 3d 6e 75 6c 6c 26 26 61 20 69 6e 73 74 61 6e 63 65 6f 66 20 55 69 6e 74 38 41 72 72 61 79 29
                                    Data Ascii: number":return isFinite(a)?a:String(a);case "bigint":return(Aa?a>=Ba&&a<=Ca:a[0]==="-"?ua(a,Da):ua(a,Ea))?Number(a):String(a);case "boolean":return a?1:0;case "object":if(a)if(Array.isArray(a)){if(C(a))return}else if(Fa&&a!=null&&a instanceof Uint8Array)
                                    2024-09-27 06:40:13 UTC1979INData Raw: 61 73 28 61 29 26 26 28 62 3d 61 2e 43 29 29 66 6f 72 28 76 61 72 20 63 3d 30 3b 63 3c 62 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 7b 76 61 72 20 64 3d 62 5b 63 5d 3b 69 66 28 63 3d 3d 3d 62 2e 6c 65 6e 67 74 68 2d 31 26 26 41 28 64 29 29 66 6f 72 28 76 61 72 20 65 20 69 6e 20 64 29 7b 76 61 72 20 66 3d 64 5b 65 5d 3b 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 66 29 26 26 0a 52 61 28 66 2c 61 29 7d 65 6c 73 65 20 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 64 29 26 26 52 61 28 64 2c 61 29 7d 61 3d 45 3f 61 2e 43 3a 4d 61 28 61 2e 43 2c 50 61 2c 76 6f 69 64 20 30 2c 76 6f 69 64 20 30 2c 21 31 29 3b 65 3d 21 45 3b 69 66 28 62 3d 61 2e 6c 65 6e 67 74 68 29 7b 64 3d 61 5b 62 2d 31 5d 3b 28 66 3d 41 28 64 29 29 3f 62 2d 2d 3a 64 3d 76 6f 69 64 20 30 3b 63 3d 61 3b 69
                                    Data Ascii: as(a)&&(b=a.C))for(var c=0;c<b.length;c++){var d=b[c];if(c===b.length-1&&A(d))for(var e in d){var f=d[e];Array.isArray(f)&&Ra(f,a)}else Array.isArray(d)&&Ra(d,a)}a=E?a.C:Ma(a.C,Pa,void 0,void 0,!1);e=!E;if(b=a.length){d=a[b-1];(f=A(d))?b--:d=void 0;c=a;i
                                    2024-09-27 06:40:13 UTC1979INData Raw: 3d 53 79 6d 62 6f 6c 28 22 63 22 29 3b 66 6f 72 28 76 61 72 20 62 3d 22 41 72 72 61 79 20 49 6e 74 38 41 72 72 61 79 20 55 69 6e 74 38 41 72 72 61 79 20 55 69 6e 74 38 43 6c 61 6d 70 65 64 41 72 72 61 79 20 49 6e 74 31 36 41 72 72 61 79 20 55 69 6e 74 31 36 41 72 72 61 79 20 49 6e 74 33 32 41 72 72 61 79 20 55 69 6e 74 33 32 41 72 72 61 79 20 46 6c 6f 61 74 33 32 41 72 72 61 79 20 46 6c 6f 61 74 36 34 41 72 72 61 79 22 2e 73 70 6c 69 74 28 22 20 22 29 2c 63 3d 30 3b 63 3c 62 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 7b 76 61 72 20 64 3d 57 61 5b 62 5b 63 5d 5d 3b 74 79 70 65 6f 66 20 64 3d 3d 3d 22 66 75 6e 63 74 69 6f 6e 22 26 26 74 79 70 65 6f 66 20 64 2e 70 72 6f 74 6f 74 79 70 65 5b 61 5d 21 3d 22 66 75 6e 63 74 69 6f 6e 22 26 26 46 28 64 2e 70 72 6f 74 6f
                                    Data Ascii: =Symbol("c");for(var b="Array Int8Array Uint8Array Uint8ClampedArray Int16Array Uint16Array Int32Array Uint32Array Float32Array Float64Array".split(" "),c=0;c<b.length;c++){var d=Wa[b[c]];typeof d==="function"&&typeof d.prototype[a]!="function"&&F(d.proto
                                    2024-09-27 06:40:13 UTC1979INData Raw: 20 68 3d 30 2c 67 3d 66 75 6e 63 74 69 6f 6e 28 6b 29 7b 74 68 69 73 2e 67 3d 28 68 2b 3d 4d 61 74 68 2e 72 61 6e 64 6f 6d 28 29 2b 31 29 2e 74 6f 53 74 72 69 6e 67 28 29 3b 69 66 28 6b 29 7b 6b 3d 48 28 6b 29 3b 66 6f 72 28 76 61 72 20 6c 3b 21 28 6c 3d 6b 2e 6e 65 78 74 28 29 29 2e 64 6f 6e 65 3b 29 6c 3d 6c 2e 76 61 6c 75 65 2c 74 68 69 73 2e 73 65 74 28 6c 5b 30 5d 2c 6c 5b 31 5d 29 7d 7d 3b 67 2e 70 72 6f 74 6f 74 79 70 65 2e 73 65 74 3d 66 75 6e 63 74 69 6f 6e 28 6b 2c 6c 29 7b 69 66 28 21 63 28 6b 29 29 74 68 72 6f 77 20 45 72 72 6f 72 28 22 69 22 29 3b 64 28 6b 29 3b 69 66 28 21 49 28 6b 2c 66 29 29 74 68 72 6f 77 20 45 72 72 6f 72 28 22 6a 60 22 2b 6b 29 3b 6b 5b 66 5d 5b 74 68 69 73 2e 67 5d 3d 6c 3b 72 65 74 75 72 6e 20 74 68 69 73 7d 3b 67 2e
                                    Data Ascii: h=0,g=function(k){this.g=(h+=Math.random()+1).toString();if(k){k=H(k);for(var l;!(l=k.next()).done;)l=l.value,this.set(l[0],l[1])}};g.prototype.set=function(k,l){if(!c(k))throw Error("i");d(k);if(!I(k,f))throw Error("j`"+k);k[f][this.g]=l;return this};g.
                                    2024-09-27 06:40:13 UTC1979INData Raw: 68 69 73 2e 65 6e 74 72 69 65 73 28 29 2c 6d 3b 21 28 6d 3d 6c 2e 6e 65 78 74 28 29 29 2e 64 6f 6e 65 3b 29 6d 3d 0a 6d 2e 76 61 6c 75 65 2c 67 2e 63 61 6c 6c 28 6b 2c 6d 5b 31 5d 2c 6d 5b 30 5d 2c 74 68 69 73 29 7d 3b 63 2e 70 72 6f 74 6f 74 79 70 65 5b 53 79 6d 62 6f 6c 2e 69 74 65 72 61 74 6f 72 5d 3d 63 2e 70 72 6f 74 6f 74 79 70 65 2e 65 6e 74 72 69 65 73 3b 76 61 72 20 64 3d 66 75 6e 63 74 69 6f 6e 28 67 2c 6b 29 7b 76 61 72 20 6c 3d 6b 26 26 74 79 70 65 6f 66 20 6b 3b 6c 3d 3d 22 6f 62 6a 65 63 74 22 7c 7c 6c 3d 3d 22 66 75 6e 63 74 69 6f 6e 22 3f 62 2e 68 61 73 28 6b 29 3f 6c 3d 62 2e 67 65 74 28 6b 29 3a 28 6c 3d 22 22 2b 20 2b 2b 68 2c 62 2e 73 65 74 28 6b 2c 6c 29 29 3a 6c 3d 22 70 5f 22 2b 6b 3b 76 61 72 20 6d 3d 67 5b 30 5d 5b 6c 5d 3b 69 66
                                    Data Ascii: his.entries(),m;!(m=l.next()).done;)m=m.value,g.call(k,m[1],m[0],this)};c.prototype[Symbol.iterator]=c.prototype.entries;var d=function(g,k){var l=k&&typeof k;l=="object"||l=="function"?b.has(k)?l=b.get(k):(l=""+ ++h,b.set(k,l)):l="p_"+k;var m=g[0][l];if
                                    2024-09-27 06:40:13 UTC1979INData Raw: 61 72 20 66 62 3d 66 62 7c 7c 7b 7d 2c 71 3d 74 68 69 73 7c 7c 73 65 6c 66 2c 67 62 3d 71 2e 5f 46 5f 74 6f 67 67 6c 65 73 7c 7c 5b 5d 2c 68 62 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 61 3d 61 2e 73 70 6c 69 74 28 22 2e 22 29 3b 66 6f 72 28 76 61 72 20 62 3d 71 2c 63 3d 30 3b 63 3c 61 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 69 66 28 62 3d 62 5b 61 5b 63 5d 5d 2c 62 3d 3d 6e 75 6c 6c 29 72 65 74 75 72 6e 20 6e 75 6c 6c 3b 72 65 74 75 72 6e 20 62 7d 2c 69 62 3d 22 63 6c 6f 73 75 72 65 5f 75 69 64 5f 22 2b 28 4d 61 74 68 2e 72 61 6e 64 6f 6d 28 29 2a 31 45 39 3e 3e 3e 30 29 2c 6a 62 3d 30 2c 6b 62 3d 66 75 6e 63 74 69 6f 6e 28 61 2c 62 2c 63 29 7b 72 65 74 75 72 6e 20 61 2e 63 61 6c 6c 2e 61 70 70 6c 79 28 61 2e 62 69 6e 64 2c 61 72 67 75 6d 65 6e 74 73 29 7d 2c
                                    Data Ascii: ar fb=fb||{},q=this||self,gb=q._F_toggles||[],hb=function(a){a=a.split(".");for(var b=q,c=0;c<a.length;c++)if(b=b[a[c]],b==null)return null;return b},ib="closure_uid_"+(Math.random()*1E9>>>0),jb=0,kb=function(a,b,c){return a.call.apply(a.bind,arguments)},
                                    2024-09-27 06:40:13 UTC1979INData Raw: 28 61 2c 62 2c 63 29 7b 63 3d 63 7c 7c 71 3b 76 61 72 20 64 3d 63 2e 6f 6e 65 72 72 6f 72 2c 65 3d 21 21 62 3b 63 2e 6f 6e 65 72 72 6f 72 3d 66 75 6e 63 74 69 6f 6e 28 66 2c 68 2c 67 2c 6b 2c 6c 29 7b 64 26 26 64 28 66 2c 68 2c 67 2c 6b 2c 6c 29 3b 61 28 7b 6d 65 73 73 61 67 65 3a 66 2c 66 69 6c 65 4e 61 6d 65 3a 68 2c 6c 69 6e 65 3a 67 2c 6c 69 6e 65 4e 75 6d 62 65 72 3a 67 2c 63 61 3a 6b 2c 65 72 72 6f 72 3a 6c 7d 29 3b 72 65 74 75 72 6e 20 65 7d 7d 2c 74 62 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 76 61 72 20 62 3d 68 62 28 22 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 22 29 3b 61 3d 3d 6e 75 6c 6c 26 26 28 61 3d 27 55 6e 6b 6e 6f 77 6e 20 45 72 72 6f 72 20 6f 66 20 74 79 70 65 20 22 6e 75 6c 6c 2f 75 6e 64 65 66 69 6e 65 64 22 27 29 3b
                                    Data Ascii: (a,b,c){c=c||q;var d=c.onerror,e=!!b;c.onerror=function(f,h,g,k,l){d&&d(f,h,g,k,l);a({message:f,fileName:h,line:g,lineNumber:g,ca:k,error:l});return e}},tb=function(a){var b=hb("window.location.href");a==null&&(a='Unknown Error of type "null/undefined"');
                                    2024-09-27 06:40:13 UTC1979INData Raw: 28 66 29 29 3f 66 3a 22 5b 66 6e 5d 22 3b 62 72 65 61 6b 3b 64 65 66 61 75 6c 74 3a 66 3d 0a 74 79 70 65 6f 66 20 66 7d 66 2e 6c 65 6e 67 74 68 3e 34 30 26 26 28 66 3d 66 2e 73 6c 69 63 65 28 30 2c 34 30 29 2b 22 2e 2e 2e 22 29 3b 63 2e 70 75 73 68 28 66 29 7d 62 2e 70 75 73 68 28 61 29 3b 63 2e 70 75 73 68 28 22 29 5c 6e 22 29 3b 74 72 79 7b 63 2e 70 75 73 68 28 77 62 28 61 2e 63 61 6c 6c 65 72 2c 62 29 29 7d 63 61 74 63 68 28 68 29 7b 63 2e 70 75 73 68 28 22 5b 65 78 63 65 70 74 69 6f 6e 20 74 72 79 69 6e 67 20 74 6f 20 67 65 74 20 63 61 6c 6c 65 72 5d 5c 6e 22 29 7d 7d 65 6c 73 65 20 61 3f 63 2e 70 75 73 68 28 22 5b 2e 2e 2e 6c 6f 6e 67 20 73 74 61 63 6b 2e 2e 2e 5d 22 29 3a 63 2e 70 75 73 68 28 22 5b 65 6e 64 5d 22 29 3b 72 65 74 75 72 6e 20 63 2e 6a
                                    Data Ascii: (f))?f:"[fn]";break;default:f=typeof f}f.length>40&&(f=f.slice(0,40)+"...");c.push(f)}b.push(a);c.push(")\n");try{c.push(wb(a.caller,b))}catch(h){c.push("[exception trying to get caller]\n")}}else a?c.push("[...long stack...]"):c.push("[end]");return c.j


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    4192.168.2.549715216.58.212.1644436084C:\Program Files\Google\Chrome\Application\chrome.exe
                                    TimestampBytes transferredDirectionData
                                    2024-09-27 06:40:15 UTC1222OUTGET /favicon.ico HTTP/1.1
                                    Host: www.google.com
                                    Connection: keep-alive
                                    sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                    sec-ch-ua-mobile: ?0
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                    sec-ch-ua-arch: "x86"
                                    sec-ch-ua-full-version: "117.0.5938.132"
                                    sec-ch-ua-platform-version: "10.0.0"
                                    sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                    sec-ch-ua-bitness: "64"
                                    sec-ch-ua-model: ""
                                    sec-ch-ua-wow64: ?0
                                    sec-ch-ua-platform: "Windows"
                                    Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
                                    X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIk6HLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                                    Sec-Fetch-Site: same-site
                                    Sec-Fetch-Mode: no-cors
                                    Sec-Fetch-Dest: image
                                    Referer: https://accounts.google.com/
                                    Accept-Encoding: gzip, deflate, br
                                    Accept-Language: en-US,en;q=0.9
                                    Cookie: NID=517=BITQKqQfWS3c3Ka2V3chnU-38StwTNcdk_AUbMvPVorKofReGs2V0KXZbpI78Q6Ho0xqPE1IrLKIDWOqIqohzHiPxOEWDsuFVxNGh7_3c2tCNekW8Nv5ok33C-pjOlrXgoDrEAnHjESvrFDtECrRO-z4NEzWoNJoppyK-dpX1b_qKPa7_a8
                                    2024-09-27 06:40:16 UTC705INHTTP/1.1 200 OK
                                    Accept-Ranges: bytes
                                    Cross-Origin-Resource-Policy: cross-origin
                                    Cross-Origin-Opener-Policy-Report-Only: same-origin; report-to="static-on-bigtable"
                                    Report-To: {"group":"static-on-bigtable","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/static-on-bigtable"}]}
                                    Content-Length: 5430
                                    X-Content-Type-Options: nosniff
                                    Server: sffe
                                    X-XSS-Protection: 0
                                    Date: Fri, 27 Sep 2024 05:58:28 GMT
                                    Expires: Sat, 05 Oct 2024 05:58:28 GMT
                                    Cache-Control: public, max-age=691200
                                    Last-Modified: Tue, 22 Oct 2019 18:30:00 GMT
                                    Content-Type: image/x-icon
                                    Vary: Accept-Encoding
                                    Age: 2508
                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                    Connection: close
                                    2024-09-27 06:40:16 UTC685INData Raw: 00 00 01 00 02 00 10 10 00 00 01 00 20 00 68 04 00 00 26 00 00 00 20 20 00 00 01 00 20 00 a8 10 00 00 8e 04 00 00 28 00 00 00 10 00 00 00 20 00 00 00 01 00 20 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 30 fd fd fd 96 fd fd fd d8 fd fd fd f9 fd fd fd f9 fd fd fd d7 fd fd fd 94 fe fe fe 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd 99 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 95 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd c1 ff ff ff ff fa fd f9 ff b4 d9 a7 ff 76 ba 5d ff 58 ab 3a ff 58 aa 3a ff 72 b8 59 ff ac d5 9d ff f8 fb f6 ff ff
                                    Data Ascii: h& ( 0.v]X:X:rY
                                    2024-09-27 06:40:16 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d8 fd fd fd 99 ff ff ff ff 92 cf fb ff 37 52 ec ff 38 46 ea ff d0 d4 fa ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 96 fe fe fe 32 ff ff ff ff f9 f9 fe ff 56 62 ed ff 35 43 ea ff 3b 49 eb ff 95 9c f4 ff cf d2 fa ff d1 d4 fa ff 96 9d f4 ff 52 5e ed ff e1 e3 fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 30 00 00 00 00 fd fd fd 9d ff ff ff ff e8 ea fd ff 58 63 ee ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 6c 76 f0 ff ff ff ff ff ff ff ff ff fd fd fd 98 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd c3 ff ff ff ff f9 f9 fe ff a5 ac f6 ff 5d 69 ee ff 3c 4a
                                    Data Ascii: 7R8F2Vb5C;IR^0Xc5C5C5C5C5C5Clv]i<J
                                    2024-09-27 06:40:16 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff ff fd fd fd d0 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fd fd fd 8b ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff b1 d8 a3 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 60 a5 35 ff ca 8e 3e ff f9 c1 9f ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 87 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 25 fd fd fd fb ff ff ff ff ff ff ff ff ff ff ff ff c2 e0 b7 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 6e b6 54 ff 9f ce 8d ff b7 da aa ff b8 db ab ff a5 d2 95 ff 7b bc 64 ff 54 a8 35 ff 53 a8 34 ff 77 a0 37 ff e3 89 41 ff f4 85 42 ff f4 85 42 ff
                                    Data Ascii: S4S4S4S4S4S4S4S4S4S4S4S4S4S4`5>%S4S4S4S4S4S4nT{dT5S4w7ABB
                                    2024-09-27 06:40:16 UTC1390INData Raw: ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff fb d5 bf ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd ea fd fd fd cb ff ff ff ff ff ff ff ff ff ff ff ff 46 cd fc ff 05 bc fb ff 05 bc fb ff 05 bc fb ff 21 ae f9 ff fb fb ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd c8 fd fd fd 9c ff ff ff ff ff ff ff ff ff ff ff ff 86 df fd ff 05 bc fb ff 05 bc fb ff 15 93 f5 ff 34 49 eb ff b3 b8 f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                    Data Ascii: BBBBBBF!4I
                                    2024-09-27 06:40:16 UTC575INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d2 fe fe fe 24 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd 8d fd fd fd fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd fb fd fd fd 8b fe fe fe 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 27 fd fd fd 9f fd fd fd f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                    Data Ascii: $'


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    5192.168.2.54974952.165.165.26443
                                    TimestampBytes transferredDirectionData
                                    2024-09-27 06:40:20 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=3A3ob3ZR9dDYPdg&MD=eGCMR9HE HTTP/1.1
                                    Connection: Keep-Alive
                                    Accept: */*
                                    User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                    Host: slscr.update.microsoft.com
                                    2024-09-27 06:40:20 UTC560INHTTP/1.1 200 OK
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Content-Type: application/octet-stream
                                    Expires: -1
                                    Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                    ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
                                    MS-CorrelationId: 88ffdf1d-2768-4bdd-af25-56de43094efe
                                    MS-RequestId: 995578d0-02f0-4779-b6c4-b1474544c8ee
                                    MS-CV: XxanV2JzYk2NGdvM.0
                                    X-Microsoft-SLSClientCache: 2880
                                    Content-Disposition: attachment; filename=environment.cab
                                    X-Content-Type-Options: nosniff
                                    Date: Fri, 27 Sep 2024 06:40:20 GMT
                                    Connection: close
                                    Content-Length: 24490
                                    2024-09-27 06:40:20 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
                                    Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
                                    2024-09-27 06:40:20 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
                                    Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    6192.168.2.54976052.165.165.26443
                                    TimestampBytes transferredDirectionData
                                    2024-09-27 06:40:58 UTC306OUTGET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=3A3ob3ZR9dDYPdg&MD=eGCMR9HE HTTP/1.1
                                    Connection: Keep-Alive
                                    Accept: */*
                                    User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                    Host: slscr.update.microsoft.com
                                    2024-09-27 06:40:59 UTC560INHTTP/1.1 200 OK
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Content-Type: application/octet-stream
                                    Expires: -1
                                    Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                    ETag: "vic+p1MiJJ+/WMnK08jaWnCBGDfvkGRzPk9f8ZadQHg=_1440"
                                    MS-CorrelationId: 0c5e5843-2a26-4d40-aca1-6ac805f346b5
                                    MS-RequestId: ecabfa48-0d01-4d0b-bf18-329ab47884e2
                                    MS-CV: dqZIhkXwoU+poqR8.0
                                    X-Microsoft-SLSClientCache: 1440
                                    Content-Disposition: attachment; filename=environment.cab
                                    X-Content-Type-Options: nosniff
                                    Date: Fri, 27 Sep 2024 06:40:58 GMT
                                    Connection: close
                                    Content-Length: 30005
                                    2024-09-27 06:40:59 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 8d 2b 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 5b 49 00 00 14 00 00 00 00 00 10 00 8d 2b 00 00 a8 49 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 72 4d 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 fe f6 51 be 21 2b 72 4d 43 4b ed 7c 05 58 54 eb da f6 14 43 49 37 0a 02 d2 b9 86 0e 41 52 a4 1b 24 a5 bb 43 24 44 18 94 90 92 52 41 3a 05 09 95 ee 54 b0 00 91 2e e9 12 10 04 11 c9 6f 10 b7 a2 67 9f bd cf 3e ff b7 ff b3 bf 73 ed e1 9a 99 f5 c6 7a d7 bb de f5 3e cf fd 3c f7 dc 17 4a 1a 52 e7 41 a8 97 1e 14 f4 e5 25 7d f4 05 82 82 c1 20 30 08 06 ba c3 05 02 11 7f a9 c1 ff d2 87 5c 1e f4 ed 65 8e 7a 1f f6 0a 40 03 1d 7b f9 83 2c 1c 2f db b8 3a 39 3a 58 38 ba 73 5e
                                    Data Ascii: MSCF+D[I+IdrMenvironment.cabQ!+rMCK|XTCI7AR$C$DRA:T.og>sz><JRA%} 0\ez@{,/:9:X8s^
                                    2024-09-27 06:40:59 UTC14181INData Raw: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 26 30 24 06 03 55 04 03 13 1d 4d 69 63 72 6f 73 6f 66 74 20 54 69 6d 65 2d 53 74 61 6d 70 20 50 43 41 20 32 30 31 30 30 1e 17 0d 32 33 31 30 31 32 31 39 30 37 32 35 5a 17 0d 32 35 30 31 31 30 31 39 30 37 32 35 5a 30 81 d2 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 2d 30 2b 06 03 55 04 0b 13 24 4d 69 63 72 6f
                                    Data Ascii: UUS10UWashington10URedmond10UMicrosoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100231012190725Z250110190725Z010UUS10UWashington10URedmond10UMicrosoft Corporation1-0+U$Micro


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    7192.168.2.549764216.58.212.1424436084C:\Program Files\Google\Chrome\Application\chrome.exe
                                    TimestampBytes transferredDirectionData
                                    2024-09-27 06:41:15 UTC1338OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                    Host: play.google.com
                                    Connection: keep-alive
                                    Content-Length: 1401
                                    sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                    sec-ch-ua-mobile: ?0
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                    sec-ch-ua-arch: "x86"
                                    Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                    sec-ch-ua-full-version: "117.0.5938.132"
                                    sec-ch-ua-platform-version: "10.0.0"
                                    X-Goog-AuthUser: 0
                                    sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                    sec-ch-ua-bitness: "64"
                                    sec-ch-ua-model: ""
                                    sec-ch-ua-wow64: ?0
                                    sec-ch-ua-platform: "Windows"
                                    Accept: */*
                                    Origin: https://accounts.google.com
                                    X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIk6HLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                                    Sec-Fetch-Site: same-site
                                    Sec-Fetch-Mode: cors
                                    Sec-Fetch-Dest: empty
                                    Referer: https://accounts.google.com/
                                    Accept-Encoding: gzip, deflate, br
                                    Accept-Language: en-US,en;q=0.9
                                    Cookie: NID=517=jOf0cdVIayIKH6EEhuVwAZueUHeNQpQbzu7Z7fmkAXyXgLlApLjOEkRTD5VphjISDLOtlRdrEHGjQE_U2HsEuW8voX5iOJ9B-E-P_CWRGBOjbHXNk9vc5t0u4UpKF862OnLyAtd_SubSn74LYcNwxnzSgY0VqjQDjooxuMuby43qMwc0JxCVcM1sBcg
                                    2024-09-27 06:41:15 UTC1401OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 34 31 39 32 37 33 38 39 30 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                    Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727419273890",null,null,null
                                    2024-09-27 06:41:15 UTC523INHTTP/1.1 200 OK
                                    Access-Control-Allow-Origin: https://accounts.google.com
                                    Cross-Origin-Resource-Policy: cross-origin
                                    Access-Control-Allow-Credentials: true
                                    Access-Control-Allow-Headers: X-Playlog-Web
                                    Content-Type: text/plain; charset=UTF-8
                                    Date: Fri, 27 Sep 2024 06:41:15 GMT
                                    Server: Playlog
                                    Cache-Control: private
                                    X-XSS-Protection: 0
                                    X-Frame-Options: SAMEORIGIN
                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                    Accept-Ranges: none
                                    Vary: Accept-Encoding
                                    Connection: close
                                    Transfer-Encoding: chunked
                                    2024-09-27 06:41:15 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                    Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                    2024-09-27 06:41:15 UTC5INData Raw: 30 0d 0a 0d 0a
                                    Data Ascii: 0


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    8192.168.2.549765216.58.212.1424436084C:\Program Files\Google\Chrome\Application\chrome.exe
                                    TimestampBytes transferredDirectionData
                                    2024-09-27 06:41:16 UTC1338OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                    Host: play.google.com
                                    Connection: keep-alive
                                    Content-Length: 1302
                                    sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                    sec-ch-ua-mobile: ?0
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                    sec-ch-ua-arch: "x86"
                                    Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                    sec-ch-ua-full-version: "117.0.5938.132"
                                    sec-ch-ua-platform-version: "10.0.0"
                                    X-Goog-AuthUser: 0
                                    sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                    sec-ch-ua-bitness: "64"
                                    sec-ch-ua-model: ""
                                    sec-ch-ua-wow64: ?0
                                    sec-ch-ua-platform: "Windows"
                                    Accept: */*
                                    Origin: https://accounts.google.com
                                    X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIk6HLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                                    Sec-Fetch-Site: same-site
                                    Sec-Fetch-Mode: cors
                                    Sec-Fetch-Dest: empty
                                    Referer: https://accounts.google.com/
                                    Accept-Encoding: gzip, deflate, br
                                    Accept-Language: en-US,en;q=0.9
                                    Cookie: NID=517=jOf0cdVIayIKH6EEhuVwAZueUHeNQpQbzu7Z7fmkAXyXgLlApLjOEkRTD5VphjISDLOtlRdrEHGjQE_U2HsEuW8voX5iOJ9B-E-P_CWRGBOjbHXNk9vc5t0u4UpKF862OnLyAtd_SubSn74LYcNwxnzSgY0VqjQDjooxuMuby43qMwc0JxCVcM1sBcg
                                    2024-09-27 06:41:16 UTC1302OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 34 31 39 32 37 35 31 38 30 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                    Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727419275180",null,null,null
                                    2024-09-27 06:41:16 UTC523INHTTP/1.1 200 OK
                                    Access-Control-Allow-Origin: https://accounts.google.com
                                    Cross-Origin-Resource-Policy: cross-origin
                                    Access-Control-Allow-Credentials: true
                                    Access-Control-Allow-Headers: X-Playlog-Web
                                    Content-Type: text/plain; charset=UTF-8
                                    Date: Fri, 27 Sep 2024 06:41:16 GMT
                                    Server: Playlog
                                    Cache-Control: private
                                    X-XSS-Protection: 0
                                    X-Frame-Options: SAMEORIGIN
                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                    Accept-Ranges: none
                                    Vary: Accept-Encoding
                                    Connection: close
                                    Transfer-Encoding: chunked
                                    2024-09-27 06:41:16 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                    Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                    2024-09-27 06:41:16 UTC5INData Raw: 30 0d 0a 0d 0a
                                    Data Ascii: 0


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    9192.168.2.549767216.58.212.1424436084C:\Program Files\Google\Chrome\Application\chrome.exe
                                    TimestampBytes transferredDirectionData
                                    2024-09-27 06:41:45 UTC1338OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                    Host: play.google.com
                                    Connection: keep-alive
                                    Content-Length: 1188
                                    sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                    sec-ch-ua-mobile: ?0
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                    sec-ch-ua-arch: "x86"
                                    Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                    sec-ch-ua-full-version: "117.0.5938.132"
                                    sec-ch-ua-platform-version: "10.0.0"
                                    X-Goog-AuthUser: 0
                                    sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                    sec-ch-ua-bitness: "64"
                                    sec-ch-ua-model: ""
                                    sec-ch-ua-wow64: ?0
                                    sec-ch-ua-platform: "Windows"
                                    Accept: */*
                                    Origin: https://accounts.google.com
                                    X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIk6HLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                                    Sec-Fetch-Site: same-site
                                    Sec-Fetch-Mode: cors
                                    Sec-Fetch-Dest: empty
                                    Referer: https://accounts.google.com/
                                    Accept-Encoding: gzip, deflate, br
                                    Accept-Language: en-US,en;q=0.9
                                    Cookie: NID=517=jOf0cdVIayIKH6EEhuVwAZueUHeNQpQbzu7Z7fmkAXyXgLlApLjOEkRTD5VphjISDLOtlRdrEHGjQE_U2HsEuW8voX5iOJ9B-E-P_CWRGBOjbHXNk9vc5t0u4UpKF862OnLyAtd_SubSn74LYcNwxnzSgY0VqjQDjooxuMuby43qMwc0JxCVcM1sBcg
                                    2024-09-27 06:41:45 UTC1188OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 34 31 39 33 30 34 30 34 30 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                    Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727419304040",null,null,null
                                    2024-09-27 06:41:45 UTC523INHTTP/1.1 200 OK
                                    Access-Control-Allow-Origin: https://accounts.google.com
                                    Cross-Origin-Resource-Policy: cross-origin
                                    Access-Control-Allow-Credentials: true
                                    Access-Control-Allow-Headers: X-Playlog-Web
                                    Content-Type: text/plain; charset=UTF-8
                                    Date: Fri, 27 Sep 2024 06:41:45 GMT
                                    Server: Playlog
                                    Cache-Control: private
                                    X-XSS-Protection: 0
                                    X-Frame-Options: SAMEORIGIN
                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                    Accept-Ranges: none
                                    Vary: Accept-Encoding
                                    Connection: close
                                    Transfer-Encoding: chunked
                                    2024-09-27 06:41:45 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                    Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                    2024-09-27 06:41:45 UTC5INData Raw: 30 0d 0a 0d 0a
                                    Data Ascii: 0


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    10192.168.2.549768216.58.212.1424436084C:\Program Files\Google\Chrome\Application\chrome.exe
                                    TimestampBytes transferredDirectionData
                                    2024-09-27 06:41:50 UTC1338OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                    Host: play.google.com
                                    Connection: keep-alive
                                    Content-Length: 1579
                                    sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                    sec-ch-ua-mobile: ?0
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                    sec-ch-ua-arch: "x86"
                                    Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                    sec-ch-ua-full-version: "117.0.5938.132"
                                    sec-ch-ua-platform-version: "10.0.0"
                                    X-Goog-AuthUser: 0
                                    sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                    sec-ch-ua-bitness: "64"
                                    sec-ch-ua-model: ""
                                    sec-ch-ua-wow64: ?0
                                    sec-ch-ua-platform: "Windows"
                                    Accept: */*
                                    Origin: https://accounts.google.com
                                    X-Client-Data: CIe2yQEIprbJAQipncoBCMDdygEIk6HLAQiFoM0BCNy9zQEI2sPNAQjpxc0BCLnKzQEIv9HNAQiK080BCNDWzQEIqNjNAQj5wNQVGI/OzQEYutLNARjC2M0BGOuNpRc=
                                    Sec-Fetch-Site: same-site
                                    Sec-Fetch-Mode: cors
                                    Sec-Fetch-Dest: empty
                                    Referer: https://accounts.google.com/
                                    Accept-Encoding: gzip, deflate, br
                                    Accept-Language: en-US,en;q=0.9
                                    Cookie: NID=517=jOf0cdVIayIKH6EEhuVwAZueUHeNQpQbzu7Z7fmkAXyXgLlApLjOEkRTD5VphjISDLOtlRdrEHGjQE_U2HsEuW8voX5iOJ9B-E-P_CWRGBOjbHXNk9vc5t0u4UpKF862OnLyAtd_SubSn74LYcNwxnzSgY0VqjQDjooxuMuby43qMwc0JxCVcM1sBcg
                                    2024-09-27 06:41:50 UTC1579OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 34 31 39 33 30 38 37 37 35 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                    Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727419308775",null,null,null
                                    2024-09-27 06:41:50 UTC523INHTTP/1.1 200 OK
                                    Access-Control-Allow-Origin: https://accounts.google.com
                                    Cross-Origin-Resource-Policy: cross-origin
                                    Access-Control-Allow-Credentials: true
                                    Access-Control-Allow-Headers: X-Playlog-Web
                                    Content-Type: text/plain; charset=UTF-8
                                    Date: Fri, 27 Sep 2024 06:41:50 GMT
                                    Server: Playlog
                                    Cache-Control: private
                                    X-XSS-Protection: 0
                                    X-Frame-Options: SAMEORIGIN
                                    Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                    Accept-Ranges: none
                                    Vary: Accept-Encoding
                                    Connection: close
                                    Transfer-Encoding: chunked
                                    2024-09-27 06:41:50 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                    Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                    2024-09-27 06:41:50 UTC5INData Raw: 30 0d 0a 0d 0a
                                    Data Ascii: 0


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:02:40:01
                                    Start date:27/09/2024
                                    Path:C:\Users\user\Desktop\file.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\file.exe"
                                    Imagebase:0x420000
                                    File size:1'167'360 bytes
                                    MD5 hash:CF2CD80A393670F0241C8C3740AC1FF2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:false

                                    Target ID:1
                                    Start time:02:40:01
                                    Start date:27/09/2024
                                    Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                                    Imagebase:0x7ff715980000
                                    File size:3'242'272 bytes
                                    MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:false

                                    Target ID:4
                                    Start time:02:40:02
                                    Start date:27/09/2024
                                    Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 --field-trial-handle=2028,i,5939366904044384475,4979484463348327368,262144 /prefetch:8
                                    Imagebase:0x7ff715980000
                                    File size:3'242'272 bytes
                                    MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:false

                                    Target ID:5
                                    Start time:02:40:13
                                    Start date:27/09/2024
                                    Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5536 --field-trial-handle=2028,i,5939366904044384475,4979484463348327368,262144 /prefetch:8
                                    Imagebase:0x7ff715980000
                                    File size:3'242'272 bytes
                                    MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:false

                                    Target ID:6
                                    Start time:02:40:13
                                    Start date:27/09/2024
                                    Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 --field-trial-handle=2028,i,5939366904044384475,4979484463348327368,262144 /prefetch:8
                                    Imagebase:0x7ff715980000
                                    File size:3'242'272 bytes
                                    MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:2.3%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:6.8%
                                      Total number of Nodes:1543
                                      Total number of Limit Nodes:49
                                      execution_graph 95123 422de3 95124 422df0 __wsopen_s 95123->95124 95125 422e09 95124->95125 95126 462c2b ___scrt_fastfail 95124->95126 95139 423aa2 95125->95139 95128 462c47 GetOpenFileNameW 95126->95128 95130 462c96 95128->95130 95197 426b57 95130->95197 95134 462cab 95134->95134 95136 422e27 95167 4244a8 95136->95167 95209 461f50 95139->95209 95142 423ae9 95215 42a6c3 95142->95215 95143 423ace 95144 426b57 22 API calls 95143->95144 95146 423ada 95144->95146 95211 4237a0 95146->95211 95149 422da5 95150 461f50 __wsopen_s 95149->95150 95151 422db2 GetLongPathNameW 95150->95151 95152 426b57 22 API calls 95151->95152 95153 422dda 95152->95153 95154 423598 95153->95154 95266 42a961 95154->95266 95157 423aa2 23 API calls 95158 4235b5 95157->95158 95159 4235c0 95158->95159 95164 4632eb 95158->95164 95271 42515f 95159->95271 95165 46330d 95164->95165 95283 43ce60 41 API calls 95164->95283 95166 4235df 95166->95136 95284 424ecb 95167->95284 95170 463833 95306 492cf9 95170->95306 95171 424ecb 94 API calls 95173 4244e1 95171->95173 95173->95170 95177 4244e9 95173->95177 95174 463848 95175 46384c 95174->95175 95176 463869 95174->95176 95356 424f39 95175->95356 95179 43fe0b 22 API calls 95176->95179 95180 463854 95177->95180 95181 4244f5 95177->95181 95189 4638ae 95179->95189 95362 48da5a 82 API calls 95180->95362 95355 42940c 136 API calls 2 library calls 95181->95355 95184 463862 95184->95176 95185 422e31 95186 463a5f 95192 463a67 95186->95192 95187 424f39 68 API calls 95187->95192 95189->95186 95189->95192 95194 429cb3 22 API calls 95189->95194 95332 48967e 95189->95332 95335 490b5a 95189->95335 95341 42a4a1 95189->95341 95349 423ff7 95189->95349 95363 4895ad 42 API calls _wcslen 95189->95363 95192->95187 95364 48989b 82 API calls __wsopen_s 95192->95364 95194->95189 95198 426b67 _wcslen 95197->95198 95199 464ba1 95197->95199 95202 426ba2 95198->95202 95203 426b7d 95198->95203 95200 4293b2 22 API calls 95199->95200 95201 464baa 95200->95201 95201->95201 95205 43fddb 22 API calls 95202->95205 95685 426f34 22 API calls 95203->95685 95207 426bae 95205->95207 95206 426b85 __fread_nolock 95206->95134 95208 43fe0b 22 API calls 95207->95208 95208->95206 95210 423aaf GetFullPathNameW 95209->95210 95210->95142 95210->95143 95212 4237ae 95211->95212 95221 4293b2 95212->95221 95214 422e12 95214->95149 95216 42a6d0 95215->95216 95217 42a6dd 95215->95217 95216->95146 95218 43fddb 22 API calls 95217->95218 95219 42a6e7 95218->95219 95220 43fe0b 22 API calls 95219->95220 95220->95216 95222 4293c9 __fread_nolock 95221->95222 95223 4293c0 95221->95223 95222->95214 95223->95222 95225 42aec9 95223->95225 95226 42aedc 95225->95226 95230 42aed9 __fread_nolock 95225->95230 95231 43fddb 95226->95231 95228 42aee7 95241 43fe0b 95228->95241 95230->95222 95233 43fde0 95231->95233 95234 43fdfa 95233->95234 95237 43fdfc 95233->95237 95251 44ea0c 95233->95251 95258 444ead 7 API calls 2 library calls 95233->95258 95234->95228 95236 44066d 95260 4432a4 RaiseException 95236->95260 95237->95236 95259 4432a4 RaiseException 95237->95259 95240 44068a 95240->95228 95243 43fddb 95241->95243 95242 44ea0c ___std_exception_copy 21 API calls 95242->95243 95243->95242 95244 43fdfa 95243->95244 95247 43fdfc 95243->95247 95263 444ead 7 API calls 2 library calls 95243->95263 95244->95230 95246 44066d 95265 4432a4 RaiseException 95246->95265 95247->95246 95264 4432a4 RaiseException 95247->95264 95250 44068a 95250->95230 95253 453820 __dosmaperr 95251->95253 95252 45385e 95262 44f2d9 20 API calls __dosmaperr 95252->95262 95253->95252 95254 453849 RtlAllocateHeap 95253->95254 95261 444ead 7 API calls 2 library calls 95253->95261 95254->95253 95256 45385c 95254->95256 95256->95233 95258->95233 95259->95236 95260->95240 95261->95253 95262->95256 95263->95243 95264->95246 95265->95250 95267 43fe0b 22 API calls 95266->95267 95268 42a976 95267->95268 95269 43fddb 22 API calls 95268->95269 95270 4235aa 95269->95270 95270->95157 95272 42516e 95271->95272 95276 42518f __fread_nolock 95271->95276 95274 43fe0b 22 API calls 95272->95274 95273 43fddb 22 API calls 95275 4235cc 95273->95275 95274->95276 95277 4235f3 95275->95277 95276->95273 95278 423605 95277->95278 95282 423624 __fread_nolock 95277->95282 95281 43fe0b 22 API calls 95278->95281 95279 43fddb 22 API calls 95280 42363b 95279->95280 95280->95166 95281->95282 95282->95279 95283->95164 95365 424e90 LoadLibraryA 95284->95365 95289 424ef6 LoadLibraryExW 95373 424e59 LoadLibraryA 95289->95373 95290 463ccf 95292 424f39 68 API calls 95290->95292 95294 463cd6 95292->95294 95296 424e59 3 API calls 95294->95296 95298 463cde 95296->95298 95297 424f20 95297->95298 95299 424f2c 95297->95299 95395 4250f5 95298->95395 95301 424f39 68 API calls 95299->95301 95303 4244cd 95301->95303 95303->95170 95303->95171 95305 463d05 95307 492d15 95306->95307 95308 42511f 64 API calls 95307->95308 95309 492d29 95308->95309 95545 492e66 95309->95545 95312 492d3f 95312->95174 95313 4250f5 40 API calls 95314 492d56 95313->95314 95315 4250f5 40 API calls 95314->95315 95316 492d66 95315->95316 95317 4250f5 40 API calls 95316->95317 95318 492d81 95317->95318 95319 4250f5 40 API calls 95318->95319 95320 492d9c 95319->95320 95321 42511f 64 API calls 95320->95321 95322 492db3 95321->95322 95323 44ea0c ___std_exception_copy 21 API calls 95322->95323 95324 492dba 95323->95324 95325 44ea0c ___std_exception_copy 21 API calls 95324->95325 95326 492dc4 95325->95326 95327 4250f5 40 API calls 95326->95327 95328 492dd8 95327->95328 95329 4928fe 27 API calls 95328->95329 95330 492dee 95329->95330 95330->95312 95551 4922ce 79 API calls 95330->95551 95333 43fe0b 22 API calls 95332->95333 95334 4896ae __fread_nolock 95333->95334 95334->95189 95336 490b65 95335->95336 95337 43fddb 22 API calls 95336->95337 95338 490b7c 95337->95338 95552 429cb3 95338->95552 95342 42a52b 95341->95342 95348 42a4b1 __fread_nolock 95341->95348 95345 43fe0b 22 API calls 95342->95345 95343 43fddb 22 API calls 95344 42a4b8 95343->95344 95346 43fddb 22 API calls 95344->95346 95347 42a4d6 95344->95347 95345->95348 95346->95347 95347->95189 95348->95343 95350 42400a 95349->95350 95352 4240ae 95349->95352 95351 43fe0b 22 API calls 95350->95351 95353 42403c 95350->95353 95351->95353 95352->95189 95353->95352 95354 43fddb 22 API calls 95353->95354 95354->95353 95355->95185 95357 424f43 95356->95357 95358 424f4a 95356->95358 95558 44e678 95357->95558 95360 424f6a FreeLibrary 95358->95360 95361 424f59 95358->95361 95360->95361 95361->95180 95362->95184 95363->95189 95364->95192 95366 424ec6 95365->95366 95367 424ea8 GetProcAddress 95365->95367 95370 44e5eb 95366->95370 95368 424eb8 95367->95368 95368->95366 95369 424ebf FreeLibrary 95368->95369 95369->95366 95403 44e52a 95370->95403 95372 424eea 95372->95289 95372->95290 95374 424e6e GetProcAddress 95373->95374 95375 424e8d 95373->95375 95376 424e7e 95374->95376 95378 424f80 95375->95378 95376->95375 95377 424e86 FreeLibrary 95376->95377 95377->95375 95379 43fe0b 22 API calls 95378->95379 95380 424f95 95379->95380 95471 425722 95380->95471 95382 424fa1 __fread_nolock 95383 4250a5 95382->95383 95384 463d1d 95382->95384 95394 424fdc 95382->95394 95474 4242a2 CreateStreamOnHGlobal 95383->95474 95485 49304d 74 API calls 95384->95485 95387 463d22 95389 42511f 64 API calls 95387->95389 95388 4250f5 40 API calls 95388->95394 95390 463d45 95389->95390 95391 4250f5 40 API calls 95390->95391 95393 42506e ISource 95391->95393 95393->95297 95394->95387 95394->95388 95394->95393 95480 42511f 95394->95480 95396 425107 95395->95396 95397 463d70 95395->95397 95507 44e8c4 95396->95507 95400 4928fe 95528 49274e 95400->95528 95402 492919 95402->95305 95405 44e536 __FrameHandler3::FrameUnwindToState 95403->95405 95404 44e544 95428 44f2d9 20 API calls __dosmaperr 95404->95428 95405->95404 95407 44e574 95405->95407 95410 44e586 95407->95410 95411 44e579 95407->95411 95408 44e549 95429 4527ec 26 API calls _strftime 95408->95429 95420 458061 95410->95420 95430 44f2d9 20 API calls __dosmaperr 95411->95430 95414 44e58f 95415 44e595 95414->95415 95416 44e5a2 95414->95416 95431 44f2d9 20 API calls __dosmaperr 95415->95431 95432 44e5d4 LeaveCriticalSection __fread_nolock 95416->95432 95417 44e554 __fread_nolock 95417->95372 95421 45806d __FrameHandler3::FrameUnwindToState 95420->95421 95433 452f5e EnterCriticalSection 95421->95433 95423 45807b 95434 4580fb 95423->95434 95427 4580ac __fread_nolock 95427->95414 95428->95408 95429->95417 95430->95417 95431->95417 95432->95417 95433->95423 95435 45811e 95434->95435 95436 458177 95435->95436 95443 458088 95435->95443 95450 44918d EnterCriticalSection 95435->95450 95451 4491a1 LeaveCriticalSection 95435->95451 95452 454c7d 95436->95452 95441 458189 95441->95443 95465 453405 11 API calls 2 library calls 95441->95465 95447 4580b7 95443->95447 95444 4581a8 95466 44918d EnterCriticalSection 95444->95466 95470 452fa6 LeaveCriticalSection 95447->95470 95449 4580be 95449->95427 95450->95435 95451->95435 95458 454c8a __dosmaperr 95452->95458 95453 454cca 95468 44f2d9 20 API calls __dosmaperr 95453->95468 95454 454cb5 RtlAllocateHeap 95456 454cc8 95454->95456 95454->95458 95459 4529c8 95456->95459 95458->95453 95458->95454 95467 444ead 7 API calls 2 library calls 95458->95467 95460 4529d3 RtlFreeHeap 95459->95460 95464 4529fc __dosmaperr 95459->95464 95461 4529e8 95460->95461 95460->95464 95469 44f2d9 20 API calls __dosmaperr 95461->95469 95463 4529ee GetLastError 95463->95464 95464->95441 95465->95444 95466->95443 95467->95458 95468->95456 95469->95463 95470->95449 95472 43fddb 22 API calls 95471->95472 95473 425734 95472->95473 95473->95382 95475 4242bc FindResourceExW 95474->95475 95479 4242d9 95474->95479 95476 4635ba LoadResource 95475->95476 95475->95479 95477 4635cf SizeofResource 95476->95477 95476->95479 95478 4635e3 LockResource 95477->95478 95477->95479 95478->95479 95479->95394 95481 463d90 95480->95481 95482 42512e 95480->95482 95486 44ece3 95482->95486 95485->95387 95489 44eaaa 95486->95489 95488 42513c 95488->95394 95491 44eab6 __FrameHandler3::FrameUnwindToState 95489->95491 95490 44eac2 95502 44f2d9 20 API calls __dosmaperr 95490->95502 95491->95490 95492 44eae8 95491->95492 95504 44918d EnterCriticalSection 95492->95504 95494 44eac7 95503 4527ec 26 API calls _strftime 95494->95503 95497 44eaf4 95505 44ec0a 62 API calls 2 library calls 95497->95505 95498 44ead2 __fread_nolock 95498->95488 95500 44eb08 95506 44eb27 LeaveCriticalSection __fread_nolock 95500->95506 95502->95494 95503->95498 95504->95497 95505->95500 95506->95498 95510 44e8e1 95507->95510 95509 425118 95509->95400 95511 44e8ed __FrameHandler3::FrameUnwindToState 95510->95511 95512 44e900 ___scrt_fastfail 95511->95512 95513 44e92d 95511->95513 95514 44e925 __fread_nolock 95511->95514 95523 44f2d9 20 API calls __dosmaperr 95512->95523 95525 44918d EnterCriticalSection 95513->95525 95514->95509 95517 44e937 95526 44e6f8 38 API calls 4 library calls 95517->95526 95519 44e91a 95524 4527ec 26 API calls _strftime 95519->95524 95520 44e94e 95527 44e96c LeaveCriticalSection __fread_nolock 95520->95527 95523->95519 95524->95514 95525->95517 95526->95520 95527->95514 95531 44e4e8 95528->95531 95530 49275d 95530->95402 95534 44e469 95531->95534 95533 44e505 95533->95530 95535 44e478 95534->95535 95537 44e48c 95534->95537 95542 44f2d9 20 API calls __dosmaperr 95535->95542 95541 44e488 __alldvrm 95537->95541 95544 45333f 11 API calls 2 library calls 95537->95544 95538 44e47d 95543 4527ec 26 API calls _strftime 95538->95543 95541->95533 95542->95538 95543->95541 95544->95541 95550 492e7a 95545->95550 95546 4250f5 40 API calls 95546->95550 95547 492d3b 95547->95312 95547->95313 95548 4928fe 27 API calls 95548->95550 95549 42511f 64 API calls 95549->95550 95550->95546 95550->95547 95550->95548 95550->95549 95551->95312 95553 429cc2 _wcslen 95552->95553 95554 43fe0b 22 API calls 95553->95554 95555 429cea __fread_nolock 95554->95555 95556 43fddb 22 API calls 95555->95556 95557 429d00 95556->95557 95557->95189 95559 44e684 __FrameHandler3::FrameUnwindToState 95558->95559 95560 44e695 95559->95560 95561 44e6aa 95559->95561 95571 44f2d9 20 API calls __dosmaperr 95560->95571 95570 44e6a5 __fread_nolock 95561->95570 95573 44918d EnterCriticalSection 95561->95573 95564 44e69a 95572 4527ec 26 API calls _strftime 95564->95572 95565 44e6c6 95574 44e602 95565->95574 95568 44e6d1 95590 44e6ee LeaveCriticalSection __fread_nolock 95568->95590 95570->95358 95571->95564 95572->95570 95573->95565 95575 44e60f 95574->95575 95577 44e624 95574->95577 95591 44f2d9 20 API calls __dosmaperr 95575->95591 95582 44e61f 95577->95582 95593 44dc0b 95577->95593 95578 44e614 95592 4527ec 26 API calls _strftime 95578->95592 95582->95568 95586 44e646 95610 45862f 95586->95610 95589 4529c8 _free 20 API calls 95589->95582 95590->95570 95591->95578 95592->95582 95594 44dc23 95593->95594 95595 44dc1f 95593->95595 95594->95595 95596 44d955 __fread_nolock 26 API calls 95594->95596 95599 454d7a 95595->95599 95597 44dc43 95596->95597 95625 4559be 62 API calls 5 library calls 95597->95625 95600 44e640 95599->95600 95601 454d90 95599->95601 95603 44d955 95600->95603 95601->95600 95602 4529c8 _free 20 API calls 95601->95602 95602->95600 95604 44d976 95603->95604 95605 44d961 95603->95605 95604->95586 95626 44f2d9 20 API calls __dosmaperr 95605->95626 95607 44d966 95627 4527ec 26 API calls _strftime 95607->95627 95609 44d971 95609->95586 95611 45863e 95610->95611 95613 458653 95610->95613 95628 44f2c6 20 API calls __dosmaperr 95611->95628 95614 45868e 95613->95614 95618 45867a 95613->95618 95633 44f2c6 20 API calls __dosmaperr 95614->95633 95615 458643 95629 44f2d9 20 API calls __dosmaperr 95615->95629 95630 458607 95618->95630 95619 458693 95634 44f2d9 20 API calls __dosmaperr 95619->95634 95622 45869b 95635 4527ec 26 API calls _strftime 95622->95635 95623 44e64c 95623->95582 95623->95589 95625->95595 95626->95607 95627->95609 95628->95615 95629->95623 95636 458585 95630->95636 95632 45862b 95632->95623 95633->95619 95634->95622 95635->95623 95637 458591 __FrameHandler3::FrameUnwindToState 95636->95637 95647 455147 EnterCriticalSection 95637->95647 95639 45859f 95640 4585c6 95639->95640 95641 4585d1 95639->95641 95648 4586ae 95640->95648 95663 44f2d9 20 API calls __dosmaperr 95641->95663 95644 4585cc 95664 4585fb LeaveCriticalSection __wsopen_s 95644->95664 95646 4585ee __fread_nolock 95646->95632 95647->95639 95665 4553c4 95648->95665 95650 4586c4 95678 455333 21 API calls 2 library calls 95650->95678 95652 4586be 95652->95650 95653 4586f6 95652->95653 95655 4553c4 __wsopen_s 26 API calls 95652->95655 95653->95650 95656 4553c4 __wsopen_s 26 API calls 95653->95656 95654 45871c 95657 45873e 95654->95657 95679 44f2a3 20 API calls __dosmaperr 95654->95679 95658 4586ed 95655->95658 95659 458702 CloseHandle 95656->95659 95657->95644 95661 4553c4 __wsopen_s 26 API calls 95658->95661 95659->95650 95662 45870e GetLastError 95659->95662 95661->95653 95662->95650 95663->95644 95664->95646 95666 4553d1 95665->95666 95668 4553e6 95665->95668 95680 44f2c6 20 API calls __dosmaperr 95666->95680 95671 45540b 95668->95671 95682 44f2c6 20 API calls __dosmaperr 95668->95682 95670 4553d6 95681 44f2d9 20 API calls __dosmaperr 95670->95681 95671->95652 95672 455416 95683 44f2d9 20 API calls __dosmaperr 95672->95683 95675 4553de 95675->95652 95676 45541e 95684 4527ec 26 API calls _strftime 95676->95684 95678->95654 95679->95657 95680->95670 95681->95675 95682->95672 95683->95676 95684->95675 95685->95206 95686 462ba5 95687 422b25 95686->95687 95688 462baf 95686->95688 95714 422b83 7 API calls 95687->95714 95729 423a5a 95688->95729 95692 462bb8 95694 429cb3 22 API calls 95692->95694 95696 462bc6 95694->95696 95695 422b2f 95700 422b44 95695->95700 95718 423837 95695->95718 95697 462bf5 95696->95697 95698 462bce 95696->95698 95702 4233c6 22 API calls 95697->95702 95736 4233c6 95698->95736 95705 422b5f 95700->95705 95728 4230f2 Shell_NotifyIconW ___scrt_fastfail 95700->95728 95704 462bf1 GetForegroundWindow ShellExecuteW 95702->95704 95708 462c26 95704->95708 95711 422b66 SetCurrentDirectoryW 95705->95711 95708->95705 95710 462be7 95712 4233c6 22 API calls 95710->95712 95713 422b7a 95711->95713 95712->95704 95746 422cd4 7 API calls 95714->95746 95716 422b2a 95717 422c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 95716->95717 95717->95695 95719 423862 ___scrt_fastfail 95718->95719 95747 424212 95719->95747 95722 4238e8 95724 463386 Shell_NotifyIconW 95722->95724 95725 423906 Shell_NotifyIconW 95722->95725 95751 423923 95725->95751 95727 42391c 95727->95700 95728->95705 95730 461f50 __wsopen_s 95729->95730 95731 423a67 GetModuleFileNameW 95730->95731 95732 429cb3 22 API calls 95731->95732 95733 423a8d 95732->95733 95734 423aa2 23 API calls 95733->95734 95735 423a97 95734->95735 95735->95692 95737 4630bb 95736->95737 95738 4233dd 95736->95738 95740 43fddb 22 API calls 95737->95740 95782 4233ee 95738->95782 95742 4630c5 _wcslen 95740->95742 95741 4233e8 95745 426350 22 API calls 95741->95745 95743 43fe0b 22 API calls 95742->95743 95744 4630fe __fread_nolock 95743->95744 95745->95710 95746->95716 95748 4635a4 95747->95748 95749 4238b7 95747->95749 95748->95749 95750 4635ad DestroyIcon 95748->95750 95749->95722 95773 48c874 42 API calls _strftime 95749->95773 95750->95749 95752 42393f 95751->95752 95771 423a13 95751->95771 95774 426270 95752->95774 95755 463393 LoadStringW 95758 4633ad 95755->95758 95756 42395a 95757 426b57 22 API calls 95756->95757 95759 42396f 95757->95759 95765 423994 ___scrt_fastfail 95758->95765 95780 42a8c7 22 API calls __fread_nolock 95758->95780 95760 42397c 95759->95760 95761 4633c9 95759->95761 95760->95758 95764 423986 95760->95764 95781 426350 22 API calls 95761->95781 95779 426350 22 API calls 95764->95779 95769 4239f9 Shell_NotifyIconW 95765->95769 95767 4633d7 95767->95765 95768 4233c6 22 API calls 95767->95768 95770 4633f9 95768->95770 95769->95771 95772 4233c6 22 API calls 95770->95772 95771->95727 95772->95765 95773->95722 95775 43fe0b 22 API calls 95774->95775 95776 426295 95775->95776 95777 43fddb 22 API calls 95776->95777 95778 42394d 95777->95778 95778->95755 95778->95756 95779->95765 95780->95765 95781->95767 95783 4233fe _wcslen 95782->95783 95784 423411 95783->95784 95785 46311d 95783->95785 95792 42a587 95784->95792 95787 43fddb 22 API calls 95785->95787 95789 463127 95787->95789 95788 42341e __fread_nolock 95788->95741 95790 43fe0b 22 API calls 95789->95790 95791 463157 __fread_nolock 95790->95791 95793 42a59d 95792->95793 95796 42a598 __fread_nolock 95792->95796 95794 43fe0b 22 API calls 95793->95794 95795 46f80f 95793->95795 95794->95796 95795->95795 95796->95788 95797 421044 95802 4210f3 95797->95802 95799 42104a 95838 4400a3 29 API calls __onexit 95799->95838 95801 421054 95839 421398 95802->95839 95806 42116a 95807 42a961 22 API calls 95806->95807 95808 421174 95807->95808 95809 42a961 22 API calls 95808->95809 95810 42117e 95809->95810 95811 42a961 22 API calls 95810->95811 95812 421188 95811->95812 95813 42a961 22 API calls 95812->95813 95814 4211c6 95813->95814 95815 42a961 22 API calls 95814->95815 95816 421292 95815->95816 95849 42171c 95816->95849 95820 4212c4 95821 42a961 22 API calls 95820->95821 95822 4212ce 95821->95822 95870 431940 95822->95870 95824 4212f9 95880 421aab 95824->95880 95826 421315 95827 421325 GetStdHandle 95826->95827 95828 462485 95827->95828 95830 42137a 95827->95830 95829 46248e 95828->95829 95828->95830 95831 43fddb 22 API calls 95829->95831 95832 421387 OleInitialize 95830->95832 95833 462495 95831->95833 95832->95799 95887 49011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 95833->95887 95835 46249e 95888 490944 CreateThread 95835->95888 95837 4624aa CloseHandle 95837->95830 95838->95801 95889 4213f1 95839->95889 95842 4213f1 22 API calls 95843 4213d0 95842->95843 95844 42a961 22 API calls 95843->95844 95845 4213dc 95844->95845 95846 426b57 22 API calls 95845->95846 95847 421129 95846->95847 95848 421bc3 6 API calls 95847->95848 95848->95806 95850 42a961 22 API calls 95849->95850 95851 42172c 95850->95851 95852 42a961 22 API calls 95851->95852 95853 421734 95852->95853 95854 42a961 22 API calls 95853->95854 95855 42174f 95854->95855 95856 43fddb 22 API calls 95855->95856 95857 42129c 95856->95857 95858 421b4a 95857->95858 95859 421b58 95858->95859 95860 42a961 22 API calls 95859->95860 95861 421b63 95860->95861 95862 42a961 22 API calls 95861->95862 95863 421b6e 95862->95863 95864 42a961 22 API calls 95863->95864 95865 421b79 95864->95865 95866 42a961 22 API calls 95865->95866 95867 421b84 95866->95867 95868 43fddb 22 API calls 95867->95868 95869 421b96 RegisterWindowMessageW 95868->95869 95869->95820 95871 431981 95870->95871 95872 43195d 95870->95872 95896 440242 EnterCriticalSection 95871->95896 95875 440242 5 API calls 95872->95875 95879 43196e 95872->95879 95874 43198b 95874->95872 95901 4401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95874->95901 95876 438727 95875->95876 95876->95879 95902 4401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95876->95902 95879->95824 95881 421abb 95880->95881 95882 46272d 95880->95882 95883 43fddb 22 API calls 95881->95883 95904 493209 23 API calls 95882->95904 95885 421ac3 95883->95885 95885->95826 95886 462738 95887->95835 95888->95837 95905 49092a 28 API calls 95888->95905 95890 42a961 22 API calls 95889->95890 95891 4213fc 95890->95891 95892 42a961 22 API calls 95891->95892 95893 421404 95892->95893 95894 42a961 22 API calls 95893->95894 95895 4213c6 95894->95895 95895->95842 95900 440256 95896->95900 95897 44025b LeaveCriticalSection 95897->95874 95900->95897 95903 4402d6 LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95900->95903 95901->95872 95902->95879 95903->95900 95904->95886 95906 458402 95911 4581be 95906->95911 95909 45842a 95916 4581ef try_get_first_available_module 95911->95916 95913 4583ee 95930 4527ec 26 API calls _strftime 95913->95930 95915 458343 95915->95909 95923 460984 95915->95923 95922 458338 95916->95922 95926 448e0b 40 API calls 2 library calls 95916->95926 95918 45838c 95918->95922 95927 448e0b 40 API calls 2 library calls 95918->95927 95920 4583ab 95920->95922 95928 448e0b 40 API calls 2 library calls 95920->95928 95922->95915 95929 44f2d9 20 API calls __dosmaperr 95922->95929 95931 460081 95923->95931 95925 46099f 95925->95909 95926->95918 95927->95920 95928->95922 95929->95913 95930->95915 95934 46008d __FrameHandler3::FrameUnwindToState 95931->95934 95932 46009b 95989 44f2d9 20 API calls __dosmaperr 95932->95989 95934->95932 95935 4600d4 95934->95935 95942 46065b 95935->95942 95936 4600a0 95990 4527ec 26 API calls _strftime 95936->95990 95941 4600aa __fread_nolock 95941->95925 95992 46042f 95942->95992 95945 4606a6 96010 455221 95945->96010 95946 46068d 96024 44f2c6 20 API calls __dosmaperr 95946->96024 95949 460692 96025 44f2d9 20 API calls __dosmaperr 95949->96025 95950 4606ab 95951 4606b4 95950->95951 95952 4606cb 95950->95952 96026 44f2c6 20 API calls __dosmaperr 95951->96026 96023 46039a CreateFileW 95952->96023 95956 4606b9 96027 44f2d9 20 API calls __dosmaperr 95956->96027 95958 460781 GetFileType 95959 4607d3 95958->95959 95960 46078c GetLastError 95958->95960 96032 45516a 21 API calls 2 library calls 95959->96032 96030 44f2a3 20 API calls __dosmaperr 95960->96030 95961 460756 GetLastError 96029 44f2a3 20 API calls __dosmaperr 95961->96029 95963 460704 95963->95958 95963->95961 96028 46039a CreateFileW 95963->96028 95965 46079a CloseHandle 95965->95949 95967 4607c3 95965->95967 96031 44f2d9 20 API calls __dosmaperr 95967->96031 95969 460749 95969->95958 95969->95961 95971 4607c8 95971->95949 95972 4607f4 95975 460840 95972->95975 96033 4605ab 72 API calls 3 library calls 95972->96033 95977 46086d 95975->95977 96034 46014d 72 API calls 4 library calls 95975->96034 95976 460866 95976->95977 95978 46087e 95976->95978 95979 4586ae __wsopen_s 29 API calls 95977->95979 95980 4600f8 95978->95980 95981 4608fc CloseHandle 95978->95981 95979->95980 95991 460121 LeaveCriticalSection __wsopen_s 95980->95991 96035 46039a CreateFileW 95981->96035 95983 460927 95984 46095d 95983->95984 95985 460931 GetLastError 95983->95985 95984->95980 96036 44f2a3 20 API calls __dosmaperr 95985->96036 95987 46093d 96037 455333 21 API calls 2 library calls 95987->96037 95989->95936 95990->95941 95991->95941 95993 46046a 95992->95993 95994 460450 95992->95994 96038 4603bf 95993->96038 95994->95993 96045 44f2d9 20 API calls __dosmaperr 95994->96045 95997 46045f 96046 4527ec 26 API calls _strftime 95997->96046 95999 4604a2 96000 4604d1 95999->96000 96047 44f2d9 20 API calls __dosmaperr 95999->96047 96008 460524 96000->96008 96049 44d70d 26 API calls 2 library calls 96000->96049 96003 46051f 96005 46059e 96003->96005 96003->96008 96004 4604c6 96048 4527ec 26 API calls _strftime 96004->96048 96050 4527fc 11 API calls _abort 96005->96050 96008->95945 96008->95946 96009 4605aa 96011 45522d __FrameHandler3::FrameUnwindToState 96010->96011 96053 452f5e EnterCriticalSection 96011->96053 96013 455234 96014 455259 96013->96014 96019 4552c7 EnterCriticalSection 96013->96019 96020 45527b 96013->96020 96057 455000 96014->96057 96017 4552a4 __fread_nolock 96017->95950 96019->96020 96021 4552d4 LeaveCriticalSection 96019->96021 96054 45532a 96020->96054 96021->96013 96023->95963 96024->95949 96025->95980 96026->95956 96027->95949 96028->95969 96029->95949 96030->95965 96031->95971 96032->95972 96033->95975 96034->95976 96035->95983 96036->95987 96037->95984 96040 4603d7 96038->96040 96039 4603f2 96039->95999 96040->96039 96051 44f2d9 20 API calls __dosmaperr 96040->96051 96042 460416 96052 4527ec 26 API calls _strftime 96042->96052 96044 460421 96044->95999 96045->95997 96046->95993 96047->96004 96048->96000 96049->96003 96050->96009 96051->96042 96052->96044 96053->96013 96065 452fa6 LeaveCriticalSection 96054->96065 96056 455331 96056->96017 96058 454c7d __dosmaperr 20 API calls 96057->96058 96063 455012 96058->96063 96059 45501f 96060 4529c8 _free 20 API calls 96059->96060 96061 455071 96060->96061 96061->96020 96064 455147 EnterCriticalSection 96061->96064 96063->96059 96066 453405 11 API calls 2 library calls 96063->96066 96064->96020 96065->96056 96066->96063 96067 472a00 96082 42d7b0 ISource 96067->96082 96068 42db11 PeekMessageW 96068->96082 96069 42d807 GetInputState 96069->96068 96069->96082 96071 471cbe TranslateAcceleratorW 96071->96082 96072 42da04 timeGetTime 96072->96082 96073 42db73 TranslateMessage DispatchMessageW 96074 42db8f PeekMessageW 96073->96074 96074->96082 96075 42dbaf Sleep 96075->96082 96076 472b74 Sleep 96089 472b85 96076->96089 96079 471dda timeGetTime 96230 43e300 23 API calls 96079->96230 96082->96068 96082->96069 96082->96071 96082->96072 96082->96073 96082->96074 96082->96075 96082->96076 96082->96079 96084 4b29bf GetForegroundWindow 96082->96084 96086 42d9d5 96082->96086 96099 42dd50 96082->96099 96106 431310 96082->96106 96165 42bf40 96082->96165 96223 43edf6 96082->96223 96228 42dfd0 216 API calls 3 library calls 96082->96228 96229 43e551 timeGetTime 96082->96229 96231 493a2a 23 API calls 96082->96231 96232 42ec40 96082->96232 96256 49359c 82 API calls __wsopen_s 96082->96256 96257 4a5658 23 API calls 96082->96257 96258 48e97b 96082->96258 96083 472c0b GetExitCodeProcess 96087 472c37 CloseHandle 96083->96087 96088 472c21 WaitForSingleObject 96083->96088 96084->96082 96087->96089 96088->96082 96088->96087 96089->96082 96089->96083 96089->96086 96090 472ca9 Sleep 96089->96090 96268 43e551 timeGetTime 96089->96268 96269 48d4dc 47 API calls 96089->96269 96090->96082 96100 42dd6f 96099->96100 96102 42dd83 96099->96102 96270 42d260 96100->96270 96302 49359c 82 API calls __wsopen_s 96102->96302 96103 42dd7a 96103->96082 96105 472f75 96105->96105 96107 4317b0 96106->96107 96108 431376 96106->96108 96109 440242 5 API calls 96107->96109 96110 431390 96108->96110 96111 476331 96108->96111 96113 4317ba 96109->96113 96114 431940 9 API calls 96110->96114 96375 4a709c 216 API calls 96111->96375 96118 429cb3 22 API calls 96113->96118 96122 4317fb 96113->96122 96115 4313a0 96114->96115 96117 431940 9 API calls 96115->96117 96116 47633d 96116->96082 96119 4313b6 96117->96119 96120 4317d4 96118->96120 96119->96122 96123 4313ec 96119->96123 96362 4401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96120->96362 96121 476346 96376 49359c 82 API calls __wsopen_s 96121->96376 96122->96121 96124 43182c 96122->96124 96123->96121 96146 431408 __fread_nolock 96123->96146 96363 42aceb 96124->96363 96128 431839 96373 43d217 216 API calls 96128->96373 96130 47636e 96377 49359c 82 API calls __wsopen_s 96130->96377 96131 43152f 96133 4763d1 96131->96133 96134 43153c 96131->96134 96379 4a5745 54 API calls _wcslen 96133->96379 96135 431940 9 API calls 96134->96135 96137 431549 96135->96137 96140 4764fa 96137->96140 96142 431940 9 API calls 96137->96142 96138 43fddb 22 API calls 96138->96146 96139 43fe0b 22 API calls 96139->96146 96150 476369 96140->96150 96381 49359c 82 API calls __wsopen_s 96140->96381 96141 431872 96374 43faeb 23 API calls 96141->96374 96148 431563 96142->96148 96145 42ec40 216 API calls 96145->96146 96146->96128 96146->96130 96146->96131 96146->96138 96146->96139 96146->96145 96147 4763b2 96146->96147 96146->96150 96378 49359c 82 API calls __wsopen_s 96147->96378 96148->96140 96153 4315c7 ISource 96148->96153 96380 42a8c7 22 API calls __fread_nolock 96148->96380 96150->96082 96152 431940 9 API calls 96152->96153 96153->96140 96153->96141 96153->96150 96153->96152 96156 43167b ISource 96153->96156 96312 495c5a 96153->96312 96317 4b2598 96153->96317 96326 4b149e 96153->96326 96333 4b29bf 96153->96333 96337 4b19bc 96153->96337 96340 43f645 96153->96340 96347 4b13b7 96153->96347 96358 4aac5b 96153->96358 96154 43171d 96154->96082 96156->96154 96361 43ce17 22 API calls ISource 96156->96361 96478 42adf0 96165->96478 96167 42bf9d 96168 4704b6 96167->96168 96169 42bfa9 96167->96169 96496 49359c 82 API calls __wsopen_s 96168->96496 96171 4704c6 96169->96171 96172 42c01e 96169->96172 96497 49359c 82 API calls __wsopen_s 96171->96497 96483 42ac91 96172->96483 96175 4704f5 96192 47055a 96175->96192 96498 43d217 216 API calls 96175->96498 96177 42c7da 96180 43fe0b 22 API calls 96177->96180 96185 42c808 __fread_nolock 96180->96185 96183 42c039 ISource __fread_nolock 96183->96175 96183->96177 96183->96185 96186 487120 22 API calls 96183->96186 96187 47091a 96183->96187 96189 42af8a 22 API calls 96183->96189 96183->96192 96193 42ec40 216 API calls 96183->96193 96194 4708a5 96183->96194 96198 470591 96183->96198 96199 4708f6 96183->96199 96204 42bbe0 40 API calls 96183->96204 96205 42aceb 23 API calls 96183->96205 96206 42c237 96183->96206 96209 42c603 96183->96209 96212 43fddb 22 API calls 96183->96212 96217 4709bf 96183->96217 96221 43fe0b 22 API calls 96183->96221 96487 42ad81 96183->96487 96501 487099 22 API calls __fread_nolock 96183->96501 96502 4a5745 54 API calls _wcslen 96183->96502 96503 43aa42 22 API calls ISource 96183->96503 96504 48f05c 40 API calls 96183->96504 96505 42a993 96183->96505 96188 43fe0b 22 API calls 96185->96188 96186->96183 96527 493209 23 API calls 96187->96527 96211 42c350 ISource __fread_nolock 96188->96211 96189->96183 96192->96209 96499 49359c 82 API calls __wsopen_s 96192->96499 96193->96183 96195 42ec40 216 API calls 96194->96195 96197 4708cf 96195->96197 96197->96209 96522 42a81b 96197->96522 96500 49359c 82 API calls __wsopen_s 96198->96500 96526 49359c 82 API calls __wsopen_s 96199->96526 96204->96183 96205->96183 96207 42c253 96206->96207 96528 42a8c7 22 API calls __fread_nolock 96206->96528 96210 470976 96207->96210 96215 42c297 ISource 96207->96215 96209->96082 96214 42aceb 23 API calls 96210->96214 96222 42c3ac 96211->96222 96495 43ce17 22 API calls ISource 96211->96495 96212->96183 96214->96217 96216 42aceb 23 API calls 96215->96216 96215->96217 96218 42c335 96216->96218 96217->96209 96529 49359c 82 API calls __wsopen_s 96217->96529 96218->96217 96219 42c342 96218->96219 96494 42a704 22 API calls ISource 96219->96494 96221->96183 96222->96082 96224 43ee09 96223->96224 96225 43ee12 96223->96225 96224->96082 96225->96224 96226 43ee36 IsDialogMessageW 96225->96226 96227 47efaf GetClassLongW 96225->96227 96226->96224 96226->96225 96227->96225 96227->96226 96228->96082 96229->96082 96230->96082 96231->96082 96249 42ec76 ISource 96232->96249 96234 42fef7 96248 42ed9d ISource 96234->96248 96554 42a8c7 22 API calls __fread_nolock 96234->96554 96235 43fddb 22 API calls 96235->96249 96237 474600 96237->96248 96553 42a8c7 22 API calls __fread_nolock 96237->96553 96238 474b0b 96556 49359c 82 API calls __wsopen_s 96238->96556 96242 440242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96242->96249 96243 42a8c7 22 API calls 96243->96249 96246 42fbe3 96246->96248 96250 474bdc 96246->96250 96255 42f3ae ISource 96246->96255 96247 42a961 22 API calls 96247->96249 96248->96082 96249->96234 96249->96235 96249->96237 96249->96238 96249->96242 96249->96243 96249->96246 96249->96247 96249->96248 96251 4400a3 29 API calls pre_c_initialization 96249->96251 96253 474beb 96249->96253 96254 4401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96249->96254 96249->96255 96551 4301e0 216 API calls 2 library calls 96249->96551 96552 4306a0 41 API calls ISource 96249->96552 96557 49359c 82 API calls __wsopen_s 96250->96557 96251->96249 96558 49359c 82 API calls __wsopen_s 96253->96558 96254->96249 96255->96248 96555 49359c 82 API calls __wsopen_s 96255->96555 96256->96082 96257->96082 96259 48e9f9 96258->96259 96261 48e988 96258->96261 96259->96082 96260 48e98a Sleep 96260->96259 96261->96260 96262 48e993 QueryPerformanceCounter 96261->96262 96262->96260 96264 48e9a1 QueryPerformanceFrequency 96262->96264 96265 48e9ab Sleep QueryPerformanceCounter 96264->96265 96266 48e9ec 96265->96266 96266->96265 96267 48e9f0 96266->96267 96267->96259 96268->96089 96269->96089 96271 42ec40 216 API calls 96270->96271 96288 42d29d 96271->96288 96272 471bc4 96311 49359c 82 API calls __wsopen_s 96272->96311 96274 42d30b ISource 96274->96103 96275 42d3c3 96277 42d6d5 96275->96277 96278 42d3ce 96275->96278 96276 42d5ff 96280 471bb5 96276->96280 96281 42d614 96276->96281 96277->96274 96284 43fe0b 22 API calls 96277->96284 96279 43fddb 22 API calls 96278->96279 96290 42d3d5 __fread_nolock 96279->96290 96310 4a5705 23 API calls 96280->96310 96286 43fddb 22 API calls 96281->96286 96282 42d4b8 96287 43fe0b 22 API calls 96282->96287 96283 43fddb 22 API calls 96283->96288 96284->96290 96293 42d46a 96286->96293 96297 42d429 ISource __fread_nolock 96287->96297 96288->96272 96288->96274 96288->96275 96288->96277 96288->96282 96288->96283 96288->96297 96289 43fddb 22 API calls 96291 42d3f6 96289->96291 96290->96289 96290->96291 96291->96297 96306 42bec0 216 API calls 96291->96306 96293->96103 96294 471ba4 96309 49359c 82 API calls __wsopen_s 96294->96309 96297->96276 96297->96293 96297->96294 96298 471b7f 96297->96298 96300 471b5d 96297->96300 96303 421f6f 96297->96303 96308 49359c 82 API calls __wsopen_s 96298->96308 96307 49359c 82 API calls __wsopen_s 96300->96307 96302->96105 96304 42ec40 216 API calls 96303->96304 96305 421f98 96304->96305 96305->96297 96306->96297 96307->96293 96308->96293 96309->96293 96310->96272 96311->96274 96382 427510 96312->96382 96316 495c77 96316->96153 96414 4b2ad8 96317->96414 96319 4b25a9 96322 4b25b8 96319->96322 96424 483d03 SendMessageTimeoutW 96319->96424 96321 4b2607 96321->96322 96425 42b567 96321->96425 96322->96153 96324 4b2630 SetWindowPos 96324->96322 96327 4b2ad8 54 API calls 96326->96327 96328 4b14ae 96327->96328 96329 4b29bf GetForegroundWindow 96328->96329 96330 4b14b5 96329->96330 96331 4b14eb GetForegroundWindow 96330->96331 96332 4b14b9 96330->96332 96331->96332 96332->96153 96334 4b29cb 96333->96334 96335 4b2a01 GetForegroundWindow 96334->96335 96336 4b29d1 96334->96336 96335->96336 96336->96153 96338 4b2ad8 54 API calls 96337->96338 96339 4b19cb 96338->96339 96339->96153 96341 42b567 39 API calls 96340->96341 96342 43f659 96341->96342 96343 43f661 timeGetTime 96342->96343 96344 47f2dc Sleep 96342->96344 96345 42b567 39 API calls 96343->96345 96346 43f677 96345->96346 96346->96153 96348 4b2ad8 54 API calls 96347->96348 96349 4b13cb 96348->96349 96350 4b1418 GetForegroundWindow 96349->96350 96355 4b13da 96349->96355 96351 4b142a 96350->96351 96352 4b1435 96350->96352 96354 48e97b 5 API calls 96351->96354 96432 43f98e GetForegroundWindow 96352->96432 96354->96352 96355->96153 96356 4b1442 96357 48e97b 5 API calls 96356->96357 96357->96355 96445 4aad64 96358->96445 96360 4aac6f 96360->96153 96361->96156 96362->96122 96364 42acf9 96363->96364 96370 42ad2a ISource 96363->96370 96365 42ad55 96364->96365 96367 42ad01 ISource 96364->96367 96365->96370 96476 42a8c7 22 API calls __fread_nolock 96365->96476 96368 42ad21 96367->96368 96369 46fa48 96367->96369 96367->96370 96368->96370 96371 46fa3a VariantClear 96368->96371 96369->96370 96477 43ce17 22 API calls ISource 96369->96477 96370->96128 96371->96370 96373->96141 96374->96141 96375->96116 96376->96150 96377->96150 96378->96150 96379->96148 96380->96153 96381->96150 96383 427522 96382->96383 96384 427525 96382->96384 96405 48dbbe lstrlenW 96383->96405 96385 42755b 96384->96385 96386 42752d 96384->96386 96388 4650f6 96385->96388 96389 42756d 96385->96389 96397 46500f 96385->96397 96410 4451c6 26 API calls 96386->96410 96413 445183 26 API calls 96388->96413 96411 43fb21 51 API calls 96389->96411 96390 42753d 96395 43fddb 22 API calls 96390->96395 96393 46510e 96393->96393 96398 427547 96395->96398 96396 465088 96412 43fb21 51 API calls 96396->96412 96397->96396 96400 43fe0b 22 API calls 96397->96400 96399 429cb3 22 API calls 96398->96399 96399->96383 96401 465058 96400->96401 96402 43fddb 22 API calls 96401->96402 96403 46507f 96402->96403 96404 429cb3 22 API calls 96403->96404 96404->96396 96406 48dbdc GetFileAttributesW 96405->96406 96408 48dc06 96405->96408 96407 48dbe8 FindFirstFileW 96406->96407 96406->96408 96407->96408 96409 48dbf9 FindClose 96407->96409 96408->96316 96409->96408 96410->96390 96411->96390 96412->96388 96413->96393 96415 42aceb 23 API calls 96414->96415 96416 4b2af3 96415->96416 96417 4b2aff 96416->96417 96418 4b2b1d 96416->96418 96419 427510 53 API calls 96417->96419 96420 426b57 22 API calls 96418->96420 96421 4b2b0c 96419->96421 96423 4b2b1b 96420->96423 96421->96423 96430 42a8c7 22 API calls __fread_nolock 96421->96430 96423->96319 96424->96321 96426 42b57f 96425->96426 96427 42b578 96425->96427 96426->96324 96427->96426 96431 4462d1 39 API calls _strftime 96427->96431 96429 42b5c2 96429->96324 96430->96423 96431->96429 96433 47f467 96432->96433 96434 43f9a8 96432->96434 96435 47f46e FindWindowW 96433->96435 96436 47f47c IsIconic 96433->96436 96434->96356 96435->96436 96437 47f487 ShowWindow 96436->96437 96438 47f490 SetForegroundWindow 96436->96438 96437->96438 96439 47f4a2 7 API calls 96438->96439 96440 47f56b 96438->96440 96441 47f547 96439->96441 96442 47f4eb 9 API calls 96439->96442 96444 47f54f AttachThreadInput AttachThreadInput AttachThreadInput 96441->96444 96443 47f543 96442->96443 96443->96441 96443->96444 96444->96440 96446 42a961 22 API calls 96445->96446 96447 4aad77 ___scrt_fastfail 96446->96447 96448 4aadce 96447->96448 96449 427510 53 API calls 96447->96449 96450 4aadee 96448->96450 96452 427510 53 API calls 96448->96452 96451 4aadab 96449->96451 96453 4aae3a 96450->96453 96454 427510 53 API calls 96450->96454 96451->96448 96456 427510 53 API calls 96451->96456 96455 4aade4 96452->96455 96458 4aae4d ___scrt_fastfail 96453->96458 96460 42b567 39 API calls 96453->96460 96464 4aae04 96454->96464 96474 427620 22 API calls _wcslen 96455->96474 96459 4aadc4 96456->96459 96462 427510 53 API calls 96458->96462 96473 427620 22 API calls _wcslen 96459->96473 96460->96458 96463 4aae85 ShellExecuteExW 96462->96463 96469 4aaeb0 96463->96469 96464->96453 96465 427510 53 API calls 96464->96465 96466 4aae28 96465->96466 96466->96453 96475 42a8c7 22 API calls __fread_nolock 96466->96475 96468 4aaec8 96468->96360 96469->96468 96470 4aaf35 GetProcessId 96469->96470 96471 4aaf48 96470->96471 96472 4aaf58 CloseHandle 96471->96472 96472->96468 96473->96448 96474->96450 96475->96453 96476->96370 96477->96370 96479 42ae01 96478->96479 96482 42ae1c ISource 96478->96482 96480 42aec9 22 API calls 96479->96480 96481 42ae09 CharUpperBuffW 96480->96481 96481->96482 96482->96167 96484 42acae 96483->96484 96485 42acd1 96484->96485 96530 49359c 82 API calls __wsopen_s 96484->96530 96485->96183 96488 42ad92 96487->96488 96489 46fadb 96487->96489 96490 43fddb 22 API calls 96488->96490 96491 42ad99 96490->96491 96531 42adcd 96491->96531 96494->96211 96495->96211 96496->96171 96497->96209 96498->96192 96499->96209 96500->96209 96501->96183 96502->96183 96503->96183 96504->96183 96539 42bbe0 96505->96539 96507 42a9a3 96508 42a9b1 96507->96508 96509 46f8c8 96507->96509 96511 43fddb 22 API calls 96508->96511 96510 42aceb 23 API calls 96509->96510 96512 46f8d3 96510->96512 96513 42a9c2 96511->96513 96514 42a961 22 API calls 96513->96514 96515 42a9cc 96514->96515 96516 42a9db 96515->96516 96547 42a8c7 22 API calls __fread_nolock 96515->96547 96518 43fddb 22 API calls 96516->96518 96519 42a9e5 96518->96519 96548 42a869 40 API calls 96519->96548 96521 42aa09 96521->96183 96523 42a826 96522->96523 96524 42a855 96523->96524 96525 42a993 41 API calls 96523->96525 96524->96199 96525->96524 96526->96209 96527->96206 96528->96207 96529->96209 96530->96485 96535 42addd 96531->96535 96532 42adb6 96532->96183 96533 43fddb 22 API calls 96533->96535 96534 42a961 22 API calls 96534->96535 96535->96532 96535->96533 96535->96534 96537 42adcd 22 API calls 96535->96537 96538 42a8c7 22 API calls __fread_nolock 96535->96538 96537->96535 96538->96535 96540 42be27 96539->96540 96545 42bbf3 96539->96545 96540->96507 96541 440242 5 API calls 96541->96545 96542 42a961 22 API calls 96542->96545 96543 42bc9d 96543->96507 96545->96541 96545->96542 96545->96543 96549 4400a3 29 API calls __onexit 96545->96549 96550 4401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96545->96550 96547->96516 96548->96521 96549->96545 96550->96545 96551->96249 96552->96249 96553->96248 96554->96248 96555->96248 96556->96248 96557->96253 96558->96248 96559 42dee5 96562 42b710 96559->96562 96563 42b72b 96562->96563 96564 470146 96563->96564 96565 4700f8 96563->96565 96592 42b750 96563->96592 96604 4a58a2 96564->96604 96568 470102 96565->96568 96569 47010f 96565->96569 96565->96592 96567 440242 5 API calls 96567->96592 96593 4a5d33 96568->96593 96588 42ba20 96569->96588 96642 4a61d0 216 API calls 2 library calls 96569->96642 96574 4703d9 96574->96574 96575 43d336 40 API calls 96575->96592 96578 42ba4e 96580 470322 96645 4a5c0c 82 API calls 96580->96645 96583 42a81b 41 API calls 96583->96592 96585 42aceb 23 API calls 96585->96592 96587 42bbe0 40 API calls 96587->96592 96588->96578 96646 49359c 82 API calls __wsopen_s 96588->96646 96589 42ec40 216 API calls 96589->96592 96592->96567 96592->96575 96592->96578 96592->96580 96592->96583 96592->96585 96592->96587 96592->96588 96592->96589 96627 43d2f0 96592->96627 96633 43a01b 216 API calls 96592->96633 96634 43edcd 22 API calls 96592->96634 96635 4400a3 29 API calls __onexit 96592->96635 96636 4401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96592->96636 96637 43ee53 96592->96637 96641 43e5ca 216 API calls 96592->96641 96643 47f6bf 23 API calls 96592->96643 96644 42a8c7 22 API calls __fread_nolock 96592->96644 96597 4a5d81 96593->96597 96594 4a5ed7 96650 49359c 82 API calls __wsopen_s 96594->96650 96595 42ec40 216 API calls 96595->96597 96596 43d2f0 40 API calls 96596->96597 96597->96594 96597->96595 96597->96596 96599 42a81b 41 API calls 96597->96599 96600 4a5f12 96597->96600 96647 43acd5 39 API calls 96597->96647 96648 43ad26 39 API calls 96597->96648 96649 42b270 39 API calls 96597->96649 96599->96597 96600->96569 96605 4a58cb 96604->96605 96606 4a58e1 96604->96606 96605->96606 96607 4a58d0 96605->96607 96608 440242 5 API calls 96606->96608 96614 4a5935 96606->96614 96609 4a5d33 216 API calls 96607->96609 96611 4a5906 96608->96611 96610 4a58dc 96609->96610 96610->96592 96611->96614 96651 43edcd 22 API calls 96611->96651 96612 43d2f0 40 API calls 96612->96614 96614->96610 96614->96612 96615 4a5aa8 96614->96615 96618 42a81b 41 API calls 96614->96618 96623 43ee53 82 API calls 96614->96623 96625 42ec40 216 API calls 96614->96625 96654 43a01b 216 API calls 96614->96654 96655 4a5c0c 82 API calls 96614->96655 96656 43e5ca 216 API calls 96614->96656 96657 49359c 82 API calls __wsopen_s 96615->96657 96617 4a591f 96652 4400a3 29 API calls __onexit 96617->96652 96618->96614 96620 4a5929 96653 4401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96620->96653 96623->96614 96625->96614 96628 43d329 96627->96628 96631 43d2fc 96627->96631 96628->96631 96659 43d336 40 API calls 96628->96659 96630 43d321 96630->96592 96631->96630 96658 43d336 40 API calls 96631->96658 96633->96592 96634->96592 96635->96592 96636->96592 96638 43ee70 96637->96638 96640 43eeb8 96637->96640 96638->96640 96660 49359c 82 API calls __wsopen_s 96638->96660 96640->96592 96641->96592 96642->96588 96643->96592 96644->96592 96645->96588 96646->96574 96647->96597 96648->96597 96649->96597 96650->96600 96651->96617 96652->96620 96653->96614 96654->96614 96655->96614 96656->96614 96657->96610 96658->96630 96659->96631 96660->96640 96661 421cad SystemParametersInfoW 96662 421033 96667 424c91 96662->96667 96666 421042 96668 42a961 22 API calls 96667->96668 96669 424cff 96668->96669 96675 423af0 96669->96675 96672 424d9c 96673 421038 96672->96673 96678 4251f7 22 API calls __fread_nolock 96672->96678 96674 4400a3 29 API calls __onexit 96673->96674 96674->96666 96679 423b1c 96675->96679 96678->96672 96680 423b0f 96679->96680 96681 423b29 96679->96681 96680->96672 96681->96680 96682 423b30 RegOpenKeyExW 96681->96682 96682->96680 96683 423b4a RegQueryValueExW 96682->96683 96684 423b80 RegCloseKey 96683->96684 96685 423b6b 96683->96685 96684->96680 96685->96684 96686 473f75 96697 43ceb1 96686->96697 96688 473f8b 96690 474006 96688->96690 96706 43e300 23 API calls 96688->96706 96691 42bf40 216 API calls 96690->96691 96692 474052 96691->96692 96694 474a88 96692->96694 96708 49359c 82 API calls __wsopen_s 96692->96708 96695 473fe6 96695->96692 96707 491abf 22 API calls 96695->96707 96698 43ced2 96697->96698 96699 43cebf 96697->96699 96701 43ced7 96698->96701 96702 43cf05 96698->96702 96700 42aceb 23 API calls 96699->96700 96705 43cec9 96700->96705 96703 43fddb 22 API calls 96701->96703 96704 42aceb 23 API calls 96702->96704 96703->96705 96704->96705 96705->96688 96706->96695 96707->96690 96708->96694 96709 423156 96712 423170 96709->96712 96713 423187 96712->96713 96714 4231eb 96713->96714 96715 42318c 96713->96715 96753 4231e9 96713->96753 96717 4231f1 96714->96717 96718 462dfb 96714->96718 96719 423265 PostQuitMessage 96715->96719 96720 423199 96715->96720 96716 4231d0 DefWindowProcW 96744 42316a 96716->96744 96721 4231f8 96717->96721 96722 42321d SetTimer RegisterWindowMessageW 96717->96722 96768 4218e2 10 API calls 96718->96768 96719->96744 96724 4231a4 96720->96724 96725 462e7c 96720->96725 96726 423201 KillTimer 96721->96726 96727 462d9c 96721->96727 96729 423246 CreatePopupMenu 96722->96729 96722->96744 96730 4231ae 96724->96730 96731 462e68 96724->96731 96772 48bf30 34 API calls ___scrt_fastfail 96725->96772 96764 4230f2 Shell_NotifyIconW ___scrt_fastfail 96726->96764 96733 462dd7 MoveWindow 96727->96733 96734 462da1 96727->96734 96728 462e1c 96769 43e499 42 API calls 96728->96769 96729->96744 96738 462e4d 96730->96738 96739 4231b9 96730->96739 96757 48c161 96731->96757 96733->96744 96741 462dc6 SetFocus 96734->96741 96742 462da7 96734->96742 96738->96716 96771 480ad7 22 API calls 96738->96771 96745 4231c4 96739->96745 96746 423253 96739->96746 96740 462e8e 96740->96716 96740->96744 96741->96744 96742->96745 96747 462db0 96742->96747 96743 423214 96765 423c50 DeleteObject DestroyWindow 96743->96765 96745->96716 96770 4230f2 Shell_NotifyIconW ___scrt_fastfail 96745->96770 96766 42326f 44 API calls ___scrt_fastfail 96746->96766 96767 4218e2 10 API calls 96747->96767 96751 423263 96751->96744 96753->96716 96755 462e41 96756 423837 49 API calls 96755->96756 96756->96753 96758 48c179 ___scrt_fastfail 96757->96758 96759 48c276 96757->96759 96760 423923 24 API calls 96758->96760 96759->96744 96761 48c1a0 96760->96761 96762 48c25f KillTimer SetTimer 96761->96762 96763 48c251 Shell_NotifyIconW 96761->96763 96762->96759 96763->96762 96764->96743 96765->96744 96766->96751 96767->96744 96768->96728 96769->96745 96770->96755 96771->96753 96772->96740 96773 422e37 96774 42a961 22 API calls 96773->96774 96775 422e4d 96774->96775 96852 424ae3 96775->96852 96777 422e6b 96778 423a5a 24 API calls 96777->96778 96779 422e7f 96778->96779 96780 429cb3 22 API calls 96779->96780 96781 422e8c 96780->96781 96782 424ecb 94 API calls 96781->96782 96783 422ea5 96782->96783 96784 462cb0 96783->96784 96787 422ead 96783->96787 96785 492cf9 80 API calls 96784->96785 96786 462cc3 96785->96786 96788 462ccf 96786->96788 96790 424f39 68 API calls 96786->96790 96866 42a8c7 22 API calls __fread_nolock 96787->96866 96793 424f39 68 API calls 96788->96793 96790->96788 96791 422ec3 96867 426f88 22 API calls 96791->96867 96795 462ce5 96793->96795 96794 422ecf 96796 429cb3 22 API calls 96794->96796 96882 423084 22 API calls 96795->96882 96797 422edc 96796->96797 96798 42a81b 41 API calls 96797->96798 96799 422eec 96798->96799 96802 429cb3 22 API calls 96799->96802 96801 462d02 96883 423084 22 API calls 96801->96883 96804 422f12 96802->96804 96806 42a81b 41 API calls 96804->96806 96805 462d1e 96807 423a5a 24 API calls 96805->96807 96809 422f21 96806->96809 96808 462d44 96807->96808 96884 423084 22 API calls 96808->96884 96812 42a961 22 API calls 96809->96812 96811 462d50 96885 42a8c7 22 API calls __fread_nolock 96811->96885 96814 422f3f 96812->96814 96868 423084 22 API calls 96814->96868 96815 462d5e 96886 423084 22 API calls 96815->96886 96818 422f4b 96869 444a28 40 API calls 2 library calls 96818->96869 96820 462d6d 96887 42a8c7 22 API calls __fread_nolock 96820->96887 96821 422f59 96821->96795 96822 422f63 96821->96822 96870 444a28 40 API calls 2 library calls 96822->96870 96825 422f6e 96825->96801 96828 422f78 96825->96828 96826 462d83 96888 423084 22 API calls 96826->96888 96871 444a28 40 API calls 2 library calls 96828->96871 96829 462d90 96831 422f83 96831->96805 96832 422f8d 96831->96832 96872 444a28 40 API calls 2 library calls 96832->96872 96834 422f98 96835 422fdc 96834->96835 96873 423084 22 API calls 96834->96873 96835->96820 96836 422fe8 96835->96836 96836->96829 96876 4263eb 22 API calls 96836->96876 96839 422fbf 96874 42a8c7 22 API calls __fread_nolock 96839->96874 96841 422ff8 96877 426a50 22 API calls 96841->96877 96842 422fcd 96875 423084 22 API calls 96842->96875 96845 423006 96878 4270b0 23 API calls 96845->96878 96849 423021 96850 423065 96849->96850 96879 426f88 22 API calls 96849->96879 96880 4270b0 23 API calls 96849->96880 96881 423084 22 API calls 96849->96881 96853 424af0 __wsopen_s 96852->96853 96854 426b57 22 API calls 96853->96854 96855 424b22 96853->96855 96854->96855 96865 424b58 96855->96865 96889 424c6d 96855->96889 96857 424c6d 22 API calls 96857->96865 96858 429cb3 22 API calls 96860 424c52 96858->96860 96859 429cb3 22 API calls 96859->96865 96861 42515f 22 API calls 96860->96861 96863 424c5e 96861->96863 96862 42515f 22 API calls 96862->96865 96863->96777 96864 424c29 96864->96858 96864->96863 96865->96857 96865->96859 96865->96862 96865->96864 96866->96791 96867->96794 96868->96818 96869->96821 96870->96825 96871->96831 96872->96834 96873->96839 96874->96842 96875->96835 96876->96841 96877->96845 96878->96849 96879->96849 96880->96849 96881->96849 96882->96801 96883->96805 96884->96811 96885->96815 96886->96820 96887->96826 96888->96829 96890 42aec9 22 API calls 96889->96890 96891 424c78 96890->96891 96891->96855 96892 42105b 96897 42344d 96892->96897 96894 42106a 96928 4400a3 29 API calls __onexit 96894->96928 96896 421074 96898 42345d __wsopen_s 96897->96898 96899 42a961 22 API calls 96898->96899 96900 423513 96899->96900 96901 423a5a 24 API calls 96900->96901 96902 42351c 96901->96902 96929 423357 96902->96929 96905 4233c6 22 API calls 96906 423535 96905->96906 96907 42515f 22 API calls 96906->96907 96908 423544 96907->96908 96909 42a961 22 API calls 96908->96909 96910 42354d 96909->96910 96911 42a6c3 22 API calls 96910->96911 96912 423556 RegOpenKeyExW 96911->96912 96913 463176 RegQueryValueExW 96912->96913 96918 423578 96912->96918 96914 463193 96913->96914 96915 46320c RegCloseKey 96913->96915 96917 43fe0b 22 API calls 96914->96917 96916 46321e _wcslen 96915->96916 96915->96918 96916->96918 96925 429cb3 22 API calls 96916->96925 96926 42515f 22 API calls 96916->96926 96927 424c6d 22 API calls 96916->96927 96919 4631ac 96917->96919 96918->96894 96920 425722 22 API calls 96919->96920 96921 4631b7 RegQueryValueExW 96920->96921 96922 4631d4 96921->96922 96924 4631ee ISource 96921->96924 96923 426b57 22 API calls 96922->96923 96923->96924 96924->96915 96925->96916 96926->96916 96927->96916 96928->96896 96930 461f50 __wsopen_s 96929->96930 96931 423364 GetFullPathNameW 96930->96931 96932 423386 96931->96932 96933 426b57 22 API calls 96932->96933 96934 4233a4 96933->96934 96934->96905 96935 421098 96940 4242de 96935->96940 96939 4210a7 96941 42a961 22 API calls 96940->96941 96942 4242f5 GetVersionExW 96941->96942 96943 426b57 22 API calls 96942->96943 96944 424342 96943->96944 96945 4293b2 22 API calls 96944->96945 96949 424378 96944->96949 96946 42436c 96945->96946 96948 4237a0 22 API calls 96946->96948 96947 42441b GetCurrentProcess IsWow64Process 96950 424437 96947->96950 96948->96949 96949->96947 96951 4637df 96949->96951 96952 463824 GetSystemInfo 96950->96952 96953 42444f LoadLibraryA 96950->96953 96954 424460 GetProcAddress 96953->96954 96955 42449c GetSystemInfo 96953->96955 96954->96955 96957 424470 GetNativeSystemInfo 96954->96957 96956 424476 96955->96956 96958 42109d 96956->96958 96959 42447a FreeLibrary 96956->96959 96957->96956 96960 4400a3 29 API calls __onexit 96958->96960 96959->96958 96960->96939 96961 42f7bf 96962 42f7d3 96961->96962 96963 42fcb6 96961->96963 96965 42fcc2 96962->96965 96966 43fddb 22 API calls 96962->96966 96964 42aceb 23 API calls 96963->96964 96964->96965 96967 42aceb 23 API calls 96965->96967 96968 42f7e5 96966->96968 96970 42fd3d 96967->96970 96968->96965 96969 42f83e 96968->96969 96968->96970 96972 431310 216 API calls 96969->96972 96975 42ed9d ISource 96969->96975 96998 491155 22 API calls 96970->96998 96994 42ec76 ISource 96972->96994 96973 474beb 97004 49359c 82 API calls __wsopen_s 96973->97004 96974 43fddb 22 API calls 96974->96994 96977 42fef7 96977->96975 97000 42a8c7 22 API calls __fread_nolock 96977->97000 96979 474b0b 97002 49359c 82 API calls __wsopen_s 96979->97002 96980 42a8c7 22 API calls 96980->96994 96982 474600 96982->96975 96999 42a8c7 22 API calls __fread_nolock 96982->96999 96984 42f3ae ISource 96984->96975 97001 49359c 82 API calls __wsopen_s 96984->97001 96988 440242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96988->96994 96989 42fbe3 96989->96975 96989->96984 96991 474bdc 96989->96991 96990 42a961 22 API calls 96990->96994 97003 49359c 82 API calls __wsopen_s 96991->97003 96993 4400a3 29 API calls pre_c_initialization 96993->96994 96994->96973 96994->96974 96994->96975 96994->96977 96994->96979 96994->96980 96994->96982 96994->96984 96994->96988 96994->96989 96994->96990 96994->96993 96995 4401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96994->96995 96996 4301e0 216 API calls 2 library calls 96994->96996 96997 4306a0 41 API calls ISource 96994->96997 96995->96994 96996->96994 96997->96994 96998->96975 96999->96975 97000->96975 97001->96975 97002->96975 97003->96973 97004->96975 97005 4b2a55 97013 491ebc 97005->97013 97008 4b2a87 97009 4b2a70 97015 4839c0 22 API calls 97009->97015 97011 4b2a7c 97016 48417d 22 API calls __fread_nolock 97011->97016 97014 491ec3 IsWindow 97013->97014 97014->97008 97014->97009 97015->97011 97016->97008 97017 42dddc 97018 42b710 216 API calls 97017->97018 97019 42ddea 97018->97019 97020 4403fb 97021 440407 __FrameHandler3::FrameUnwindToState 97020->97021 97049 43feb1 97021->97049 97023 44040e 97024 440561 97023->97024 97027 440438 97023->97027 97076 44083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 97024->97076 97026 440568 97077 444e52 28 API calls _abort 97026->97077 97037 440477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 97027->97037 97060 45247d 97027->97060 97029 44056e 97078 444e04 28 API calls _abort 97029->97078 97033 440576 97034 440457 97036 4404d8 97068 440959 97036->97068 97037->97036 97072 444e1a 38 API calls 3 library calls 97037->97072 97040 4404de 97041 4404f3 97040->97041 97073 440992 GetModuleHandleW 97041->97073 97043 4404fa 97043->97026 97044 4404fe 97043->97044 97045 440507 97044->97045 97074 444df5 28 API calls _abort 97044->97074 97075 440040 13 API calls 2 library calls 97045->97075 97048 44050f 97048->97034 97050 43feba 97049->97050 97079 440698 IsProcessorFeaturePresent 97050->97079 97052 43fec6 97080 442c94 10 API calls 3 library calls 97052->97080 97054 43fecb 97055 43fecf 97054->97055 97081 452317 97054->97081 97055->97023 97058 43fee6 97058->97023 97062 452494 97060->97062 97061 440a8c CatchGuardHandler 5 API calls 97063 440451 97061->97063 97062->97061 97063->97034 97064 452421 97063->97064 97065 452450 97064->97065 97066 440a8c CatchGuardHandler 5 API calls 97065->97066 97067 452479 97066->97067 97067->97037 97132 442340 97068->97132 97071 44097f 97071->97040 97072->97036 97073->97043 97074->97045 97075->97048 97076->97026 97077->97029 97078->97033 97079->97052 97080->97054 97085 45d1f6 97081->97085 97084 442cbd 8 API calls 3 library calls 97084->97055 97086 45d213 97085->97086 97089 45d20f 97085->97089 97086->97089 97091 454bfb 97086->97091 97088 43fed8 97088->97058 97088->97084 97103 440a8c 97089->97103 97092 454c07 __FrameHandler3::FrameUnwindToState 97091->97092 97110 452f5e EnterCriticalSection 97092->97110 97094 454c0e 97111 4550af 97094->97111 97096 454c1d 97102 454c2c 97096->97102 97124 454a8f 29 API calls 97096->97124 97099 454c27 97125 454b45 GetStdHandle GetFileType 97099->97125 97100 454c3d __fread_nolock 97100->97086 97126 454c48 LeaveCriticalSection _abort 97102->97126 97104 440a95 97103->97104 97105 440a97 IsProcessorFeaturePresent 97103->97105 97104->97088 97107 440c5d 97105->97107 97131 440c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 97107->97131 97109 440d40 97109->97088 97110->97094 97112 4550bb __FrameHandler3::FrameUnwindToState 97111->97112 97113 4550df 97112->97113 97114 4550c8 97112->97114 97127 452f5e EnterCriticalSection 97113->97127 97128 44f2d9 20 API calls __dosmaperr 97114->97128 97117 4550cd 97129 4527ec 26 API calls _strftime 97117->97129 97118 4550eb 97120 455117 97118->97120 97123 455000 __wsopen_s 21 API calls 97118->97123 97130 45513e LeaveCriticalSection _abort 97120->97130 97121 4550d7 __fread_nolock 97121->97096 97123->97118 97124->97099 97125->97102 97126->97100 97127->97118 97128->97117 97129->97121 97130->97121 97131->97109 97133 44096c GetStartupInfoW 97132->97133 97133->97071

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 234 4242de-42434d call 42a961 GetVersionExW call 426b57 239 463617-46362a 234->239 240 424353 234->240 241 46362b-46362f 239->241 242 424355-424357 240->242 243 463632-46363e 241->243 244 463631 241->244 245 463656 242->245 246 42435d-4243bc call 4293b2 call 4237a0 242->246 243->241 248 463640-463642 243->248 244->243 251 46365d-463660 245->251 262 4243c2-4243c4 246->262 263 4637df-4637e6 246->263 248->242 250 463648-46364f 248->250 250->239 255 463651 250->255 252 463666-4636a8 251->252 253 42441b-424435 GetCurrentProcess IsWow64Process 251->253 252->253 256 4636ae-4636b1 252->256 258 424437 253->258 259 424494-42449a 253->259 255->245 260 4636b3-4636bd 256->260 261 4636db-4636e5 256->261 264 42443d-424449 258->264 259->264 265 4636bf-4636c5 260->265 266 4636ca-4636d6 260->266 268 4636e7-4636f3 261->268 269 4636f8-463702 261->269 262->251 267 4243ca-4243dd 262->267 270 463806-463809 263->270 271 4637e8 263->271 272 463824-463828 GetSystemInfo 264->272 273 42444f-42445e LoadLibraryA 264->273 265->253 266->253 274 463726-46372f 267->274 275 4243e3-4243e5 267->275 268->253 277 463704-463710 269->277 278 463715-463721 269->278 279 4637f4-4637fc 270->279 280 46380b-46381a 270->280 276 4637ee 271->276 281 424460-42446e GetProcAddress 273->281 282 42449c-4244a6 GetSystemInfo 273->282 286 463731-463737 274->286 287 46373c-463748 274->287 284 4243eb-4243ee 275->284 285 46374d-463762 275->285 276->279 277->253 278->253 279->270 280->276 288 46381c-463822 280->288 281->282 289 424470-424474 GetNativeSystemInfo 281->289 283 424476-424478 282->283 290 424481-424493 283->290 291 42447a-42447b FreeLibrary 283->291 292 4243f4-42440f 284->292 293 463791-463794 284->293 294 463764-46376a 285->294 295 46376f-46377b 285->295 286->253 287->253 288->279 289->283 291->290 297 463780-46378c 292->297 298 424415 292->298 293->253 296 46379a-4637c1 293->296 294->253 295->253 299 4637c3-4637c9 296->299 300 4637ce-4637da 296->300 297->253 298->253 299->253 300->253
                                      APIs
                                      • GetVersionExW.KERNEL32(?), ref: 0042430D
                                        • Part of subcall function 00426B57: _wcslen.LIBCMT ref: 00426B6A
                                      • GetCurrentProcess.KERNEL32(?,004BCB64,00000000,?,?), ref: 00424422
                                      • IsWow64Process.KERNEL32(00000000,?,?), ref: 00424429
                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00424454
                                      • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00424466
                                      • GetNativeSystemInfo.KERNEL32(?,?,?), ref: 00424474
                                      • FreeLibrary.KERNEL32(00000000,?,?), ref: 0042447B
                                      • GetSystemInfo.KERNEL32(?,?,?), ref: 004244A0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                      • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                      • API String ID: 3290436268-3101561225
                                      • Opcode ID: e24390d1b9139f038ebd3ebc62e13e267241b7644c09f0df8b5d3f061b679402
                                      • Instruction ID: 3de2e28995b5ddc61e6d45c616de20de9d65b5a3f7b958fc382e97fa8e077077
                                      • Opcode Fuzzy Hash: e24390d1b9139f038ebd3ebc62e13e267241b7644c09f0df8b5d3f061b679402
                                      • Instruction Fuzzy Hash: 28A1A465A0A2E4DFE711DB6DBC815B57FE4AB76301B0848BADC4193B31D2284535CB2F

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1149 4242a2-4242ba CreateStreamOnHGlobal 1150 4242da-4242dd 1149->1150 1151 4242bc-4242d3 FindResourceExW 1149->1151 1152 4242d9 1151->1152 1153 4635ba-4635c9 LoadResource 1151->1153 1152->1150 1153->1152 1154 4635cf-4635dd SizeofResource 1153->1154 1154->1152 1155 4635e3-4635ee LockResource 1154->1155 1155->1152 1156 4635f4-463612 1155->1156 1156->1152
                                      APIs
                                      • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,004250AA,?,?,00000000,00000000), ref: 004242B2
                                      • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,004250AA,?,?,00000000,00000000), ref: 004242C9
                                      • LoadResource.KERNEL32(?,00000000,?,?,004250AA,?,?,00000000,00000000,?,?,?,?,?,?,00424F20), ref: 004635BE
                                      • SizeofResource.KERNEL32(?,00000000,?,?,004250AA,?,?,00000000,00000000,?,?,?,?,?,?,00424F20), ref: 004635D3
                                      • LockResource.KERNEL32(004250AA,?,?,004250AA,?,?,00000000,00000000,?,?,?,?,?,?,00424F20,?), ref: 004635E6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                      • String ID: SCRIPT
                                      • API String ID: 3051347437-3967369404
                                      • Opcode ID: a678ed6dff95c0d9c6eb1882b43f8f1a41d101383510d81ad79eca3237af637a
                                      • Instruction ID: 94f1c92815b075e053f9af3fd2fd472b47897e648cd82c56c948f2755e3398fd
                                      • Opcode Fuzzy Hash: a678ed6dff95c0d9c6eb1882b43f8f1a41d101383510d81ad79eca3237af637a
                                      • Instruction Fuzzy Hash: 89117C70600700FFDB258B66EC88F677BB9EBC5B91F2042AAF402D6290DB71DC008675

                                      Control-flow Graph

                                      APIs
                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00422B6B
                                        • Part of subcall function 00423A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,004F1418,?,00422E7F,?,?,?,00000000), ref: 00423A78
                                        • Part of subcall function 00429CB3: _wcslen.LIBCMT ref: 00429CBD
                                      • GetForegroundWindow.USER32(runas,?,?,?,?,?,004E2224), ref: 00462C10
                                      • ShellExecuteW.SHELL32(00000000,?,?,004E2224), ref: 00462C17
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                      • String ID: runas
                                      • API String ID: 448630720-4000483414
                                      • Opcode ID: 7910dad248640e2192c2042a1477536b34cfe067836304d34d2626517378cb5c
                                      • Instruction ID: 5a3a616c1c0203c1816f2f3dfc67d2aa029dfe80ba1b08cc983a4541a8491aeb
                                      • Opcode Fuzzy Hash: 7910dad248640e2192c2042a1477536b34cfe067836304d34d2626517378cb5c
                                      • Instruction Fuzzy Hash: 1811D531304255AAC704FF22F9919BE7BA4AF90749FC4582FB142120A2CF6D9A09C71E

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1677 48dbbe-48dbda lstrlenW 1678 48dbdc-48dbe6 GetFileAttributesW 1677->1678 1679 48dc06 1677->1679 1680 48dbe8-48dbf7 FindFirstFileW 1678->1680 1681 48dc09-48dc0d 1678->1681 1679->1681 1680->1679 1682 48dbf9-48dc04 FindClose 1680->1682 1682->1681
                                      APIs
                                      • lstrlenW.KERNEL32(?,00465222), ref: 0048DBCE
                                      • GetFileAttributesW.KERNEL32(?), ref: 0048DBDD
                                      • FindFirstFileW.KERNEL32(?,?), ref: 0048DBEE
                                      • FindClose.KERNEL32(00000000), ref: 0048DBFA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: FileFind$AttributesCloseFirstlstrlen
                                      • String ID:
                                      • API String ID: 2695905019-0
                                      • Opcode ID: 67cbd6b170b83c1b90c900eb95f04bed05fe84a7b30a71f9032cb977c691b835
                                      • Instruction ID: 3685a062fef8758494a037bbf568e43e9f6b36108a2c53bd2ee10fbb7db7f5a5
                                      • Opcode Fuzzy Hash: 67cbd6b170b83c1b90c900eb95f04bed05fe84a7b30a71f9032cb977c691b835
                                      • Instruction Fuzzy Hash: 78F0A030C11910578224BB7CAC8D8AF376C9E01334B144B53F836C21E0EBB45D55869E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: BuffCharUpper
                                      • String ID: p#O
                                      • API String ID: 3964851224-4084898338
                                      • Opcode ID: 7f54b026a80956e043d7af542eb12399cfb7ca664eff6f2273443867e57ac7df
                                      • Instruction ID: 526defda413a5ff7472ce4292be32aba57077ae369c4b3f68843b155fe95f242
                                      • Opcode Fuzzy Hash: 7f54b026a80956e043d7af542eb12399cfb7ca664eff6f2273443867e57ac7df
                                      • Instruction Fuzzy Hash: AEA27AB0A08311CFC710DF15D480B6AB7E1BF89304F54896EE98A8B352D779EC45CB9A
                                      APIs
                                      • GetInputState.USER32 ref: 0042D807
                                      • timeGetTime.WINMM ref: 0042DA07
                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0042DB28
                                      • TranslateMessage.USER32(?), ref: 0042DB7B
                                      • DispatchMessageW.USER32(?), ref: 0042DB89
                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0042DB9F
                                      • Sleep.KERNEL32(0000000A), ref: 0042DBB1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                      • String ID:
                                      • API String ID: 2189390790-0
                                      • Opcode ID: d08d7261a29293d1d64e78857ca554bd342b11a159d86f42a19e199a52abde38
                                      • Instruction ID: adb313d1d5d3ec9aa075d6d57ca9faa16aacb8ae065fec5e999b532f12443ef1
                                      • Opcode Fuzzy Hash: d08d7261a29293d1d64e78857ca554bd342b11a159d86f42a19e199a52abde38
                                      • Instruction Fuzzy Hash: D342E270B04251DFD725CF25D984BAAB7A0BF45304F54862FF459873A1D7B8E884CB8A

                                      Control-flow Graph

                                      APIs
                                      • GetSysColorBrush.USER32(0000000F), ref: 00422D07
                                      • RegisterClassExW.USER32(00000030), ref: 00422D31
                                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00422D42
                                      • InitCommonControlsEx.COMCTL32(?), ref: 00422D5F
                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00422D6F
                                      • LoadIconW.USER32(000000A9), ref: 00422D85
                                      • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00422D94
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                      • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                      • API String ID: 2914291525-1005189915
                                      • Opcode ID: 4bf44ac124f782a76b09704c5e6ee578f422c4fa2562c502710a5249ba1d12fd
                                      • Instruction ID: 35220f15b2e166be6623c5724dc4cf5d47c8941d8be85d7a5fae8c010f324e15
                                      • Opcode Fuzzy Hash: 4bf44ac124f782a76b09704c5e6ee578f422c4fa2562c502710a5249ba1d12fd
                                      • Instruction Fuzzy Hash: 0D21C5B5911219EFDB00DFA4E889BEDBBB4FB08700F10822AF551A62A0D7B54554CF99

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 302 46065b-46068b call 46042f 305 4606a6-4606b2 call 455221 302->305 306 46068d-460698 call 44f2c6 302->306 311 4606b4-4606c9 call 44f2c6 call 44f2d9 305->311 312 4606cb-460714 call 46039a 305->312 313 46069a-4606a1 call 44f2d9 306->313 311->313 321 460716-46071f 312->321 322 460781-46078a GetFileType 312->322 323 46097d-460983 313->323 327 460756-46077c GetLastError call 44f2a3 321->327 328 460721-460725 321->328 324 4607d3-4607d6 322->324 325 46078c-4607bd GetLastError call 44f2a3 CloseHandle 322->325 330 4607df-4607e5 324->330 331 4607d8-4607dd 324->331 325->313 339 4607c3-4607ce call 44f2d9 325->339 327->313 328->327 332 460727-460754 call 46039a 328->332 335 4607e9-460837 call 45516a 330->335 336 4607e7 330->336 331->335 332->322 332->327 345 460847-46086b call 46014d 335->345 346 460839-460845 call 4605ab 335->346 336->335 339->313 352 46087e-4608c1 345->352 353 46086d 345->353 346->345 351 46086f-460879 call 4586ae 346->351 351->323 355 4608e2-4608f0 352->355 356 4608c3-4608c7 352->356 353->351 359 4608f6-4608fa 355->359 360 46097b 355->360 356->355 358 4608c9-4608dd 356->358 358->355 359->360 361 4608fc-46092f CloseHandle call 46039a 359->361 360->323 364 460963-460977 361->364 365 460931-46095d GetLastError call 44f2a3 call 455333 361->365 364->360 365->364
                                      APIs
                                        • Part of subcall function 0046039A: CreateFileW.KERNEL32(00000000,00000000,?,00460704,?,?,00000000,?,00460704,00000000,0000000C), ref: 004603B7
                                      • GetLastError.KERNEL32 ref: 0046076F
                                      • __dosmaperr.LIBCMT ref: 00460776
                                      • GetFileType.KERNEL32(00000000), ref: 00460782
                                      • GetLastError.KERNEL32 ref: 0046078C
                                      • __dosmaperr.LIBCMT ref: 00460795
                                      • CloseHandle.KERNEL32(00000000), ref: 004607B5
                                      • CloseHandle.KERNEL32(?), ref: 004608FF
                                      • GetLastError.KERNEL32 ref: 00460931
                                      • __dosmaperr.LIBCMT ref: 00460938
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                      • String ID: H
                                      • API String ID: 4237864984-2852464175
                                      • Opcode ID: 67756e3346c0b4b7de37a7eb737675abfe82f2ddd8513ded979f3e44233ee05b
                                      • Instruction ID: f81433de656e6ace3026ee4638723f8c1da25f919961d63cc6131f9fa1496dcd
                                      • Opcode Fuzzy Hash: 67756e3346c0b4b7de37a7eb737675abfe82f2ddd8513ded979f3e44233ee05b
                                      • Instruction Fuzzy Hash: 6BA15B32A101048FDF19EF68D8917AF3BA0EB46324F14015EF8119B3D2E7799D16CB9A

                                      Control-flow Graph

                                      APIs
                                        • Part of subcall function 00423A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,004F1418,?,00422E7F,?,?,?,00000000), ref: 00423A78
                                        • Part of subcall function 00423357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00423379
                                      • RegOpenKeyExW.KERNEL32(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 0042356A
                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0046318D
                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 004631CE
                                      • RegCloseKey.ADVAPI32(?), ref: 00463210
                                      • _wcslen.LIBCMT ref: 00463277
                                      • _wcslen.LIBCMT ref: 00463286
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                      • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                      • API String ID: 98802146-2727554177
                                      • Opcode ID: 876788b2c0549183905a68f89d879de131f96e2d8448beba404769edaf1e6435
                                      • Instruction ID: ed7ecbb2a4865e4e0eaa313f1cc5d4003cd7be7579cfea7ba49ae1ff93982f93
                                      • Opcode Fuzzy Hash: 876788b2c0549183905a68f89d879de131f96e2d8448beba404769edaf1e6435
                                      • Instruction Fuzzy Hash: 17717DB15043119EC314EF66ED819ABBBE8FF85744F80443FF94583160EB789A58CB6A

                                      Control-flow Graph

                                      APIs
                                      • GetSysColorBrush.USER32(0000000F), ref: 00422B8E
                                      • LoadCursorW.USER32(00000000,00007F00), ref: 00422B9D
                                      • LoadIconW.USER32(00000063), ref: 00422BB3
                                      • LoadIconW.USER32(000000A4), ref: 00422BC5
                                      • LoadIconW.USER32(000000A2), ref: 00422BD7
                                      • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00422BEF
                                      • RegisterClassExW.USER32(?), ref: 00422C40
                                        • Part of subcall function 00422CD4: GetSysColorBrush.USER32(0000000F), ref: 00422D07
                                        • Part of subcall function 00422CD4: RegisterClassExW.USER32(00000030), ref: 00422D31
                                        • Part of subcall function 00422CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00422D42
                                        • Part of subcall function 00422CD4: InitCommonControlsEx.COMCTL32(?), ref: 00422D5F
                                        • Part of subcall function 00422CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00422D6F
                                        • Part of subcall function 00422CD4: LoadIconW.USER32(000000A9), ref: 00422D85
                                        • Part of subcall function 00422CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00422D94
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                      • String ID: #$0$AutoIt v3
                                      • API String ID: 423443420-4155596026
                                      • Opcode ID: 68ecc2bea1061f35c844a936841f1d03641097bd74eff8e5910f759af85fbdf7
                                      • Instruction ID: 6c324d1a6f39673728b25eb3aec47784f27b695f3dddd519dae9d5073f064b73
                                      • Opcode Fuzzy Hash: 68ecc2bea1061f35c844a936841f1d03641097bd74eff8e5910f759af85fbdf7
                                      • Instruction Fuzzy Hash: 84212C70E00315EBEB109FA6ECD5AA97FB4FB48B50F00413AF901A66B0D7B50564CF98
                                      APIs
                                      • __Init_thread_footer.LIBCMT ref: 0042BB4E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Init_thread_footer
                                      • String ID: p#O$p#O$p#O$p#O$p%O$p%O$x#O$x#O
                                      • API String ID: 1385522511-1124879494
                                      • Opcode ID: d5cfcf447e88868fd6539ea76a51595baa3c2d0a1e953bda446b9396ee30a361
                                      • Instruction ID: dc640f0cab32f7d9b7b8cf98325381bc6541d1a6944a12b6b29497ed9d9c91f1
                                      • Opcode Fuzzy Hash: d5cfcf447e88868fd6539ea76a51595baa3c2d0a1e953bda446b9396ee30a361
                                      • Instruction Fuzzy Hash: 1832AB71A00219DFDB20CF64D994ABAB7B5EF44304F94805BED09AB351C77CAD82CB99

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 650 423170-423185 651 423187-42318a 650->651 652 4231e5-4231e7 650->652 654 4231eb 651->654 655 42318c-423193 651->655 652->651 653 4231e9 652->653 656 4231d0-4231d8 DefWindowProcW 653->656 657 4231f1-4231f6 654->657 658 462dfb-462e23 call 4218e2 call 43e499 654->658 659 423265-42326d PostQuitMessage 655->659 660 423199-42319e 655->660 661 4231de-4231e4 656->661 663 4231f8-4231fb 657->663 664 42321d-423244 SetTimer RegisterWindowMessageW 657->664 692 462e28-462e2f 658->692 662 423219-42321b 659->662 666 4231a4-4231a8 660->666 667 462e7c-462e90 call 48bf30 660->667 662->661 668 423201-423214 KillTimer call 4230f2 call 423c50 663->668 669 462d9c-462d9f 663->669 664->662 671 423246-423251 CreatePopupMenu 664->671 672 4231ae-4231b3 666->672 673 462e68-462e72 call 48c161 666->673 667->662 683 462e96 667->683 668->662 675 462dd7-462df6 MoveWindow 669->675 676 462da1-462da5 669->676 671->662 680 462e4d-462e54 672->680 681 4231b9-4231be 672->681 688 462e77 673->688 675->662 684 462dc6-462dd2 SetFocus 676->684 685 462da7-462daa 676->685 680->656 686 462e5a-462e63 call 480ad7 680->686 690 423253-423263 call 42326f 681->690 691 4231c4-4231ca 681->691 683->656 684->662 685->691 693 462db0-462dc1 call 4218e2 685->693 686->656 688->662 690->662 691->656 691->692 692->656 698 462e35-462e48 call 4230f2 call 423837 692->698 693->662 698->656
                                      APIs
                                      • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,0042316A,?,?), ref: 004231D8
                                      • KillTimer.USER32(?,00000001,?,?,?,?,?,0042316A,?,?), ref: 00423204
                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00423227
                                      • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,0042316A,?,?), ref: 00423232
                                      • CreatePopupMenu.USER32 ref: 00423246
                                      • PostQuitMessage.USER32(00000000), ref: 00423267
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                      • String ID: TaskbarCreated
                                      • API String ID: 129472671-2362178303
                                      • Opcode ID: e614c825c1847a68906bd66b8291799858e4ca65d24733fddaf6a45aad94fca1
                                      • Instruction ID: b5bf3577d50e712d7c1b09b3173e0d7c14adfe9df3b4e7fe4f0086a865f911fc
                                      • Opcode Fuzzy Hash: e614c825c1847a68906bd66b8291799858e4ca65d24733fddaf6a45aad94fca1
                                      • Instruction Fuzzy Hash: 10411631300224E7DB141F78AD89B7A3639E705346F84413BF941962B2DBAD9E11D7BE
                                      APIs
                                      • __Init_thread_footer.LIBCMT ref: 0042FE66
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Init_thread_footer
                                      • String ID: D%O$D%O$D%O$D%O$D%OD%O
                                      • API String ID: 1385522511-1521568649
                                      • Opcode ID: df5110ee3ea939a8c74723395cc9c5f3f8c2e4b425f61b63a75a9dc1fc8c9b10
                                      • Instruction ID: c14541a01285f0a0af77d6953b861f192b3ee70f77c8203954ce3175e6e45e57
                                      • Opcode Fuzzy Hash: df5110ee3ea939a8c74723395cc9c5f3f8c2e4b425f61b63a75a9dc1fc8c9b10
                                      • Instruction Fuzzy Hash: 90B28B74608321CFDB14CF19E480A2AB7F1BF89304FA4496EE9858B351D779EC49CB5A

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1159 422c63-422cd3 CreateWindowExW * 2 ShowWindow * 2
                                      APIs
                                      • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00422C91
                                      • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00422CB2
                                      • ShowWindow.USER32(00000000,?,?,?,?,?,?,00421CAD,?), ref: 00422CC6
                                      • ShowWindow.USER32(00000000,?,?,?,?,?,?,00421CAD,?), ref: 00422CCF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Window$CreateShow
                                      • String ID: AutoIt v3$edit
                                      • API String ID: 1584632944-3779509399
                                      • Opcode ID: fb8821accbad38180795caaa23ad60e6a77885c3aa559b4646b608266a83ec6d
                                      • Instruction ID: 763197fd68ca63fcf98364d5b4d45d239e8bae0ace312dae0b55dc10112b11a8
                                      • Opcode Fuzzy Hash: fb8821accbad38180795caaa23ad60e6a77885c3aa559b4646b608266a83ec6d
                                      • Instruction Fuzzy Hash: 64F0DA76540290BAFB311717AC88EB72EBDD7C7F60B10406AFD00A65B0C6651861DAB8

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1274 4aad64-4aad9c call 42a961 call 442340 1279 4aad9e-4aadb5 call 427510 1274->1279 1280 4aadd1-4aadd5 1274->1280 1279->1280 1289 4aadb7-4aadce call 427510 call 427620 1279->1289 1282 4aadf1-4aadf5 1280->1282 1283 4aadd7-4aadee call 427510 call 427620 1280->1283 1286 4aae3a 1282->1286 1287 4aadf7-4aae0e call 427510 1282->1287 1283->1282 1291 4aae3c-4aae40 1286->1291 1287->1291 1298 4aae10-4aae21 call 429b47 1287->1298 1289->1280 1295 4aae42-4aae50 call 42b567 1291->1295 1296 4aae53-4aaeae call 442340 call 427510 ShellExecuteExW 1291->1296 1295->1296 1311 4aaeb0-4aaeb6 call 43fe14 1296->1311 1312 4aaeb7-4aaeb9 1296->1312 1298->1286 1310 4aae23-4aae2e call 427510 1298->1310 1310->1286 1319 4aae30-4aae35 call 42a8c7 1310->1319 1311->1312 1316 4aaebb-4aaec1 call 43fe14 1312->1316 1317 4aaec2-4aaec6 1312->1317 1316->1317 1321 4aaf0a-4aaf0e 1317->1321 1322 4aaec8-4aaed6 1317->1322 1319->1286 1323 4aaf1b-4aaf33 call 42cfa0 1321->1323 1324 4aaf10-4aaf19 1321->1324 1327 4aaedb-4aaeeb 1322->1327 1328 4aaed8 1322->1328 1329 4aaf6d-4aaf7b call 42988f 1323->1329 1337 4aaf35-4aaf46 GetProcessId 1323->1337 1324->1329 1331 4aaeed 1327->1331 1332 4aaef0-4aaf08 call 42cfa0 1327->1332 1328->1327 1331->1332 1332->1329 1339 4aaf48 1337->1339 1340 4aaf4e-4aaf67 call 42cfa0 CloseHandle 1337->1340 1339->1340 1340->1329
                                      APIs
                                      • ShellExecuteExW.SHELL32(0000003C), ref: 004AAEA3
                                        • Part of subcall function 00427620: _wcslen.LIBCMT ref: 00427625
                                      • GetProcessId.KERNEL32(00000000), ref: 004AAF38
                                      • CloseHandle.KERNEL32(00000000), ref: 004AAF67
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: CloseExecuteHandleProcessShell_wcslen
                                      • String ID: <$@
                                      • API String ID: 146682121-1426351568
                                      • Opcode ID: cda32f2886786b7d3c736d6c421b0e9af791fe6149d4b0fe380684b7508a9d20
                                      • Instruction ID: c4d2b94c421189f674105ec3098de4eb9ab198444982f579ce7bdd2317a709c2
                                      • Opcode Fuzzy Hash: cda32f2886786b7d3c736d6c421b0e9af791fe6149d4b0fe380684b7508a9d20
                                      • Instruction Fuzzy Hash: 59717870A00224DFCB14DF55D484A9EBBF0BF09318F44849EE816AB392C778ED55CB99

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1617 48e97b-48e986 1618 48e988 1617->1618 1619 48e9f9-48e9fb 1617->1619 1620 48e98a-48e98c 1618->1620 1621 48e98e-48e991 1618->1621 1624 48e9f3 Sleep 1620->1624 1622 48e9f2 1621->1622 1623 48e993-48e99f QueryPerformanceCounter 1621->1623 1622->1624 1623->1622 1625 48e9a1-48e9a5 QueryPerformanceFrequency 1623->1625 1624->1619 1626 48e9ab-48e9ee Sleep QueryPerformanceCounter call 4620b0 1625->1626 1629 48e9f0 1626->1629 1629->1619
                                      APIs
                                      • QueryPerformanceCounter.KERNEL32(?), ref: 0048E997
                                      • QueryPerformanceFrequency.KERNEL32(?), ref: 0048E9A5
                                      • Sleep.KERNEL32(00000000), ref: 0048E9AD
                                      • QueryPerformanceCounter.KERNEL32(?), ref: 0048E9B7
                                      • Sleep.KERNEL32 ref: 0048E9F3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: PerformanceQuery$CounterSleep$Frequency
                                      • String ID:
                                      • API String ID: 2833360925-0
                                      • Opcode ID: 38e9b1c3a815adf0334238628422aa24672ecd963336a622d49eb4704b9d04e3
                                      • Instruction ID: e31743c856f076a3248661529ae506dbe943dafa0f09f2640884f846d3c2f599
                                      • Opcode Fuzzy Hash: 38e9b1c3a815adf0334238628422aa24672ecd963336a622d49eb4704b9d04e3
                                      • Instruction Fuzzy Hash: DB016D71C01529DBCF00AFEADD896DDBB78FF09301F000A57E942B2240CB789551CBAA

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1666 423b1c-423b27 1667 423b99-423b9b 1666->1667 1668 423b29-423b2e 1666->1668 1669 423b8c-423b8f 1667->1669 1668->1667 1670 423b30-423b48 RegOpenKeyExW 1668->1670 1670->1667 1671 423b4a-423b69 RegQueryValueExW 1670->1671 1672 423b80-423b8b RegCloseKey 1671->1672 1673 423b6b-423b76 1671->1673 1672->1669 1674 423b90-423b97 1673->1674 1675 423b78-423b7a 1673->1675 1676 423b7e 1674->1676 1675->1676 1676->1672
                                      APIs
                                      • RegOpenKeyExW.KERNEL32(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00423B0F,SwapMouseButtons,00000004,?), ref: 00423B40
                                      • RegQueryValueExW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00423B0F,SwapMouseButtons,00000004,?), ref: 00423B61
                                      • RegCloseKey.KERNEL32(00000000,?,?,?,80000001,80000001,?,00423B0F,SwapMouseButtons,00000004,?), ref: 00423B83
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: CloseOpenQueryValue
                                      • String ID: Control Panel\Mouse
                                      • API String ID: 3677997916-824357125
                                      • Opcode ID: 5b5d38998aad72c90ca6c78732cef5600b4decb922609dc9dcde06ef79677261
                                      • Instruction ID: 6b3ab801be73cd765c695abc2907f59fb6325a42a5dc6a12abfbc2c184dc41cf
                                      • Opcode Fuzzy Hash: 5b5d38998aad72c90ca6c78732cef5600b4decb922609dc9dcde06ef79677261
                                      • Instruction Fuzzy Hash: 82113CB5611218FFDB20CFA5EC84EAFBBB8EF04745B50456AF805D7211D239AF409B68

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1683 423923-423939 1684 423a13-423a17 1683->1684 1685 42393f-423954 call 426270 1683->1685 1688 463393-4633a2 LoadStringW 1685->1688 1689 42395a-423976 call 426b57 1685->1689 1691 4633ad-4633b6 1688->1691 1695 42397c-423980 1689->1695 1696 4633c9-4633e5 call 426350 call 423fcf 1689->1696 1693 423994-423a0e call 442340 call 423a18 call 444983 Shell_NotifyIconW call 42988f 1691->1693 1694 4633bc-4633c4 call 42a8c7 1691->1694 1693->1684 1694->1693 1695->1691 1700 423986-42398f call 426350 1695->1700 1696->1693 1709 4633eb-463409 call 4233c6 call 423fcf call 4233c6 1696->1709 1700->1693 1709->1693
                                      APIs
                                      • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 004633A2
                                        • Part of subcall function 00426B57: _wcslen.LIBCMT ref: 00426B6A
                                      • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00423A04
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: IconLoadNotifyShell_String_wcslen
                                      • String ID: Line:
                                      • API String ID: 2289894680-1585850449
                                      • Opcode ID: c9e064f51718426d92ae9bd7d76ca16e97c6b3180c2a856dd301995834c2ae79
                                      • Instruction ID: ebb99fba5756e28e251eae01de81f043587e8dafefcbb3b7bb7e9557796a0929
                                      • Opcode Fuzzy Hash: c9e064f51718426d92ae9bd7d76ca16e97c6b3180c2a856dd301995834c2ae79
                                      • Instruction Fuzzy Hash: 0C31F671608314AAD320EF11EC45BEB73E8AF41719F40052FF98982191DB7C9A54C7CE
                                      APIs
                                      • GetOpenFileNameW.COMDLG32(?), ref: 00462C8C
                                        • Part of subcall function 00423AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00423A97,?,?,00422E7F,?,?,?,00000000), ref: 00423AC2
                                        • Part of subcall function 00422DA5: GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 00422DC4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Name$Path$FileFullLongOpen
                                      • String ID: X$`eN
                                      • API String ID: 779396738-539521835
                                      • Opcode ID: 01d25f1c9b99239d628d7133ac3c7e6a12f0e1daa9728de27153bea7315b757e
                                      • Instruction ID: 7a2b69dac4098ad08067b854974c85a69ef48eef653f11c1f7c658cf617a1ea0
                                      • Opcode Fuzzy Hash: 01d25f1c9b99239d628d7133ac3c7e6a12f0e1daa9728de27153bea7315b757e
                                      • Instruction Fuzzy Hash: 2321C970A00268ABDB01DF95D8457EE7BF89F58315F40805BE405A7241DBFC55498B69
                                      APIs
                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00440668
                                        • Part of subcall function 004432A4: RaiseException.KERNEL32(?,?,?,0044068A,?,004F1444,?,?,?,?,?,?,0044068A,00421129,004E8738,00421129), ref: 00443304
                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00440685
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Exception@8Throw$ExceptionRaise
                                      • String ID: Unknown exception
                                      • API String ID: 3476068407-410509341
                                      • Opcode ID: f0cfc558b378d3c743068804d2579fbf06859a07130c959c36fa257da320591c
                                      • Instruction ID: 60bb333461ae0e0cdd2ce15d551837d54e6ddc591adcc0d24c7fa6f5af2bba69
                                      • Opcode Fuzzy Hash: f0cfc558b378d3c743068804d2579fbf06859a07130c959c36fa257da320591c
                                      • Instruction Fuzzy Hash: C2F0283490020C739F00BA66DC4AD9E776C6E40304B70407BB91991591EF78DA29C58C
                                      APIs
                                        • Part of subcall function 00421BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00421BF4
                                        • Part of subcall function 00421BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00421BFC
                                        • Part of subcall function 00421BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00421C07
                                        • Part of subcall function 00421BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00421C12
                                        • Part of subcall function 00421BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00421C1A
                                        • Part of subcall function 00421BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00421C22
                                        • Part of subcall function 00421B4A: RegisterWindowMessageW.USER32(00000004,?,004212C4), ref: 00421BA2
                                      • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0042136A
                                      • OleInitialize.OLE32 ref: 00421388
                                      • CloseHandle.KERNEL32(00000000,00000000), ref: 004624AB
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                      • String ID:
                                      • API String ID: 1986988660-0
                                      • Opcode ID: 916d77e15932496b16c90eded1a19aa45a5aa4b1978ba74765732fa7616c935f
                                      • Instruction ID: 8a84dad1dc15270cb9fcbb4dd439c21c439b30c590317de0cd5074949c31bdfe
                                      • Opcode Fuzzy Hash: 916d77e15932496b16c90eded1a19aa45a5aa4b1978ba74765732fa7616c935f
                                      • Instruction Fuzzy Hash: 2C71CCB4901244EFD384EF7AA9856753AE0FB98388754A23FD40AC7271EB394464CF5D
                                      APIs
                                        • Part of subcall function 00423923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00423A04
                                      • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0048C259
                                      • KillTimer.USER32(?,00000001,?,?), ref: 0048C261
                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0048C270
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: IconNotifyShell_Timer$Kill
                                      • String ID:
                                      • API String ID: 3500052701-0
                                      • Opcode ID: 0579b9287734fc1a8dde979c86dacd97a77717c8f2a00bca2131656645e392f3
                                      • Instruction ID: b1bee60faa63712f6390ba67a12ad0db35728b450ea8485f7b990b0fb52ecc76
                                      • Opcode Fuzzy Hash: 0579b9287734fc1a8dde979c86dacd97a77717c8f2a00bca2131656645e392f3
                                      • Instruction Fuzzy Hash: 1A318670904354AFEB62DF6488D5BEBBBEC9B06304F0008DED59997281C7785A85CB69
                                      APIs
                                      • CloseHandle.KERNEL32(00000000,00000000,?,?,004585CC,?,004E8CC8,0000000C), ref: 00458704
                                      • GetLastError.KERNEL32(?,004585CC,?,004E8CC8,0000000C), ref: 0045870E
                                      • __dosmaperr.LIBCMT ref: 00458739
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: CloseErrorHandleLast__dosmaperr
                                      • String ID:
                                      • API String ID: 2583163307-0
                                      • Opcode ID: 3ad145bf3de936701aa9082c8304f4da7e1706e53cacfcd223cce448d6e3f410
                                      • Instruction ID: 049833ffeafa0fcb9f178b4b3819ccae9da3cdffb0db6ed413171d291a5f6bb5
                                      • Opcode Fuzzy Hash: 3ad145bf3de936701aa9082c8304f4da7e1706e53cacfcd223cce448d6e3f410
                                      • Instruction Fuzzy Hash: 3D016B32A0522027D3606234A88577F27594F9177AF39022FFC08AB2D3DEAC8C89C19C
                                      APIs
                                      • TranslateMessage.USER32(?), ref: 0042DB7B
                                      • DispatchMessageW.USER32(?), ref: 0042DB89
                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0042DB9F
                                      • Sleep.KERNEL32(0000000A), ref: 0042DBB1
                                      • TranslateAcceleratorW.USER32(?,?,?), ref: 00471CC9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                      • String ID:
                                      • API String ID: 3288985973-0
                                      • Opcode ID: d40270a09e58fd5447db41b4b4d23f256a8ecc54e4625e617ec39de33c2e29c0
                                      • Instruction ID: a09ff0d84c230e1d6f1eedc969b3f51b0cbf7cc17afc9f92e085cb09e32d2dbd
                                      • Opcode Fuzzy Hash: d40270a09e58fd5447db41b4b4d23f256a8ecc54e4625e617ec39de33c2e29c0
                                      • Instruction Fuzzy Hash: 42F05E306043459BE730DBA59CD9FEB73A8EB48350F504A2AE65AC31D0DB38A448CB2D
                                      APIs
                                      • __Init_thread_footer.LIBCMT ref: 004317F6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Init_thread_footer
                                      • String ID: CALL
                                      • API String ID: 1385522511-4196123274
                                      • Opcode ID: 7abc06bd05b1d77c3a064e834f9c0e4102b2b60e96c8cf537e2583ffc3b69a19
                                      • Instruction ID: e2a1ae3ba6e4b039a672f5bd4368e6f36c3332667c9759c11f33068c143efe40
                                      • Opcode Fuzzy Hash: 7abc06bd05b1d77c3a064e834f9c0e4102b2b60e96c8cf537e2583ffc3b69a19
                                      • Instruction Fuzzy Hash: D922AF706083019FC714DF15C481B6ABBF2BF89318F15992EF49A8B3A1D739E845CB5A
                                      APIs
                                      • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00423908
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: IconNotifyShell_
                                      • String ID:
                                      • API String ID: 1144537725-0
                                      • Opcode ID: 207e6a825fb96d1e503ebaa428c00936bdc2dd0aa7db0d755e5c811edcea4c7f
                                      • Instruction ID: 12474fccbb12d41935d5a2894e1b7164208d6afc0d82a9e6af953114804a4e59
                                      • Opcode Fuzzy Hash: 207e6a825fb96d1e503ebaa428c00936bdc2dd0aa7db0d755e5c811edcea4c7f
                                      • Instruction Fuzzy Hash: 53317CB0604311DFE320EF65D8847A7BBF4FB49309F00092EF99987250E779AA44CB5A
                                      APIs
                                      • timeGetTime.WINMM ref: 0043F661
                                        • Part of subcall function 0042D730: GetInputState.USER32 ref: 0042D807
                                      • Sleep.KERNEL32(00000000), ref: 0047F2DE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: InputSleepStateTimetime
                                      • String ID:
                                      • API String ID: 4149333218-0
                                      • Opcode ID: 616d63ae52798493a910ce6cc7768595e2213b0c8e86a211ad85ef0a916c4d89
                                      • Instruction ID: 3561310c993220e1bbe4cb5f14e555031d2b836d838e2716e0be7c07275b4162
                                      • Opcode Fuzzy Hash: 616d63ae52798493a910ce6cc7768595e2213b0c8e86a211ad85ef0a916c4d89
                                      • Instruction Fuzzy Hash: 16F08231340615AFD310EF69E485B5AB7E4FF45764F00416AE859C7261DB74A840CF99
                                      APIs
                                      • __Init_thread_footer.LIBCMT ref: 004A5930
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Init_thread_footer
                                      • String ID:
                                      • API String ID: 1385522511-0
                                      • Opcode ID: a14c6c1770e50a48484c520eeee2844cab538e030883187b4094ed72e374a707
                                      • Instruction ID: 5faa0d11cdd686ffd5b109109b6823e2778aec86e8fb607c2a19fd679a5a762b
                                      • Opcode Fuzzy Hash: a14c6c1770e50a48484c520eeee2844cab538e030883187b4094ed72e374a707
                                      • Instruction Fuzzy Hash: 0271AB70700505AFCB10DF54C980EBAB7B5FF69314F20816EEA459B381D779AD51CB98
                                      APIs
                                      • SetWindowPos.USER32(?,000000FE,00000000,00000000,00000000,00000000,00000013,00000001,?), ref: 004B2649
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Window
                                      • String ID:
                                      • API String ID: 2353593579-0
                                      • Opcode ID: 8584345ec09d62e0f0d278c43e7e4a60571c70e25402b1639ac7f7b7c0cf624f
                                      • Instruction ID: b0f3c6ce9e7469de0eea879c6edad936a7bf4121f3f209d9381582dcb94a93e7
                                      • Opcode Fuzzy Hash: 8584345ec09d62e0f0d278c43e7e4a60571c70e25402b1639ac7f7b7c0cf624f
                                      • Instruction Fuzzy Hash: 0B213770200615AFD720DF19C9D0DB7B799EF4436CB10846EE8668B392C7B5ED41CBA4
                                      APIs
                                      • GetForegroundWindow.USER32(00000001,?), ref: 004B1420
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ForegroundWindow
                                      • String ID:
                                      • API String ID: 2020703349-0
                                      • Opcode ID: 340c8efa668fb9a4124ec221e20437fa010a737efa5ccb69508e2c958ef7b7dd
                                      • Instruction ID: ee562d2b105e3012493cdcef7931bceccfc4e24d86e98aea48d74d33fc8d42f1
                                      • Opcode Fuzzy Hash: 340c8efa668fb9a4124ec221e20437fa010a737efa5ccb69508e2c958ef7b7dd
                                      • Instruction Fuzzy Hash: A931D230204212AFD714EF2AC4D1BAAB7A1FF44328F44816EE8154B392DB79EC41CBE4
                                      APIs
                                        • Part of subcall function 00424E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00424EDD,?,004F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00424E9C
                                        • Part of subcall function 00424E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00424EAE
                                        • Part of subcall function 00424E90: FreeLibrary.KERNEL32(00000000,?,?,00424EDD,?,004F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00424EC0
                                      • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,004F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00424EFD
                                        • Part of subcall function 00424E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00463CDE,?,004F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00424E62
                                        • Part of subcall function 00424E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00424E74
                                        • Part of subcall function 00424E59: FreeLibrary.KERNEL32(00000000,?,?,00463CDE,?,004F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00424E87
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Library$Load$AddressFreeProc
                                      • String ID:
                                      • API String ID: 2632591731-0
                                      • Opcode ID: 2aa12afcb328be54b5530e87b2c7a18b0cf4bd280bafa1d82c856bfe08ab4108
                                      • Instruction ID: 9b84a24c30662f365cd33dd408504e8374b29855c4763820bf03fe5adaa76aeb
                                      • Opcode Fuzzy Hash: 2aa12afcb328be54b5530e87b2c7a18b0cf4bd280bafa1d82c856bfe08ab4108
                                      • Instruction Fuzzy Hash: 63110432700215AADF14AF62ED42BAD77A4EFC0714F50842FF542A61C1EEB89A059B58
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: __wsopen_s
                                      • String ID:
                                      • API String ID: 3347428461-0
                                      • Opcode ID: b8152c13dafe768dfdfe2112a606d5deaa3351dbfd9bdf96c0b2d355dd12f0ba
                                      • Instruction ID: 21bb920389d4d7816023636b242619c146b068f19e1e57c8d6737be66a2bbe0e
                                      • Opcode Fuzzy Hash: b8152c13dafe768dfdfe2112a606d5deaa3351dbfd9bdf96c0b2d355dd12f0ba
                                      • Instruction Fuzzy Hash: C4114C7190410AAFCB05DF58E94099F7BF5EF49304F10405AFC05AB312EA30DA15CB69
                                      APIs
                                        • Part of subcall function 00454C7D: RtlAllocateHeap.NTDLL(00000008,00421129,00000000,?,00452E29,00000001,00000364,?,?,?,0044F2DE,00453863,004F1444,?,0043FDF5,?), ref: 00454CBE
                                      • _free.LIBCMT ref: 0045506C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: AllocateHeap_free
                                      • String ID:
                                      • API String ID: 614378929-0
                                      • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                      • Instruction ID: 6d2c55e1ffb62733b54f92ed32c4f2c704b4717da04df55fdc2cdae8f93e17fc
                                      • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                      • Instruction Fuzzy Hash: E5014E722047045BE3318F55D84196AFBECFB85371F25051EE984972C1E6746809C778
                                      APIs
                                      • GetForegroundWindow.USER32(00000000,?,?,?,004B14B5,?), ref: 004B2A01
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ForegroundWindow
                                      • String ID:
                                      • API String ID: 2020703349-0
                                      • Opcode ID: 071f7a422f54799fc450cedadb89f59b81854212944252b38a5a2e66f6ee375e
                                      • Instruction ID: 13c5b79df268a9bc6e095f9040250841fc5ab53862e3442a2e3d38ff320c7877
                                      • Opcode Fuzzy Hash: 071f7a422f54799fc450cedadb89f59b81854212944252b38a5a2e66f6ee375e
                                      • Instruction Fuzzy Hash: ED01B5363006419FD324CA2DC654BA33792FB89318F29856AC04B8B351DBBAFC42C7B4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                      • Instruction ID: 7eb54891a244a59a8672307ee61ef1f771f3c2493f74bdb63c1534db633cd24b
                                      • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                      • Instruction Fuzzy Hash: 34F0F932511A1096E7313A779C05B5B339CAF62339F11071FF825922D3CF7C940A86AD
                                      APIs
                                      • GetForegroundWindow.USER32(?), ref: 004B14EB
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ForegroundWindow
                                      • String ID:
                                      • API String ID: 2020703349-0
                                      • Opcode ID: de436238c3f7c4e21e2ae6b85137c78a843b6533efeaefdb7f8c8eb38ab76cc5
                                      • Instruction ID: a38cd6dcd59c7c599debaa4121b1e2b17a19b8ae4f2db88c3899d058ea1cbebd
                                      • Opcode Fuzzy Hash: de436238c3f7c4e21e2ae6b85137c78a843b6533efeaefdb7f8c8eb38ab76cc5
                                      • Instruction Fuzzy Hash: 380147323043019FD320CF6AC490866BB94FF84328794806FE84A8B712D676DD82C7D4
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: _wcslen
                                      • String ID:
                                      • API String ID: 176396367-0
                                      • Opcode ID: d57aa977ca9da633799a4b4d943c5b5fcd567f4384338c029a49ddd99b613df9
                                      • Instruction ID: 2786061294974add557cefee91c7fe101d224770868963f8a61238707a927ef4
                                      • Opcode Fuzzy Hash: d57aa977ca9da633799a4b4d943c5b5fcd567f4384338c029a49ddd99b613df9
                                      • Instruction Fuzzy Hash: 71F028B36006006ED7109F2AD806B67BB94EF44764F50852FFA19CB2D1DB35E41487A8
                                      APIs
                                      • RtlAllocateHeap.NTDLL(00000008,00421129,00000000,?,00452E29,00000001,00000364,?,?,?,0044F2DE,00453863,004F1444,?,0043FDF5,?), ref: 00454CBE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: AllocateHeap
                                      • String ID:
                                      • API String ID: 1279760036-0
                                      • Opcode ID: 8c5906f51cc550a8c11d61f9b47de0eb495d972c08f793fe342a32877664c583
                                      • Instruction ID: 01e0f266f616c7df48b0d1c727207fce5b59ac9e85afa5056dd84d361c465c73
                                      • Opcode Fuzzy Hash: 8c5906f51cc550a8c11d61f9b47de0eb495d972c08f793fe342a32877664c583
                                      • Instruction Fuzzy Hash: 9DF0BB3150212467EB225F629C05B573748BFC176AB164127BC15AF3D2CA79D84945DC
                                      APIs
                                      • RtlAllocateHeap.NTDLL(00000000,?,004F1444,?,0043FDF5,?,?,0042A976,00000010,004F1440,004213FC,?,004213C6,?,00421129), ref: 00453852
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: AllocateHeap
                                      • String ID:
                                      • API String ID: 1279760036-0
                                      • Opcode ID: 81d6b9c060bde2a8d454c8513281df2084658f3fc800105b6d105cb20a62e4d8
                                      • Instruction ID: e5e5c1f21f83ce294fd8c9bc2a19598f1639f898f00c20c063c4cf0ad39d019e
                                      • Opcode Fuzzy Hash: 81d6b9c060bde2a8d454c8513281df2084658f3fc800105b6d105cb20a62e4d8
                                      • Instruction Fuzzy Hash: 61E0E531100224A7E6353E679C00B9B36C8AB827F7F150137BC14A36D2CB59DD0981ED
                                      APIs
                                      • FreeLibrary.KERNEL32(?,?,004F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00424F6D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: FreeLibrary
                                      • String ID:
                                      • API String ID: 3664257935-0
                                      • Opcode ID: 6ecc7cb72a94bde8e9040a400dc989bbc89a143d9fabb0d365efe36c1e540da6
                                      • Instruction ID: c2f6750c269222ee95d519c130afbaa4bfa710208d7cf3335f07bf4f2fd00b79
                                      • Opcode Fuzzy Hash: 6ecc7cb72a94bde8e9040a400dc989bbc89a143d9fabb0d365efe36c1e540da6
                                      • Instruction Fuzzy Hash: 6AF0A071205321CFDB348F24E590812B7E0FF94319352897FE1EA82610C7359844DF18
                                      APIs
                                      • IsWindow.USER32(00000000), ref: 004B2A66
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Window
                                      • String ID:
                                      • API String ID: 2353593579-0
                                      • Opcode ID: a3821bde8098dac770e1076081461c3e68d4ed5e995ffdfd7972fd40c9ddb479
                                      • Instruction ID: cc715bdcb6eb1f19317112525dcd9fbc302872f2dd741195c7cf84dee2937889
                                      • Opcode Fuzzy Hash: a3821bde8098dac770e1076081461c3e68d4ed5e995ffdfd7972fd40c9ddb479
                                      • Instruction Fuzzy Hash: C6E04F76350116AACB14EA31DC848FE7B5CEB64399710453BEC26C2110DB78999696B8
                                      APIs
                                      • GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 00422DC4
                                        • Part of subcall function 00426B57: _wcslen.LIBCMT ref: 00426B6A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: LongNamePath_wcslen
                                      • String ID:
                                      • API String ID: 541455249-0
                                      • Opcode ID: 90fd98eac836b4cef3b0cb1e6674375b1cfba816f498c1e4ea8e85211fc8cee8
                                      • Instruction ID: b60865c0752d0ff8e1092dc66ddb791e1d3d38b621f34e9633c930d60e492ba3
                                      • Opcode Fuzzy Hash: 90fd98eac836b4cef3b0cb1e6674375b1cfba816f498c1e4ea8e85211fc8cee8
                                      • Instruction Fuzzy Hash: 2BE0CD72A001345BC72092599C05FDA77DDDFC87D4F0501B6FD09D7258D964AD808555
                                      APIs
                                        • Part of subcall function 00423837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00423908
                                        • Part of subcall function 0042D730: GetInputState.USER32 ref: 0042D807
                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00422B6B
                                        • Part of subcall function 004230F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 0042314E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                      • String ID:
                                      • API String ID: 3667716007-0
                                      • Opcode ID: 09a2a50a8bc44310aede295e8e9aa009de08fc48c7cdcc25f4d7420ffea64c29
                                      • Instruction ID: a5a3a48cb93eb36db720c684fb3c559634152c7efc6a3f36f428460eae8fb2ca
                                      • Opcode Fuzzy Hash: 09a2a50a8bc44310aede295e8e9aa009de08fc48c7cdcc25f4d7420ffea64c29
                                      • Instruction Fuzzy Hash: CCE0262130022803C604BF36B85247DB7A99BD135AFC0153FF14243163CF6C4945826D
                                      APIs
                                      • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00483D18
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: MessageSendTimeout
                                      • String ID:
                                      • API String ID: 1599653421-0
                                      • Opcode ID: 5a74516ae6540a757da035aeac3f5ec2099457710552ff206156855b4a03d361
                                      • Instruction ID: 94f6bfd73cd7158b18dae2b25bdca7c94ba37538e0c4522125bdfd2efe2a0cf3
                                      • Opcode Fuzzy Hash: 5a74516ae6540a757da035aeac3f5ec2099457710552ff206156855b4a03d361
                                      • Instruction Fuzzy Hash: 1AD012E06A03087EFB0083718C4BEBB339CC316A81F004BA57E02D64C1E9A0DE080130
                                      APIs
                                      • CreateFileW.KERNEL32(00000000,00000000,?,00460704,?,?,00000000,?,00460704,00000000,0000000C), ref: 004603B7
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: CreateFile
                                      • String ID:
                                      • API String ID: 823142352-0
                                      • Opcode ID: f6f463271e7b7536f5e1c16fb945dc0a568956b7146cb3ec1f3dfe689ac15ff9
                                      • Instruction ID: 14a9d2d803c850fdd5ea7a6ccfe99b6d822b5a7779fc8e027446d0b44b2f53a0
                                      • Opcode Fuzzy Hash: f6f463271e7b7536f5e1c16fb945dc0a568956b7146cb3ec1f3dfe689ac15ff9
                                      • Instruction Fuzzy Hash: BFD06C3204010DBBDF028F84DD46EDA3BAAFB48714F014110BE1866020C732E821AB94
                                      APIs
                                      • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00421CBC
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: InfoParametersSystem
                                      • String ID:
                                      • API String ID: 3098949447-0
                                      • Opcode ID: 247002d9abeb558270ab09098577cf8524147bef5c1936e42c025f894631b273
                                      • Instruction ID: e36c16404f214b695054047973694315762920508fac619b69e177cb6a86da25
                                      • Opcode Fuzzy Hash: 247002d9abeb558270ab09098577cf8524147bef5c1936e42c025f894631b273
                                      • Instruction Fuzzy Hash: DAC09B36280315FFF2144780BD8AF207754A348B00F044011F609555F3C3E11430D658
                                      APIs
                                        • Part of subcall function 00439BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00439BB2
                                      • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 004B961A
                                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 004B965B
                                      • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 004B969F
                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 004B96C9
                                      • SendMessageW.USER32 ref: 004B96F2
                                      • GetKeyState.USER32(00000011), ref: 004B978B
                                      • GetKeyState.USER32(00000009), ref: 004B9798
                                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 004B97AE
                                      • GetKeyState.USER32(00000010), ref: 004B97B8
                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 004B97E9
                                      • SendMessageW.USER32 ref: 004B9810
                                      • SendMessageW.USER32(?,00001030,?,004B7E95), ref: 004B9918
                                      • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 004B992E
                                      • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 004B9941
                                      • SetCapture.USER32(?), ref: 004B994A
                                      • ClientToScreen.USER32(?,?), ref: 004B99AF
                                      • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 004B99BC
                                      • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 004B99D6
                                      • ReleaseCapture.USER32 ref: 004B99E1
                                      • GetCursorPos.USER32(?), ref: 004B9A19
                                      • ScreenToClient.USER32(?,?), ref: 004B9A26
                                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 004B9A80
                                      • SendMessageW.USER32 ref: 004B9AAE
                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 004B9AEB
                                      • SendMessageW.USER32 ref: 004B9B1A
                                      • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 004B9B3B
                                      • SendMessageW.USER32(?,0000110B,00000009,?), ref: 004B9B4A
                                      • GetCursorPos.USER32(?), ref: 004B9B68
                                      • ScreenToClient.USER32(?,?), ref: 004B9B75
                                      • GetParent.USER32(?), ref: 004B9B93
                                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 004B9BFA
                                      • SendMessageW.USER32 ref: 004B9C2B
                                      • ClientToScreen.USER32(?,?), ref: 004B9C84
                                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 004B9CB4
                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 004B9CDE
                                      • SendMessageW.USER32 ref: 004B9D01
                                      • ClientToScreen.USER32(?,?), ref: 004B9D4E
                                      • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 004B9D82
                                        • Part of subcall function 00439944: GetWindowLongW.USER32(?,000000EB), ref: 00439952
                                      • GetWindowLongW.USER32(?,000000F0), ref: 004B9E05
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                      • String ID: @GUI_DRAGID$F$p#O
                                      • API String ID: 3429851547-225106316
                                      • Opcode ID: a8b4352aa954ebc3517a7cbc5fbdd14cd4d87c543aeba2415046f2c7b964f3f0
                                      • Instruction ID: 5684679088ade2d5b7450ad8e6af3d68f2ca10b73936ac102b10081efdaadf42
                                      • Opcode Fuzzy Hash: a8b4352aa954ebc3517a7cbc5fbdd14cd4d87c543aeba2415046f2c7b964f3f0
                                      • Instruction Fuzzy Hash: E0428C70204251AFDB24CF24CC84EAABBE5FF49314F14462EF695872A1D775EC60CB69
                                      APIs
                                      • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 004B48F3
                                      • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 004B4908
                                      • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 004B4927
                                      • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 004B494B
                                      • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 004B495C
                                      • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 004B497B
                                      • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 004B49AE
                                      • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 004B49D4
                                      • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 004B4A0F
                                      • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 004B4A56
                                      • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 004B4A7E
                                      • IsMenu.USER32(?), ref: 004B4A97
                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 004B4AF2
                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 004B4B20
                                      • GetWindowLongW.USER32(?,000000F0), ref: 004B4B94
                                      • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 004B4BE3
                                      • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 004B4C82
                                      • wsprintfW.USER32 ref: 004B4CAE
                                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 004B4CC9
                                      • GetWindowTextW.USER32(?,00000000,00000001), ref: 004B4CF1
                                      • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 004B4D13
                                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 004B4D33
                                      • GetWindowTextW.USER32(?,00000000,00000001), ref: 004B4D5A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                      • String ID: %d/%02d/%02d
                                      • API String ID: 4054740463-328681919
                                      • Opcode ID: 48aaa096fda1c01f940837c8e9f5307f5035c806687bf58b1e319ddae7b34d2e
                                      • Instruction ID: eb27939e8bc6b04cfb0dd6557a4e0a17b062a0bc6119930195f8f16d0280390b
                                      • Opcode Fuzzy Hash: 48aaa096fda1c01f940837c8e9f5307f5035c806687bf58b1e319ddae7b34d2e
                                      • Instruction Fuzzy Hash: 5C12C271500214ABEB258F25CC89FEF7BB8EF89714F10422AF515DB292DB789941CB68
                                      APIs
                                      • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 0043F998
                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0047F474
                                      • IsIconic.USER32(00000000), ref: 0047F47D
                                      • ShowWindow.USER32(00000000,00000009), ref: 0047F48A
                                      • SetForegroundWindow.USER32(00000000), ref: 0047F494
                                      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0047F4AA
                                      • GetCurrentThreadId.KERNEL32 ref: 0047F4B1
                                      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0047F4BD
                                      • AttachThreadInput.USER32(?,00000000,00000001), ref: 0047F4CE
                                      • AttachThreadInput.USER32(?,00000000,00000001), ref: 0047F4D6
                                      • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 0047F4DE
                                      • SetForegroundWindow.USER32(00000000), ref: 0047F4E1
                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 0047F4F6
                                      • keybd_event.USER32(00000012,00000000), ref: 0047F501
                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 0047F50B
                                      • keybd_event.USER32(00000012,00000000), ref: 0047F510
                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 0047F519
                                      • keybd_event.USER32(00000012,00000000), ref: 0047F51E
                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 0047F528
                                      • keybd_event.USER32(00000012,00000000), ref: 0047F52D
                                      • SetForegroundWindow.USER32(00000000), ref: 0047F530
                                      • AttachThreadInput.USER32(?,000000FF,00000000), ref: 0047F557
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                      • String ID: Shell_TrayWnd
                                      • API String ID: 4125248594-2988720461
                                      • Opcode ID: 50c8deb3083ce9ac5e5db42ec381570f19a66cbd8d7f8892a3610311932af92e
                                      • Instruction ID: 1b935c8058fadde6814b059732ae9f1d70d7814d6da5d9ea6e865a7551a698ab
                                      • Opcode Fuzzy Hash: 50c8deb3083ce9ac5e5db42ec381570f19a66cbd8d7f8892a3610311932af92e
                                      • Instruction Fuzzy Hash: BC319671A40218BBEB206BB58C89FBF7E6CEB44B50F104536FA04E61D1C6B45D00AAA9
                                      APIs
                                        • Part of subcall function 004816C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0048170D
                                        • Part of subcall function 004816C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0048173A
                                        • Part of subcall function 004816C3: GetLastError.KERNEL32 ref: 0048174A
                                      • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00481286
                                      • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 004812A8
                                      • CloseHandle.KERNEL32(?), ref: 004812B9
                                      • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004812D1
                                      • GetProcessWindowStation.USER32 ref: 004812EA
                                      • SetProcessWindowStation.USER32(00000000), ref: 004812F4
                                      • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00481310
                                        • Part of subcall function 004810BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,004811FC), ref: 004810D4
                                        • Part of subcall function 004810BF: CloseHandle.KERNEL32(?,?,004811FC), ref: 004810E9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                      • String ID: $default$winsta0$ZN
                                      • API String ID: 22674027-1655601931
                                      • Opcode ID: 2819e1b7e417257b43f1d9f32b9b78cd52e9ebf992ba702d8977903aa44e48f1
                                      • Instruction ID: cc5d3f3bf1168f78dfce126c34dd1cf3d7c8b279785acdaaad75382131e5d500
                                      • Opcode Fuzzy Hash: 2819e1b7e417257b43f1d9f32b9b78cd52e9ebf992ba702d8977903aa44e48f1
                                      • Instruction Fuzzy Hash: E2818F71900209ABDF11AFA4DC89FEF7BBDEF04708F14452BF911A6260D7798946CB28
                                      APIs
                                        • Part of subcall function 004810F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00481114
                                        • Part of subcall function 004810F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00480B9B,?,?,?), ref: 00481120
                                        • Part of subcall function 004810F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00480B9B,?,?,?), ref: 0048112F
                                        • Part of subcall function 004810F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00480B9B,?,?,?), ref: 00481136
                                        • Part of subcall function 004810F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0048114D
                                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00480BCC
                                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00480C00
                                      • GetLengthSid.ADVAPI32(?), ref: 00480C17
                                      • GetAce.ADVAPI32(?,00000000,?), ref: 00480C51
                                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00480C6D
                                      • GetLengthSid.ADVAPI32(?), ref: 00480C84
                                      • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00480C8C
                                      • HeapAlloc.KERNEL32(00000000), ref: 00480C93
                                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00480CB4
                                      • CopySid.ADVAPI32(00000000), ref: 00480CBB
                                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00480CEA
                                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00480D0C
                                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00480D1E
                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00480D45
                                      • HeapFree.KERNEL32(00000000), ref: 00480D4C
                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00480D55
                                      • HeapFree.KERNEL32(00000000), ref: 00480D5C
                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00480D65
                                      • HeapFree.KERNEL32(00000000), ref: 00480D6C
                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00480D78
                                      • HeapFree.KERNEL32(00000000), ref: 00480D7F
                                        • Part of subcall function 00481193: GetProcessHeap.KERNEL32(00000008,00480BB1,?,00000000,?,00480BB1,?), ref: 004811A1
                                        • Part of subcall function 00481193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00480BB1,?), ref: 004811A8
                                        • Part of subcall function 00481193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00480BB1,?), ref: 004811B7
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                      • String ID:
                                      • API String ID: 4175595110-0
                                      • Opcode ID: c51dd3c9e42a706e41a79178a5e79fe22be4d74ffbea0930db608b3ee659370b
                                      • Instruction ID: 17203792f29b9d0ed98ed3ff7aabc133a70d2029bcdba146a705693d8eb5f033
                                      • Opcode Fuzzy Hash: c51dd3c9e42a706e41a79178a5e79fe22be4d74ffbea0930db608b3ee659370b
                                      • Instruction Fuzzy Hash: B7715071910209AFDF50EFE4DC84BAFBBB8BF05300F044A26E915A7251D779A905CB64
                                      APIs
                                      • OpenClipboard.USER32(004BCC08), ref: 0049EB29
                                      • IsClipboardFormatAvailable.USER32(0000000D), ref: 0049EB37
                                      • GetClipboardData.USER32(0000000D), ref: 0049EB43
                                      • CloseClipboard.USER32 ref: 0049EB4F
                                      • GlobalLock.KERNEL32(00000000), ref: 0049EB87
                                      • CloseClipboard.USER32 ref: 0049EB91
                                      • GlobalUnlock.KERNEL32(00000000), ref: 0049EBBC
                                      • IsClipboardFormatAvailable.USER32(00000001), ref: 0049EBC9
                                      • GetClipboardData.USER32(00000001), ref: 0049EBD1
                                      • GlobalLock.KERNEL32(00000000), ref: 0049EBE2
                                      • GlobalUnlock.KERNEL32(00000000), ref: 0049EC22
                                      • IsClipboardFormatAvailable.USER32(0000000F), ref: 0049EC38
                                      • GetClipboardData.USER32(0000000F), ref: 0049EC44
                                      • GlobalLock.KERNEL32(00000000), ref: 0049EC55
                                      • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 0049EC77
                                      • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0049EC94
                                      • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0049ECD2
                                      • GlobalUnlock.KERNEL32(00000000), ref: 0049ECF3
                                      • CountClipboardFormats.USER32 ref: 0049ED14
                                      • CloseClipboard.USER32 ref: 0049ED59
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                      • String ID:
                                      • API String ID: 420908878-0
                                      • Opcode ID: 6a9c5e40f871083b8f5474f7148483924cc72381cb5ed305109d3670f95784c7
                                      • Instruction ID: a8de2efe3280d612b9f83a6c9e293b08183906fd32c9004caeb80c2510d1b96b
                                      • Opcode Fuzzy Hash: 6a9c5e40f871083b8f5474f7148483924cc72381cb5ed305109d3670f95784c7
                                      • Instruction Fuzzy Hash: F161E6342043029FD700EF26D8C5F2A7BA4EF84714F54466EF456972A1DB39ED06CB6A
                                      APIs
                                      • FindFirstFileW.KERNEL32(?,?), ref: 004969BE
                                      • FindClose.KERNEL32(00000000), ref: 00496A12
                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00496A4E
                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00496A75
                                        • Part of subcall function 00429CB3: _wcslen.LIBCMT ref: 00429CBD
                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00496AB2
                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00496ADF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                      • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                      • API String ID: 3830820486-3289030164
                                      • Opcode ID: 35c5158c203b5ab7116f52c4e8f737e42c2083c822ee91fc7231b3dfee84128d
                                      • Instruction ID: 40e7b0f9ff6ec5475fbcdbfb764c9154cb815c955eff8613e28bb804ee915b29
                                      • Opcode Fuzzy Hash: 35c5158c203b5ab7116f52c4e8f737e42c2083c822ee91fc7231b3dfee84128d
                                      • Instruction Fuzzy Hash: 83D16271608310AFC714EBA1D981EAFB7ECAF88704F44492EF585C7191EB38DA48C766
                                      APIs
                                      • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00499663
                                      • GetFileAttributesW.KERNEL32(?), ref: 004996A1
                                      • SetFileAttributesW.KERNEL32(?,?), ref: 004996BB
                                      • FindNextFileW.KERNEL32(00000000,?), ref: 004996D3
                                      • FindClose.KERNEL32(00000000), ref: 004996DE
                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 004996FA
                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 0049974A
                                      • SetCurrentDirectoryW.KERNEL32(004E6B7C), ref: 00499768
                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00499772
                                      • FindClose.KERNEL32(00000000), ref: 0049977F
                                      • FindClose.KERNEL32(00000000), ref: 0049978F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                      • String ID: *.*
                                      • API String ID: 1409584000-438819550
                                      • Opcode ID: 91020a845b6386a24f66802a0afb757670e383783e6199ba6f7789983c18a6f6
                                      • Instruction ID: b1c4afe10fcafa69d35b39592302ed7fd822c07b7533a1fbe8685da73d1ab240
                                      • Opcode Fuzzy Hash: 91020a845b6386a24f66802a0afb757670e383783e6199ba6f7789983c18a6f6
                                      • Instruction Fuzzy Hash: D031A331500219ABDF14AFF9DC88ADE7BACAF49321F1441BBE805E2190DB78DD408A28
                                      APIs
                                      • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 004997BE
                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00499819
                                      • FindClose.KERNEL32(00000000), ref: 00499824
                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 00499840
                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00499890
                                      • SetCurrentDirectoryW.KERNEL32(004E6B7C), ref: 004998AE
                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 004998B8
                                      • FindClose.KERNEL32(00000000), ref: 004998C5
                                      • FindClose.KERNEL32(00000000), ref: 004998D5
                                        • Part of subcall function 0048DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 0048DB00
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                      • String ID: *.*
                                      • API String ID: 2640511053-438819550
                                      • Opcode ID: ea8739e5e0f3626b651f2bb9d3afd97b7044a7a4e08d9669c8f2bc16a43307c6
                                      • Instruction ID: a4edd11cf82e143010ec7d6617d575cf44c061f0bcc1f6fa05e1b97ad2fe7f62
                                      • Opcode Fuzzy Hash: ea8739e5e0f3626b651f2bb9d3afd97b7044a7a4e08d9669c8f2bc16a43307c6
                                      • Instruction Fuzzy Hash: 8431A2315002196FDF14EFB9DC88ADE7BACAF06324F1441BFE810A2191DB78DD458A2C
                                      APIs
                                      • GetLocalTime.KERNEL32(?), ref: 00498257
                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 00498267
                                      • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00498273
                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00498310
                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00498324
                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00498356
                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0049838C
                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00498395
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: CurrentDirectoryTime$File$Local$System
                                      • String ID: *.*
                                      • API String ID: 1464919966-438819550
                                      • Opcode ID: 4686ff24c6fd11d740ad4c33aa91f1c2ad5d89b6cfb365d0a0c3029f9b453f45
                                      • Instruction ID: c97364b5c694d34390bf5d6bf9f5a48f92af30dbadbc2ef5486051a866b618d7
                                      • Opcode Fuzzy Hash: 4686ff24c6fd11d740ad4c33aa91f1c2ad5d89b6cfb365d0a0c3029f9b453f45
                                      • Instruction Fuzzy Hash: 38618C71504305AFCB10EF65D88099FB7E8FF89318F04492EF98987251DB39E945CB9A
                                      APIs
                                        • Part of subcall function 00423AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00423A97,?,?,00422E7F,?,?,?,00000000), ref: 00423AC2
                                        • Part of subcall function 0048E199: GetFileAttributesW.KERNEL32(?,0048CF95), ref: 0048E19A
                                      • FindFirstFileW.KERNEL32(?,?), ref: 0048D122
                                      • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 0048D1DD
                                      • MoveFileW.KERNEL32(?,?), ref: 0048D1F0
                                      • DeleteFileW.KERNEL32(?,?,?,?), ref: 0048D20D
                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 0048D237
                                        • Part of subcall function 0048D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,0048D21C,?,?), ref: 0048D2B2
                                      • FindClose.KERNEL32(00000000,?,?,?), ref: 0048D253
                                      • FindClose.KERNEL32(00000000), ref: 0048D264
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                      • String ID: \*.*
                                      • API String ID: 1946585618-1173974218
                                      • Opcode ID: 6506c0068e7c0b59199fd5c60a5b9e996d1640fdd51db2776c251dce043258bb
                                      • Instruction ID: 57862828d99d99ab9e9c30d63345c16e42242e7e60ffc7946ce0386d767e1a2f
                                      • Opcode Fuzzy Hash: 6506c0068e7c0b59199fd5c60a5b9e996d1640fdd51db2776c251dce043258bb
                                      • Instruction Fuzzy Hash: C661AF31D0211DABCF05FBE1E9929EEB775AF14304F6445AAE40277191EB386F09CB68
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                      • String ID:
                                      • API String ID: 1737998785-0
                                      • Opcode ID: e926cce36b07d06bb7c0733c9400f919ac4412faec5a1b1053e87b855c1bbe96
                                      • Instruction ID: ca956cd0e22d6365560ea42d5a6c2a1974384a5f661fd1dbf502541e3db8d437
                                      • Opcode Fuzzy Hash: e926cce36b07d06bb7c0733c9400f919ac4412faec5a1b1053e87b855c1bbe96
                                      • Instruction Fuzzy Hash: 8A415F35604611AFEB10DF16D488F1ABBA5EF44318F1585AAE4158B762C739EC42CB98
                                      APIs
                                        • Part of subcall function 004816C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0048170D
                                        • Part of subcall function 004816C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0048173A
                                        • Part of subcall function 004816C3: GetLastError.KERNEL32 ref: 0048174A
                                      • ExitWindowsEx.USER32(?,00000000), ref: 0048E932
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                      • String ID: $ $@$SeShutdownPrivilege
                                      • API String ID: 2234035333-3163812486
                                      • Opcode ID: 4b42f1703ee69b4c12dda2f1afc0dd92d4aef9ec3cd60e4a43c4835be7e6cdf7
                                      • Instruction ID: ccf82a041d9c03c5c29f86bae761371e3f0cadd5c3d1e216dcd089ec2bccae8c
                                      • Opcode Fuzzy Hash: 4b42f1703ee69b4c12dda2f1afc0dd92d4aef9ec3cd60e4a43c4835be7e6cdf7
                                      • Instruction Fuzzy Hash: 680149B2610211ABEB2436B69CC6FBF725C9714754F150D23FC03E22E2D6E89C4183AC
                                      APIs
                                      • socket.WSOCK32(00000002,00000001,00000006), ref: 004A1276
                                      • WSAGetLastError.WSOCK32 ref: 004A1283
                                      • bind.WSOCK32(00000000,?,00000010), ref: 004A12BA
                                      • WSAGetLastError.WSOCK32 ref: 004A12C5
                                      • closesocket.WSOCK32(00000000), ref: 004A12F4
                                      • listen.WSOCK32(00000000,00000005), ref: 004A1303
                                      • WSAGetLastError.WSOCK32 ref: 004A130D
                                      • closesocket.WSOCK32(00000000), ref: 004A133C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ErrorLast$closesocket$bindlistensocket
                                      • String ID:
                                      • API String ID: 540024437-0
                                      • Opcode ID: 22a7f11e964a73a7a9b41e499f16e3c2eefc32624332e02710574e4cc2ca3395
                                      • Instruction ID: 761b0704b1888753327e9f9e01186d3f7bae13f83eedb8bf4b141f9fc8c9dedb
                                      • Opcode Fuzzy Hash: 22a7f11e964a73a7a9b41e499f16e3c2eefc32624332e02710574e4cc2ca3395
                                      • Instruction Fuzzy Hash: F34190316001109FDB10EF64D4C8B2ABBE5AF5A318F188199E8569F3E2C775EC81CBE5
                                      APIs
                                      • _free.LIBCMT ref: 0045B9D4
                                      • _free.LIBCMT ref: 0045B9F8
                                      • _free.LIBCMT ref: 0045BB7F
                                      • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,004C3700), ref: 0045BB91
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,004F121C,000000FF,00000000,0000003F,00000000,?,?), ref: 0045BC09
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,004F1270,000000FF,?,0000003F,00000000,?), ref: 0045BC36
                                      • _free.LIBCMT ref: 0045BD4B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                      • String ID:
                                      • API String ID: 314583886-0
                                      • Opcode ID: 4dea0adeab115050e333a19a2243bc0f5e4fc619984822d5d586f02ee5197183
                                      • Instruction ID: fd3bc892dfd00cda4627411187075c5cc068c61143c78664f5d399e840045eba
                                      • Opcode Fuzzy Hash: 4dea0adeab115050e333a19a2243bc0f5e4fc619984822d5d586f02ee5197183
                                      • Instruction Fuzzy Hash: D5C12771900204AFCB219F698841AAA7BB8EF41315F1441AFEC90E7353E7789E49C7DC
                                      APIs
                                        • Part of subcall function 00423AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00423A97,?,?,00422E7F,?,?,?,00000000), ref: 00423AC2
                                        • Part of subcall function 0048E199: GetFileAttributesW.KERNEL32(?,0048CF95), ref: 0048E19A
                                      • FindFirstFileW.KERNEL32(?,?), ref: 0048D420
                                      • DeleteFileW.KERNEL32(?,?,?,?), ref: 0048D470
                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 0048D481
                                      • FindClose.KERNEL32(00000000), ref: 0048D498
                                      • FindClose.KERNEL32(00000000), ref: 0048D4A1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                      • String ID: \*.*
                                      • API String ID: 2649000838-1173974218
                                      • Opcode ID: d0a2d464eda11bd30a1a10acbb95923b36f556025d67f67edfd9ba297ec40baa
                                      • Instruction ID: 842a3fcc92a95c0d33c9e2ad01bb4ed3f0f2d831d0d19c2851b1d0ab2694711a
                                      • Opcode Fuzzy Hash: d0a2d464eda11bd30a1a10acbb95923b36f556025d67f67edfd9ba297ec40baa
                                      • Instruction Fuzzy Hash: D531A2714093559BC304FF65D8918AF77E8BE91704F844E2EF8D153191EB38AA09CB6B
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: __floor_pentium4
                                      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                      • API String ID: 4168288129-2761157908
                                      • Opcode ID: 186d86ca9213e5044504a24e9140c10a45415f89546e2680bc23a5877b8f302d
                                      • Instruction ID: a527fa9b958239f74dd42da30a727e33f048c1eb70af6ac159f0facc7509c656
                                      • Opcode Fuzzy Hash: 186d86ca9213e5044504a24e9140c10a45415f89546e2680bc23a5877b8f302d
                                      • Instruction Fuzzy Hash: 4AC26E71D046288FDB29CE29CD407EAB7B5EB45306F1441EBD80DE7242E778AE898F45
                                      APIs
                                      • _wcslen.LIBCMT ref: 004964DC
                                      • CoInitialize.OLE32(00000000), ref: 00496639
                                      • CoCreateInstance.OLE32(004BFCF8,00000000,00000001,004BFB68,?), ref: 00496650
                                      • CoUninitialize.OLE32 ref: 004968D4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: CreateInitializeInstanceUninitialize_wcslen
                                      • String ID: .lnk
                                      • API String ID: 886957087-24824748
                                      • Opcode ID: c0b7e86d573fc7b0d52abb855a90777e7d8b11b3f3678c18f3807de26ad2fe99
                                      • Instruction ID: 400260058ac8d2254ab80d05ea8a40f146e3b29ecc6d1b6ae676fd77fec3bcfa
                                      • Opcode Fuzzy Hash: c0b7e86d573fc7b0d52abb855a90777e7d8b11b3f3678c18f3807de26ad2fe99
                                      • Instruction Fuzzy Hash: F9D17B71608211AFC704EF25D881E6BB7E8FF98308F51492EF5958B291DB34ED09CB96
                                      APIs
                                      • GetForegroundWindow.USER32(?,?,00000000), ref: 004A22E8
                                        • Part of subcall function 0049E4EC: GetWindowRect.USER32(?,?), ref: 0049E504
                                      • GetDesktopWindow.USER32 ref: 004A2312
                                      • GetWindowRect.USER32(00000000), ref: 004A2319
                                      • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 004A2355
                                      • GetCursorPos.USER32(?), ref: 004A2381
                                      • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 004A23DF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                      • String ID:
                                      • API String ID: 2387181109-0
                                      • Opcode ID: 22829b433ebc3d6aa214b517bd98d1c6c45e1e74ff1ddfb12a5fb416b8553b53
                                      • Instruction ID: c661e1bea47b5be0b69dbe1ea269f819145a1bdecbd8d52ffc0150df21c7fd1e
                                      • Opcode Fuzzy Hash: 22829b433ebc3d6aa214b517bd98d1c6c45e1e74ff1ddfb12a5fb416b8553b53
                                      • Instruction Fuzzy Hash: CE310472504315AFCB20DF29C984F5BB7A9FF95314F000A1EF98597181DB78EA09CB96
                                      APIs
                                        • Part of subcall function 00429CB3: _wcslen.LIBCMT ref: 00429CBD
                                      • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00499B78
                                      • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00499C8B
                                        • Part of subcall function 00493874: GetInputState.USER32 ref: 004938CB
                                        • Part of subcall function 00493874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00493966
                                      • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00499BA8
                                      • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00499C75
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                      • String ID: *.*
                                      • API String ID: 1972594611-438819550
                                      • Opcode ID: 23e9270fa9299981b6c036271481ea80a18ce43d52ac05261007b84f0cdd3307
                                      • Instruction ID: f591fff6f216fd2fdf254a9d1757099817a7835bcf505b3d600793c148c01445
                                      • Opcode Fuzzy Hash: 23e9270fa9299981b6c036271481ea80a18ce43d52ac05261007b84f0cdd3307
                                      • Instruction Fuzzy Hash: C241857190021A9FDF14DF69DC85AEE7BB4FF05304F24416BE805A2291DB389E44CF69
                                      APIs
                                        • Part of subcall function 00439BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00439BB2
                                      • DefDlgProcW.USER32(?,?,?,?,?), ref: 00439A4E
                                      • GetSysColor.USER32(0000000F), ref: 00439B23
                                      • SetBkColor.GDI32(?,00000000), ref: 00439B36
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Color$LongProcWindow
                                      • String ID:
                                      • API String ID: 3131106179-0
                                      • Opcode ID: 94370c07e13e023c0715fd7d489ff68089cbf127ffe7cb8cf86eb8e485e48893
                                      • Instruction ID: e9abe703cd2c8b8ee6ead937e3458fe22d514fe760cb1cea4fd12120a43b34f6
                                      • Opcode Fuzzy Hash: 94370c07e13e023c0715fd7d489ff68089cbf127ffe7cb8cf86eb8e485e48893
                                      • Instruction Fuzzy Hash: 96A13971108444FEE728BA3D8C98EBB265DDB4A354F14921BF102C67D5CAAD9D02C27E
                                      APIs
                                        • Part of subcall function 004A304E: inet_addr.WSOCK32(?), ref: 004A307A
                                        • Part of subcall function 004A304E: _wcslen.LIBCMT ref: 004A309B
                                      • socket.WSOCK32(00000002,00000002,00000011), ref: 004A185D
                                      • WSAGetLastError.WSOCK32 ref: 004A1884
                                      • bind.WSOCK32(00000000,?,00000010), ref: 004A18DB
                                      • WSAGetLastError.WSOCK32 ref: 004A18E6
                                      • closesocket.WSOCK32(00000000), ref: 004A1915
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                      • String ID:
                                      • API String ID: 1601658205-0
                                      • Opcode ID: cc9b507f0d4371c3ea37e33be321cdd89012e44a2b7537bcb9fdff0075976dee
                                      • Instruction ID: b05567849c3582974a1739e9869c0bd49236f67d6f9a97937dc05c406ffad596
                                      • Opcode Fuzzy Hash: cc9b507f0d4371c3ea37e33be321cdd89012e44a2b7537bcb9fdff0075976dee
                                      • Instruction Fuzzy Hash: D351C271A00210AFDB10AF24D8C6F2A77E5AB49718F44819DF9055F3D3C779AD41CBA5
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                      • String ID:
                                      • API String ID: 292994002-0
                                      • Opcode ID: 6e061c38db5399a5ff7d8ba74054fa8c747f773b58fc0077f4aacf7f18cfb56f
                                      • Instruction ID: ccbd7bb3f61870f20078f1ac23ce378a4b2b03c1eefdb58ef01106d7fdd2d72d
                                      • Opcode Fuzzy Hash: 6e061c38db5399a5ff7d8ba74054fa8c747f773b58fc0077f4aacf7f18cfb56f
                                      • Instruction Fuzzy Hash: BA21B6317401115FD7208F1AD894BAB7BA5AF55314F59806EE445CB361C779EC42CBA8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                      • API String ID: 0-1546025612
                                      • Opcode ID: ed9baa34a54b8c6bb659021d3a6c8d54e1c1b0121138b61551da65bf3f6d4408
                                      • Instruction ID: 9352672ba20d359abc89b513ce37d048ec0240b17f214f31d5722a7221a3bc1f
                                      • Opcode Fuzzy Hash: ed9baa34a54b8c6bb659021d3a6c8d54e1c1b0121138b61551da65bf3f6d4408
                                      • Instruction Fuzzy Hash: D1A29270E0122ACBDF24CF58D9407AEB7B1BF54310F5581ABD815A7385EB389D81CB9A
                                      APIs
                                      • lstrlenW.KERNEL32(?,?,?,00000000), ref: 004882AA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: lstrlen
                                      • String ID: ($tbN$|
                                      • API String ID: 1659193697-2988567129
                                      • Opcode ID: 386b3e2984cf48923518cab83245c60e4ea8fb42aeb86ca0ac35a9f8c446e8e3
                                      • Instruction ID: 71dc31cdf4ddeb8eaa2bc1ea3bf1f5064bc8d46e619021564ebf5fa2bcd71e9a
                                      • Opcode Fuzzy Hash: 386b3e2984cf48923518cab83245c60e4ea8fb42aeb86ca0ac35a9f8c446e8e3
                                      • Instruction Fuzzy Hash: 4D324574A00605DFCB28DF19C481A6AB7F0FF48710B55C86EE89ADB7A1EB74E941CB44
                                      APIs
                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 004AA6AC
                                      • Process32FirstW.KERNEL32(00000000,?), ref: 004AA6BA
                                        • Part of subcall function 00429CB3: _wcslen.LIBCMT ref: 00429CBD
                                      • Process32NextW.KERNEL32(00000000,?), ref: 004AA79C
                                      • CloseHandle.KERNEL32(00000000), ref: 004AA7AB
                                        • Part of subcall function 0043CE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00463303,?), ref: 0043CE8A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                      • String ID:
                                      • API String ID: 1991900642-0
                                      • Opcode ID: 2fa6f8b23bcd5b1eff0b3c72282026536f3d926670e8706f44f9e7e5a2498975
                                      • Instruction ID: e11a3f286b70694c06e9fdb6c90de69922ebdf9f3af57647a0594cffce3f0d8f
                                      • Opcode Fuzzy Hash: 2fa6f8b23bcd5b1eff0b3c72282026536f3d926670e8706f44f9e7e5a2498975
                                      • Instruction Fuzzy Hash: 5B51A071608310AFD310EF25D886E6BBBE8FF89748F40492EF98597251EB34D904CB96
                                      APIs
                                      • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 0048AAAC
                                      • SetKeyboardState.USER32(00000080), ref: 0048AAC8
                                      • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 0048AB36
                                      • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 0048AB88
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: KeyboardState$InputMessagePostSend
                                      • String ID:
                                      • API String ID: 432972143-0
                                      • Opcode ID: b3cfae6307fcabe9a1f7e67401f544064c10c38d46434cb2c958cb1f373ba0f3
                                      • Instruction ID: 2e7c55492e6fa21712eaf2e26c92fd8228f58c0e16bf5a87bef5f8a80204f0d7
                                      • Opcode Fuzzy Hash: b3cfae6307fcabe9a1f7e67401f544064c10c38d46434cb2c958cb1f373ba0f3
                                      • Instruction Fuzzy Hash: 9B312E30A40204AFFB35EA658C45BFF77A6AB44310F044A1BF281522D0D3BC9961D75B
                                      APIs
                                      • InternetReadFile.WININET(?,?,00000400,?), ref: 0049CE89
                                      • GetLastError.KERNEL32(?,00000000), ref: 0049CEEA
                                      • SetEvent.KERNEL32(?,?,00000000), ref: 0049CEFE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ErrorEventFileInternetLastRead
                                      • String ID:
                                      • API String ID: 234945975-0
                                      • Opcode ID: 0b47e7411afb331afc1466785f355af5f9bdba421e2287e0ae2dac1a53b35c25
                                      • Instruction ID: 9e9cfb6e0ce594ce4d7de7b5beeeda62638467c5b8dc2043845ffca01701e322
                                      • Opcode Fuzzy Hash: 0b47e7411afb331afc1466785f355af5f9bdba421e2287e0ae2dac1a53b35c25
                                      • Instruction Fuzzy Hash: 56218E719007059BEF20DFA6C9C8BA77BF8EB50358F10442FE64692291E778EE058B58
                                      APIs
                                      • FindFirstFileW.KERNEL32(?,?), ref: 00495CC1
                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00495D17
                                      • FindClose.KERNEL32(?), ref: 00495D5F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Find$File$CloseFirstNext
                                      • String ID:
                                      • API String ID: 3541575487-0
                                      • Opcode ID: 968a97ae205a1d0739902a772f44cf6b5d56c59bffc1258e47fabe4be8771318
                                      • Instruction ID: adab69e88dd0e859756a538add1e1418a9ab8f74ff2a804f969e773427d0fe79
                                      • Opcode Fuzzy Hash: 968a97ae205a1d0739902a772f44cf6b5d56c59bffc1258e47fabe4be8771318
                                      • Instruction Fuzzy Hash: 1D519D346046019FCB14CF28D498A9ABBE4FF49314F24866EE95A8B3A1CB34EC04CF95
                                      APIs
                                      • IsDebuggerPresent.KERNEL32 ref: 0045271A
                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00452724
                                      • UnhandledExceptionFilter.KERNEL32(?), ref: 00452731
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                      • String ID:
                                      • API String ID: 3906539128-0
                                      • Opcode ID: 9f312c5f6943d52ac5318a1854f51ce4e543a1e5dec2a1611787692947386221
                                      • Instruction ID: a4f106a7cc713a54532e8b71338c3b160974b4881df8318535504d7ca93e5082
                                      • Opcode Fuzzy Hash: 9f312c5f6943d52ac5318a1854f51ce4e543a1e5dec2a1611787692947386221
                                      • Instruction Fuzzy Hash: 9C31D67491121C9BCB21DF65DD89BDDB7B8AF08310F5042EAE80CA7261E7749F858F49
                                      APIs
                                      • SetErrorMode.KERNEL32(00000001), ref: 004951DA
                                      • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00495238
                                      • SetErrorMode.KERNEL32(00000000), ref: 004952A1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ErrorMode$DiskFreeSpace
                                      • String ID:
                                      • API String ID: 1682464887-0
                                      • Opcode ID: fb21b13412e5efdb110d8b9e40e2468938a1fbf7a9a8277822ad6ef96635b7a1
                                      • Instruction ID: d179df8f833c9aee5f2580ebb1aeb3ce04b9d71c23469b5fb45e859f0b00eadb
                                      • Opcode Fuzzy Hash: fb21b13412e5efdb110d8b9e40e2468938a1fbf7a9a8277822ad6ef96635b7a1
                                      • Instruction Fuzzy Hash: 47314F75A00518DFDB00DF55D8C4EADBBB4FF48318F5480AAE805AB392DB35E856CB94
                                      APIs
                                        • Part of subcall function 0043FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00440668
                                        • Part of subcall function 0043FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00440685
                                      • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0048170D
                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0048173A
                                      • GetLastError.KERNEL32 ref: 0048174A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                      • String ID:
                                      • API String ID: 577356006-0
                                      • Opcode ID: 01dff83c9e7066a5a387b3fe76dca56195c115abe21d9088a6dac8301e64a700
                                      • Instruction ID: f2e2abdf4e94b604e07c3717860b2abbafabbb55e002b90c2bd970d54c53b80e
                                      • Opcode Fuzzy Hash: 01dff83c9e7066a5a387b3fe76dca56195c115abe21d9088a6dac8301e64a700
                                      • Instruction Fuzzy Hash: CB11BCB2800204AFD718AF54DCCAD6BB7BDEB48714B20852FF45652291EB74BC428B68
                                      APIs
                                      • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0048D608
                                      • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 0048D645
                                      • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0048D650
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: CloseControlCreateDeviceFileHandle
                                      • String ID:
                                      • API String ID: 33631002-0
                                      • Opcode ID: 441438d3a22eb0cf81779c8f58ee583caa622fc5dc9ab6e5ec64acfab9961a4c
                                      • Instruction ID: 52146633c33fa6092dc4a88627e33a74bad808d18909d2de0b6f163bff94a9c2
                                      • Opcode Fuzzy Hash: 441438d3a22eb0cf81779c8f58ee583caa622fc5dc9ab6e5ec64acfab9961a4c
                                      • Instruction Fuzzy Hash: AE118E71E05228BFDB108F98EC84FAFBBBCEB45B50F108122F904F7290D2704A018BA5
                                      APIs
                                      • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0048168C
                                      • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 004816A1
                                      • FreeSid.ADVAPI32(?), ref: 004816B1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: AllocateCheckFreeInitializeMembershipToken
                                      • String ID:
                                      • API String ID: 3429775523-0
                                      • Opcode ID: 848a935e622a891b740f3c2dfcf4738cfae07cb05a02266ea1c28589cfed6dc4
                                      • Instruction ID: e9f1cfb6161598db11b8598fda47b92598bd090739bbd50e87ee6afb831f67f2
                                      • Opcode Fuzzy Hash: 848a935e622a891b740f3c2dfcf4738cfae07cb05a02266ea1c28589cfed6dc4
                                      • Instruction Fuzzy Hash: 9AF0F471950309FBDB00EFE49CC9EAEBBBCFB08604F504965E501E2191E774AA448B64
                                      APIs
                                      • GetCurrentProcess.KERNEL32(004528E9,?,00444CBE,004528E9,004E88B8,0000000C,00444E15,004528E9,00000002,00000000,?,004528E9), ref: 00444D09
                                      • TerminateProcess.KERNEL32(00000000,?,00444CBE,004528E9,004E88B8,0000000C,00444E15,004528E9,00000002,00000000,?,004528E9), ref: 00444D10
                                      • ExitProcess.KERNEL32 ref: 00444D22
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Process$CurrentExitTerminate
                                      • String ID:
                                      • API String ID: 1703294689-0
                                      • Opcode ID: 669a2dabecfdffc85fe31152555ac48abe64dcab85f2678090c8b13e5d54e2f6
                                      • Instruction ID: b6faeedb7122e34fbc16673e205d8488dba1216127ea3b8c737f6ce999922a09
                                      • Opcode Fuzzy Hash: 669a2dabecfdffc85fe31152555ac48abe64dcab85f2678090c8b13e5d54e2f6
                                      • Instruction Fuzzy Hash: 2EE0B671400148ABDF21AF55DD89A593BA9EB81786B504529FC059A222CB39DD42CA88
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: /
                                      • API String ID: 0-2043925204
                                      • Opcode ID: d0b232b0b82a6071e3ef967bfd95763a7b0d3c649760fa8c8cfb6dcf1c16a740
                                      • Instruction ID: e0761bf200fcf27fc41cc963fba13fd08c769bb004713d7b73ca62cd85b1ac79
                                      • Opcode Fuzzy Hash: d0b232b0b82a6071e3ef967bfd95763a7b0d3c649760fa8c8cfb6dcf1c16a740
                                      • Instruction Fuzzy Hash: F34126729003186FCB209FB9CC89DAB77B8EB84315F5042AEFD05C7282E6749D858B58
                                      APIs
                                      • GetUserNameW.ADVAPI32(?,?), ref: 0047D28C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: NameUser
                                      • String ID: X64
                                      • API String ID: 2645101109-893830106
                                      • Opcode ID: feb9dc0bdb5f60ca631a9baface5b474c70b15a8acc657e02415432705e5be31
                                      • Instruction ID: d1e6eb8ebe82f50387060de6892de1d356514be29000c31fc1e6f9901e5247fa
                                      • Opcode Fuzzy Hash: feb9dc0bdb5f60ca631a9baface5b474c70b15a8acc657e02415432705e5be31
                                      • Instruction Fuzzy Hash: CAD0C9B481111DEBCB94DB90ECC8DDDB37CBB04305F104292F506A2000DB34954A8F14
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                      • Instruction ID: 5327851f88cf0d34a4af272f82bd7a7d219ade8636144ad78ea59f3a72fbbabd
                                      • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                      • Instruction Fuzzy Hash: 40023E71E012199FEF54CFA9C8C06AEFBF1EF48314F29816AD919E7380D735A9418B84
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Variable is not of type 'Object'.$p#O
                                      • API String ID: 0-3081825068
                                      • Opcode ID: 9fb0fbc676dc4ed19033ef16dd030c05212510a2c152cd7f0649c6b81579fba1
                                      • Instruction ID: 36339e60bb485b0840227dc8bb6dea1e6f0bc25481800bec192988a91ad14e68
                                      • Opcode Fuzzy Hash: 9fb0fbc676dc4ed19033ef16dd030c05212510a2c152cd7f0649c6b81579fba1
                                      • Instruction Fuzzy Hash: E2328370A00228DBCF14DF91E981AEEB7B5FF05308F54805BE8066B391D779AD46CB59
                                      APIs
                                      • FindFirstFileW.KERNEL32(?,?), ref: 00496918
                                      • FindClose.KERNEL32(00000000), ref: 00496961
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Find$CloseFileFirst
                                      • String ID:
                                      • API String ID: 2295610775-0
                                      • Opcode ID: 687f6c939f765074e007e22ad8e1e2b3b85057f903ec3883868eb536715d9fc1
                                      • Instruction ID: 79b874a2a69289e261bb05a192a9867f2a3245e8320323b2e7f934120825a561
                                      • Opcode Fuzzy Hash: 687f6c939f765074e007e22ad8e1e2b3b85057f903ec3883868eb536715d9fc1
                                      • Instruction Fuzzy Hash: FC11B1716042109FCB10CF2AD4C4A16BBE1EF88328F05C6AEE4698F7A2C734EC05CB95
                                      APIs
                                      • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,004A4891,?,?,00000035,?), ref: 004937E4
                                      • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,004A4891,?,?,00000035,?), ref: 004937F4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ErrorFormatLastMessage
                                      • String ID:
                                      • API String ID: 3479602957-0
                                      • Opcode ID: 1706bed77546060d6934633312fa826a996ef1092f1f28e3b37d2d4aec93298a
                                      • Instruction ID: 0b5197c5c5e5666e49808a3972677f22a3acb5bc771abd229895879527842c1b
                                      • Opcode Fuzzy Hash: 1706bed77546060d6934633312fa826a996ef1092f1f28e3b37d2d4aec93298a
                                      • Instruction Fuzzy Hash: 74F0EC707042242BDB2017A65C8DFDB7A9DDFC5765F000276F505D2291D5605D04C6B5
                                      APIs
                                      • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 0048B25D
                                      • keybd_event.USER32(?,75A8C0D0,?,00000000), ref: 0048B270
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: InputSendkeybd_event
                                      • String ID:
                                      • API String ID: 3536248340-0
                                      • Opcode ID: 8e74cbc439133860321637300fdb68ef0a86255d8b326d86ee95e9cc6efffcc8
                                      • Instruction ID: 5eddd08f71f7103d560e93684ba7b81704c4cbfee7b7cd1eb18d2a0c0938337b
                                      • Opcode Fuzzy Hash: 8e74cbc439133860321637300fdb68ef0a86255d8b326d86ee95e9cc6efffcc8
                                      • Instruction Fuzzy Hash: BDF06D7080424EAFDB059FA0C845BEE7BB0FF04305F00845AF951A5191C37982019F98
                                      APIs
                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,004811FC), ref: 004810D4
                                      • CloseHandle.KERNEL32(?,?,004811FC), ref: 004810E9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: AdjustCloseHandlePrivilegesToken
                                      • String ID:
                                      • API String ID: 81990902-0
                                      • Opcode ID: 0e8d31144b082968a8ede7cea77da7c7f1a92f8c6af75b073c471c4841d7f844
                                      • Instruction ID: 8f1635d7c87f5d4f1d3d858863dd7cdfbf6e71c03922da4d9e984c26cbb6d869
                                      • Opcode Fuzzy Hash: 0e8d31144b082968a8ede7cea77da7c7f1a92f8c6af75b073c471c4841d7f844
                                      • Instruction Fuzzy Hash: C3E04F32408600AFE7252B51FC49E7777E9EB08310F10893EF4A6804B1DB626C90DB58
                                      APIs
                                      • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00456766,?,?,00000008,?,?,0045FEFE,00000000), ref: 00456998
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ExceptionRaise
                                      • String ID:
                                      • API String ID: 3997070919-0
                                      • Opcode ID: b2040a6dadfbc884bde449f3b96c88ad88d6f526af8a96f277fda0787aeb4f63
                                      • Instruction ID: 13875ac50f50971fb4d80964387538a22ef1acb386a1761f9c22d02f02d735a1
                                      • Opcode Fuzzy Hash: b2040a6dadfbc884bde449f3b96c88ad88d6f526af8a96f277fda0787aeb4f63
                                      • Instruction Fuzzy Hash: 82B16B716106089FD714CF28C486B657BE0FF05366F668659EC99CF2A2C339D98ACB44
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID: 0-3916222277
                                      • Opcode ID: 136ddc42446b0d0e4fe9e6333b759575c7ac40939f0d102e05425cbfe797ab51
                                      • Instruction ID: e13629f2de3e8ad28e52817929d1d66ba5fecfd836698a36061cdca1c6c32601
                                      • Opcode Fuzzy Hash: 136ddc42446b0d0e4fe9e6333b759575c7ac40939f0d102e05425cbfe797ab51
                                      • Instruction Fuzzy Hash: 90126F719002299BDB14CF58C8807EEB7B5FF58710F14819BE949EB251EB389E81CF99
                                      APIs
                                      • BlockInput.USER32(00000001), ref: 0049EABD
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: BlockInput
                                      • String ID:
                                      • API String ID: 3456056419-0
                                      • Opcode ID: 2b2985b874c58d03154a52aab5462680f01fe5e579452610d14f2f423086f12d
                                      • Instruction ID: 1c24079f4e451d6f867cf5770eb1fe88430c2656028e6d080f6a1987f03045f2
                                      • Opcode Fuzzy Hash: 2b2985b874c58d03154a52aab5462680f01fe5e579452610d14f2f423086f12d
                                      • Instruction Fuzzy Hash: B1E012312002149FD710DF5AD444E5ABBD9AF58764F04842BFC45C7361D674A8418B95
                                      APIs
                                      • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,004403EE), ref: 004409DA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ExceptionFilterUnhandled
                                      • String ID:
                                      • API String ID: 3192549508-0
                                      • Opcode ID: 671fdd2081abd1e0239d4519d06feb7dfeb0bdbc8f84be04f4e9f3172aaede69
                                      • Instruction ID: 7f445876195f0e9900efb1818c3d8bb43cbc712fa3ca0ae5048facd3ef73d00c
                                      • Opcode Fuzzy Hash: 671fdd2081abd1e0239d4519d06feb7dfeb0bdbc8f84be04f4e9f3172aaede69
                                      • Instruction Fuzzy Hash:
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 0
                                      • API String ID: 0-4108050209
                                      • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                      • Instruction ID: fb704057eb77942453e2058cc1f6984d7ba17fa6452db19682603765c2ad3267
                                      • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                      • Instruction Fuzzy Hash: 1C5157B160CA455BFB38A669889E7BF67899B12344F18090FD882D7382C71DDE07D35E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 0&O
                                      • API String ID: 0-4271367079
                                      • Opcode ID: 0b70af550e80e76b87cfb9924983c56c36a30c41895f2f3aae9106c721af074e
                                      • Instruction ID: 94ea1bbee25d9305de017ce3fa0df0cc6d94b659e5314927de18737e59679204
                                      • Opcode Fuzzy Hash: 0b70af550e80e76b87cfb9924983c56c36a30c41895f2f3aae9106c721af074e
                                      • Instruction Fuzzy Hash: 3D21D5322206118BDB28CF79C92367E77E5A754320F14863EE4A7C33D0DE79A904CB94
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: aa0d7fc89741605b898211abcaddea1940808ad8bc12874aee965ee089f9f0ad
                                      • Instruction ID: a2eaf490058975377401805a7ccc709c3ae91a87e51ebbf99ddbcf9b38d6f8f1
                                      • Opcode Fuzzy Hash: aa0d7fc89741605b898211abcaddea1940808ad8bc12874aee965ee089f9f0ad
                                      • Instruction Fuzzy Hash: 61322321D29F014DD7639634D922336A649AFB73C6F15C737EC1AB5EA6EF68C4834104
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5e0db585a8de55ddeef10de0778fd26b3014aec03de8c7f405821d383924d6fd
                                      • Instruction ID: 37f1d866d00d8ac35f3d38d142787613637f3b157ca026616ef9cc17e8e7d4fd
                                      • Opcode Fuzzy Hash: 5e0db585a8de55ddeef10de0778fd26b3014aec03de8c7f405821d383924d6fd
                                      • Instruction Fuzzy Hash: 6632E231A001458BDF28CE29C4D46FE77A1AB49305F28D56FD84EAB391D63CDD82DB49
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 852279360bba66e9a98a1089353b45b66c36c259d9f46ec58d7cd39b34a9a0c6
                                      • Instruction ID: 47bed548cb7e4ae24e56902eae3d7c8c27b391c48c5affb679663ec10e61dfde
                                      • Opcode Fuzzy Hash: 852279360bba66e9a98a1089353b45b66c36c259d9f46ec58d7cd39b34a9a0c6
                                      • Instruction Fuzzy Hash: 9722F370A00619DFDF14CF65D881AAEB7F1FF44304F50412AE812A7391EB39AD55CB5A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 35bc65a315b8ee274b0e3a7d3ac16b4fd2ac9e4d34968dde9b5c272513a763bc
                                      • Instruction ID: c8cba8efb9624fa2fff1a3672b08394bd2d1668e8ab4d243572b15e581d5def9
                                      • Opcode Fuzzy Hash: 35bc65a315b8ee274b0e3a7d3ac16b4fd2ac9e4d34968dde9b5c272513a763bc
                                      • Instruction Fuzzy Hash: F602D7B0E00215EBDB04DF55D881AAEB7F1FF44304F50816AE8069B391F739AE25CB99
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                      • Instruction ID: 8d9784f3b6ce13ceb10b824f4bb96b1214125c8e1069b207d8a54b151cb90113
                                      • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                      • Instruction Fuzzy Hash: E69188B26080E349FB294639857403FFFE15A523A131A079FD4F2CB2E1FE289995D624
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                      • Instruction ID: f5bffa161788b60d25944ff201e67ed38a22c53ec3fe7cc11e355d4db0434cb9
                                      • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                      • Instruction Fuzzy Hash: 4C9167722090E34AFB2D467A857403FFFE19A923A1319079FD4F2CA2E1FD28D595D624
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6df9c3003184db72d6bccbb4cd88fc373fa3a6f271a9638be847987f526703ef
                                      • Instruction ID: 4c972441179cb02064eac8bf28701be7c3eff607524fd8728329176319dab3af
                                      • Opcode Fuzzy Hash: 6df9c3003184db72d6bccbb4cd88fc373fa3a6f271a9638be847987f526703ef
                                      • Instruction Fuzzy Hash: 8A61577120878956FA349A288C95BBF7394DF41748F10091FE982EB382DB1DAE43C35E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 82380d06e7219d8f0af736cb421c6ddad22af978305380b561ef26ecde1b9312
                                      • Instruction ID: 054ef052d87c8077423707af40bc88d721c8dc2104427c83e411e89d14b5a9a6
                                      • Opcode Fuzzy Hash: 82380d06e7219d8f0af736cb421c6ddad22af978305380b561ef26ecde1b9312
                                      • Instruction Fuzzy Hash: 1A619FB1A1874566FE345A285895BBF2384DF41748F200A5FE943DB381D71E9D43825E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                      • Instruction ID: 0a038017cfb9468c7ea5115b0e029d50610cb4a7fb4b944722cd5ecc32d84351
                                      • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                      • Instruction Fuzzy Hash: F38186726080E349FB6D423A857443FFFE15A923A131A079FD4F2CB2E1EE28C594D624
                                      APIs
                                      • DeleteObject.GDI32(00000000), ref: 004A2B30
                                      • DeleteObject.GDI32(00000000), ref: 004A2B43
                                      • DestroyWindow.USER32 ref: 004A2B52
                                      • GetDesktopWindow.USER32 ref: 004A2B6D
                                      • GetWindowRect.USER32(00000000), ref: 004A2B74
                                      • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 004A2CA3
                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004A2CB1
                                      • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004A2CF8
                                      • GetClientRect.USER32(00000000,?), ref: 004A2D04
                                      • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 004A2D40
                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004A2D62
                                      • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004A2D75
                                      • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004A2D80
                                      • GlobalLock.KERNEL32(00000000), ref: 004A2D89
                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004A2D98
                                      • GlobalUnlock.KERNEL32(00000000), ref: 004A2DA1
                                      • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004A2DA8
                                      • GlobalFree.KERNEL32(00000000), ref: 004A2DB3
                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004A2DC5
                                      • OleLoadPicture.OLEAUT32(?,00000000,00000000,004BFC38,00000000), ref: 004A2DDB
                                      • GlobalFree.KERNEL32(00000000), ref: 004A2DEB
                                      • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 004A2E11
                                      • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 004A2E30
                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004A2E52
                                      • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004A303F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                      • String ID: $AutoIt v3$DISPLAY$static
                                      • API String ID: 2211948467-2373415609
                                      • Opcode ID: f964bed5771760a4822a32404fae83f128c71b663f265e1686db502728d2a3fb
                                      • Instruction ID: a20c5d8d1aa4a72111b06a3d47fe432d18ceee52643494ea2bcaffbe409abdab
                                      • Opcode Fuzzy Hash: f964bed5771760a4822a32404fae83f128c71b663f265e1686db502728d2a3fb
                                      • Instruction Fuzzy Hash: 0D027E71A00215EFDB14DF68CD89EAE7BB9EF49314F008159F915AB2A1C774ED01CB68
                                      APIs
                                      • SetTextColor.GDI32(?,00000000), ref: 004B712F
                                      • GetSysColorBrush.USER32(0000000F), ref: 004B7160
                                      • GetSysColor.USER32(0000000F), ref: 004B716C
                                      • SetBkColor.GDI32(?,000000FF), ref: 004B7186
                                      • SelectObject.GDI32(?,?), ref: 004B7195
                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 004B71C0
                                      • GetSysColor.USER32(00000010), ref: 004B71C8
                                      • CreateSolidBrush.GDI32(00000000), ref: 004B71CF
                                      • FrameRect.USER32(?,?,00000000), ref: 004B71DE
                                      • DeleteObject.GDI32(00000000), ref: 004B71E5
                                      • InflateRect.USER32(?,000000FE,000000FE), ref: 004B7230
                                      • FillRect.USER32(?,?,?), ref: 004B7262
                                      • GetWindowLongW.USER32(?,000000F0), ref: 004B7284
                                        • Part of subcall function 004B73E8: GetSysColor.USER32(00000012), ref: 004B7421
                                        • Part of subcall function 004B73E8: SetTextColor.GDI32(?,?), ref: 004B7425
                                        • Part of subcall function 004B73E8: GetSysColorBrush.USER32(0000000F), ref: 004B743B
                                        • Part of subcall function 004B73E8: GetSysColor.USER32(0000000F), ref: 004B7446
                                        • Part of subcall function 004B73E8: GetSysColor.USER32(00000011), ref: 004B7463
                                        • Part of subcall function 004B73E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 004B7471
                                        • Part of subcall function 004B73E8: SelectObject.GDI32(?,00000000), ref: 004B7482
                                        • Part of subcall function 004B73E8: SetBkColor.GDI32(?,00000000), ref: 004B748B
                                        • Part of subcall function 004B73E8: SelectObject.GDI32(?,?), ref: 004B7498
                                        • Part of subcall function 004B73E8: InflateRect.USER32(?,000000FF,000000FF), ref: 004B74B7
                                        • Part of subcall function 004B73E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004B74CE
                                        • Part of subcall function 004B73E8: GetWindowLongW.USER32(00000000,000000F0), ref: 004B74DB
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                      • String ID:
                                      • API String ID: 4124339563-0
                                      • Opcode ID: 8e935a2a9121a09be0d50e018f12277e24f8ea5a255b9e8042afa69c1f00e0b6
                                      • Instruction ID: 6572af3b34d631ae0e149745b2048eedf46d3d0955675ad82e320e9b57e59f2d
                                      • Opcode Fuzzy Hash: 8e935a2a9121a09be0d50e018f12277e24f8ea5a255b9e8042afa69c1f00e0b6
                                      • Instruction Fuzzy Hash: C5A19472008311BFDB109F64DC88E9B7BA9FB89320F100B29F9A2961E1D775E945CF65
                                      APIs
                                      • DestroyWindow.USER32(?,?), ref: 00438E14
                                      • SendMessageW.USER32(?,00001308,?,00000000), ref: 00476AC5
                                      • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00476AFE
                                      • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00476F43
                                        • Part of subcall function 00438F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00438BE8,?,00000000,?,?,?,?,00438BBA,00000000,?), ref: 00438FC5
                                      • SendMessageW.USER32(?,00001053), ref: 00476F7F
                                      • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00476F96
                                      • ImageList_Destroy.COMCTL32(00000000,?), ref: 00476FAC
                                      • ImageList_Destroy.COMCTL32(00000000,?), ref: 00476FB7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                      • String ID: 0
                                      • API String ID: 2760611726-4108050209
                                      • Opcode ID: 5559a6a989fbf58bcc5fffd11d8de397489d6d9c7ec559a60781c25e965196c7
                                      • Instruction ID: 0dd34ef2ed4898154d5e6559c851f38f0f81e7ede99757ad7a732ae17919eeac
                                      • Opcode Fuzzy Hash: 5559a6a989fbf58bcc5fffd11d8de397489d6d9c7ec559a60781c25e965196c7
                                      • Instruction Fuzzy Hash: B2129D30200611EFD725CF24C885BA6BBA6FB49300F15856EF499CB261CB79EC52CF99
                                      APIs
                                      • DestroyWindow.USER32(00000000), ref: 004A273E
                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004A286A
                                      • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 004A28A9
                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 004A28B9
                                      • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 004A2900
                                      • GetClientRect.USER32(00000000,?), ref: 004A290C
                                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 004A2955
                                      • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004A2964
                                      • GetStockObject.GDI32(00000011), ref: 004A2974
                                      • SelectObject.GDI32(00000000,00000000), ref: 004A2978
                                      • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 004A2988
                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004A2991
                                      • DeleteDC.GDI32(00000000), ref: 004A299A
                                      • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004A29C6
                                      • SendMessageW.USER32(00000030,00000000,00000001), ref: 004A29DD
                                      • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 004A2A1D
                                      • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 004A2A31
                                      • SendMessageW.USER32(00000404,00000001,00000000), ref: 004A2A42
                                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 004A2A77
                                      • GetStockObject.GDI32(00000011), ref: 004A2A82
                                      • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 004A2A8D
                                      • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 004A2A97
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                      • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                      • API String ID: 2910397461-517079104
                                      • Opcode ID: 9c877ed2803b8ab4bcd894f7ad746940caf10ee5baf78ff2ed19a3a6046aa8b2
                                      • Instruction ID: cc7c96300ee0e110f9e669c036b8d3399ec37e8836578476c03bdc9ca9d07eb2
                                      • Opcode Fuzzy Hash: 9c877ed2803b8ab4bcd894f7ad746940caf10ee5baf78ff2ed19a3a6046aa8b2
                                      • Instruction Fuzzy Hash: 78B17E71A00215BFEB14DF69DD85FAE7BA9EB09714F004219F914EB2A0D774ED40CBA8
                                      APIs
                                      • SetErrorMode.KERNEL32(00000001), ref: 00494AED
                                      • GetDriveTypeW.KERNEL32(?,004BCB68,?,\\.\,004BCC08), ref: 00494BCA
                                      • SetErrorMode.KERNEL32(00000000,004BCB68,?,\\.\,004BCC08), ref: 00494D36
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ErrorMode$DriveType
                                      • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                      • API String ID: 2907320926-4222207086
                                      • Opcode ID: 3157a48c3087ebee995a384e884895019d06f61f867d447d5732bab8e17790ba
                                      • Instruction ID: 3be0772c88ae4cbd4fa5c33c0aee895f9575c92559e2a08e1ed82f488f966154
                                      • Opcode Fuzzy Hash: 3157a48c3087ebee995a384e884895019d06f61f867d447d5732bab8e17790ba
                                      • Instruction Fuzzy Hash: C661EE307411059FCF04DF26C981E697BA0AB94385F62817BE806AB691CB3DED439B5E
                                      APIs
                                      • GetSysColor.USER32(00000012), ref: 004B7421
                                      • SetTextColor.GDI32(?,?), ref: 004B7425
                                      • GetSysColorBrush.USER32(0000000F), ref: 004B743B
                                      • GetSysColor.USER32(0000000F), ref: 004B7446
                                      • CreateSolidBrush.GDI32(?), ref: 004B744B
                                      • GetSysColor.USER32(00000011), ref: 004B7463
                                      • CreatePen.GDI32(00000000,00000001,00743C00), ref: 004B7471
                                      • SelectObject.GDI32(?,00000000), ref: 004B7482
                                      • SetBkColor.GDI32(?,00000000), ref: 004B748B
                                      • SelectObject.GDI32(?,?), ref: 004B7498
                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 004B74B7
                                      • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004B74CE
                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 004B74DB
                                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 004B752A
                                      • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 004B7554
                                      • InflateRect.USER32(?,000000FD,000000FD), ref: 004B7572
                                      • DrawFocusRect.USER32(?,?), ref: 004B757D
                                      • GetSysColor.USER32(00000011), ref: 004B758E
                                      • SetTextColor.GDI32(?,00000000), ref: 004B7596
                                      • DrawTextW.USER32(?,004B70F5,000000FF,?,00000000), ref: 004B75A8
                                      • SelectObject.GDI32(?,?), ref: 004B75BF
                                      • DeleteObject.GDI32(?), ref: 004B75CA
                                      • SelectObject.GDI32(?,?), ref: 004B75D0
                                      • DeleteObject.GDI32(?), ref: 004B75D5
                                      • SetTextColor.GDI32(?,?), ref: 004B75DB
                                      • SetBkColor.GDI32(?,?), ref: 004B75E5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                      • String ID:
                                      • API String ID: 1996641542-0
                                      • Opcode ID: e640b067200f50d304f189392ebb764b956cb1d3d029e7e65ec604f5bed51c94
                                      • Instruction ID: 74fc0b6bdd237aa981051aebf6f5dc048ee0a6bcd570852a7972c740bf6a41c4
                                      • Opcode Fuzzy Hash: e640b067200f50d304f189392ebb764b956cb1d3d029e7e65ec604f5bed51c94
                                      • Instruction Fuzzy Hash: 81613F72904218BFDF119FA8DC89EEE7B79EB48320F114225F915BB2A1D67499408FA4
                                      APIs
                                      • GetCursorPos.USER32(?), ref: 004B1128
                                      • GetDesktopWindow.USER32 ref: 004B113D
                                      • GetWindowRect.USER32(00000000), ref: 004B1144
                                      • GetWindowLongW.USER32(?,000000F0), ref: 004B1199
                                      • DestroyWindow.USER32(?), ref: 004B11B9
                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 004B11ED
                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 004B120B
                                      • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 004B121D
                                      • SendMessageW.USER32(00000000,00000421,?,?), ref: 004B1232
                                      • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 004B1245
                                      • IsWindowVisible.USER32(00000000), ref: 004B12A1
                                      • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 004B12BC
                                      • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 004B12D0
                                      • GetWindowRect.USER32(00000000,?), ref: 004B12E8
                                      • MonitorFromPoint.USER32(?,?,00000002), ref: 004B130E
                                      • GetMonitorInfoW.USER32(00000000,?), ref: 004B1328
                                      • CopyRect.USER32(?,?), ref: 004B133F
                                      • SendMessageW.USER32(00000000,00000412,00000000), ref: 004B13AA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                      • String ID: ($0$tooltips_class32
                                      • API String ID: 698492251-4156429822
                                      • Opcode ID: 1a05c03aa6f20ce9618bea750fa702b84789e0ed0a6a168a07bf3f9fd4e57989
                                      • Instruction ID: a4e98fad8e35237037006e809abbd69dd6e6bc9080eea6c320b77a6a6f299022
                                      • Opcode Fuzzy Hash: 1a05c03aa6f20ce9618bea750fa702b84789e0ed0a6a168a07bf3f9fd4e57989
                                      • Instruction Fuzzy Hash: 6EB1BE71604351AFD704DF65C884BABBBE4FF88344F40891EF9999B2A1D734E844CBA9
                                      APIs
                                      • CharUpperBuffW.USER32(?,?), ref: 004B02E5
                                      • _wcslen.LIBCMT ref: 004B031F
                                      • _wcslen.LIBCMT ref: 004B0389
                                      • _wcslen.LIBCMT ref: 004B03F1
                                      • _wcslen.LIBCMT ref: 004B0475
                                      • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 004B04C5
                                      • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 004B0504
                                        • Part of subcall function 0043F9F2: _wcslen.LIBCMT ref: 0043F9FD
                                        • Part of subcall function 0048223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00482258
                                        • Part of subcall function 0048223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 0048228A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: _wcslen$MessageSend$BuffCharUpper
                                      • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                      • API String ID: 1103490817-719923060
                                      • Opcode ID: 547f275b8f30601c4c653307d3e1be0b70c6dbd6b898898cf9d860ce4021a9d4
                                      • Instruction ID: 2800f07b0096daf442d2749d5fe708be822923b90cc2dd12262c3b079a751b43
                                      • Opcode Fuzzy Hash: 547f275b8f30601c4c653307d3e1be0b70c6dbd6b898898cf9d860ce4021a9d4
                                      • Instruction Fuzzy Hash: E8E1C0312083009FC714DF25C55096BB3E5BF98319F14495EF8969B3A1DB38ED46CBAA
                                      APIs
                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00438968
                                      • GetSystemMetrics.USER32(00000007), ref: 00438970
                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0043899B
                                      • GetSystemMetrics.USER32(00000008), ref: 004389A3
                                      • GetSystemMetrics.USER32(00000004), ref: 004389C8
                                      • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 004389E5
                                      • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 004389F5
                                      • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00438A28
                                      • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00438A3C
                                      • GetClientRect.USER32(00000000,000000FF), ref: 00438A5A
                                      • GetStockObject.GDI32(00000011), ref: 00438A76
                                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 00438A81
                                        • Part of subcall function 0043912D: GetCursorPos.USER32(?), ref: 00439141
                                        • Part of subcall function 0043912D: ScreenToClient.USER32(00000000,?), ref: 0043915E
                                        • Part of subcall function 0043912D: GetAsyncKeyState.USER32(00000001), ref: 00439183
                                        • Part of subcall function 0043912D: GetAsyncKeyState.USER32(00000002), ref: 0043919D
                                      • SetTimer.USER32(00000000,00000000,00000028,004390FC), ref: 00438AA8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                      • String ID: AutoIt v3 GUI
                                      • API String ID: 1458621304-248962490
                                      • Opcode ID: 2124167d0611b609b000f1a093b626eb4eef81bacb17c3bcdb27a95a3798bad7
                                      • Instruction ID: f65a77e88e7cd0eb0baa52998076cacd152eeeee719a6aba037b04c01f268344
                                      • Opcode Fuzzy Hash: 2124167d0611b609b000f1a093b626eb4eef81bacb17c3bcdb27a95a3798bad7
                                      • Instruction Fuzzy Hash: CBB16F71A00209EFDB14DF68CD85BEE7BB5FB48314F11422AFA15A7290DB78A841CF59
                                      APIs
                                        • Part of subcall function 004810F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00481114
                                        • Part of subcall function 004810F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00480B9B,?,?,?), ref: 00481120
                                        • Part of subcall function 004810F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00480B9B,?,?,?), ref: 0048112F
                                        • Part of subcall function 004810F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00480B9B,?,?,?), ref: 00481136
                                        • Part of subcall function 004810F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0048114D
                                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00480DF5
                                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00480E29
                                      • GetLengthSid.ADVAPI32(?), ref: 00480E40
                                      • GetAce.ADVAPI32(?,00000000,?), ref: 00480E7A
                                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00480E96
                                      • GetLengthSid.ADVAPI32(?), ref: 00480EAD
                                      • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00480EB5
                                      • HeapAlloc.KERNEL32(00000000), ref: 00480EBC
                                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00480EDD
                                      • CopySid.ADVAPI32(00000000), ref: 00480EE4
                                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00480F13
                                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00480F35
                                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00480F47
                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00480F6E
                                      • HeapFree.KERNEL32(00000000), ref: 00480F75
                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00480F7E
                                      • HeapFree.KERNEL32(00000000), ref: 00480F85
                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00480F8E
                                      • HeapFree.KERNEL32(00000000), ref: 00480F95
                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00480FA1
                                      • HeapFree.KERNEL32(00000000), ref: 00480FA8
                                        • Part of subcall function 00481193: GetProcessHeap.KERNEL32(00000008,00480BB1,?,00000000,?,00480BB1,?), ref: 004811A1
                                        • Part of subcall function 00481193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00480BB1,?), ref: 004811A8
                                        • Part of subcall function 00481193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00480BB1,?), ref: 004811B7
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                      • String ID:
                                      • API String ID: 4175595110-0
                                      • Opcode ID: 26beebd4249f8551ee0fc1b02bb5b5d333688bc19d5dc53ef0711207723c4f29
                                      • Instruction ID: 7314773a99481a03dfdb21cb5c818cb302a3d089bb1d577add0d7a1b4033c568
                                      • Opcode Fuzzy Hash: 26beebd4249f8551ee0fc1b02bb5b5d333688bc19d5dc53ef0711207723c4f29
                                      • Instruction Fuzzy Hash: 5E715171900209ABDF60AFA5DC84FAFBBB8BF05340F048626FA15F6251D775D909CB64
                                      APIs
                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004AC4BD
                                      • RegCreateKeyExW.ADVAPI32(?,?,00000000,004BCC08,00000000,?,00000000,?,?), ref: 004AC544
                                      • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 004AC5A4
                                      • _wcslen.LIBCMT ref: 004AC5F4
                                      • _wcslen.LIBCMT ref: 004AC66F
                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 004AC6B2
                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 004AC7C1
                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 004AC84D
                                      • RegCloseKey.ADVAPI32(?), ref: 004AC881
                                      • RegCloseKey.ADVAPI32(00000000), ref: 004AC88E
                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 004AC960
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                      • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                      • API String ID: 9721498-966354055
                                      • Opcode ID: 2769eb8a7be3ad174e4dc77909d21a83cc289099b1fc5098ff13f7e65f7f98f0
                                      • Instruction ID: 145602c1169b6b95f9560ed763782a1d9f08b9e7409ca1cc86a2cb883f20e4eb
                                      • Opcode Fuzzy Hash: 2769eb8a7be3ad174e4dc77909d21a83cc289099b1fc5098ff13f7e65f7f98f0
                                      • Instruction Fuzzy Hash: 4B128D357042119FD714DF15D881A2AB7E5FF89718F04885EF84A9B3A2DB39EC41CB89
                                      APIs
                                      • CharUpperBuffW.USER32(?,?), ref: 004B09C6
                                      • _wcslen.LIBCMT ref: 004B0A01
                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 004B0A54
                                      • _wcslen.LIBCMT ref: 004B0A8A
                                      • _wcslen.LIBCMT ref: 004B0B06
                                      • _wcslen.LIBCMT ref: 004B0B81
                                        • Part of subcall function 0043F9F2: _wcslen.LIBCMT ref: 0043F9FD
                                        • Part of subcall function 00482BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00482BFA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: _wcslen$MessageSend$BuffCharUpper
                                      • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                      • API String ID: 1103490817-4258414348
                                      • Opcode ID: 8c5d8bc9aea3c7264ae555fd1ea3519b6f35e35de375f58cccb0d941b35c8f28
                                      • Instruction ID: 709934c014fb4e8b8141040f935ad54a4165f599a843acaca959e652f834624b
                                      • Opcode Fuzzy Hash: 8c5d8bc9aea3c7264ae555fd1ea3519b6f35e35de375f58cccb0d941b35c8f28
                                      • Instruction Fuzzy Hash: 99E1DD312083018FC714EF26C45096BB7E1BF98359F50895EF8969B3A2D738ED46CB99
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: _wcslen$BuffCharUpper
                                      • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                      • API String ID: 1256254125-909552448
                                      • Opcode ID: 2ca861f143503a62c298000f60ce7fe07ef78215e0ee48f3b29ee0255ebbd4fc
                                      • Instruction ID: f18ad4826281752303e58b2062f8f9ffd8030a4ae2a09a03ff2f7546b682009a
                                      • Opcode Fuzzy Hash: 2ca861f143503a62c298000f60ce7fe07ef78215e0ee48f3b29ee0255ebbd4fc
                                      • Instruction Fuzzy Hash: 5471173260016A8BCB50DE79D8C16BB3391AFB6764F11412BF8569B384E63DDD45C3AC
                                      APIs
                                      • _wcslen.LIBCMT ref: 004B835A
                                      • _wcslen.LIBCMT ref: 004B836E
                                      • _wcslen.LIBCMT ref: 004B8391
                                      • _wcslen.LIBCMT ref: 004B83B4
                                      • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 004B83F2
                                      • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,004B5BF2), ref: 004B844E
                                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 004B8487
                                      • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 004B84CA
                                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 004B8501
                                      • FreeLibrary.KERNEL32(?), ref: 004B850D
                                      • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 004B851D
                                      • DestroyIcon.USER32(?,?,?,?,?,004B5BF2), ref: 004B852C
                                      • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 004B8549
                                      • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 004B8555
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                      • String ID: .dll$.exe$.icl
                                      • API String ID: 799131459-1154884017
                                      • Opcode ID: f94cb71c4561b8c6923c6fefcbc501b4b8d4fdb3e413577fc832a8f856eb4163
                                      • Instruction ID: 956b5ed954cf3824248715d6e7e067febd0a6c6cd0de1c1fbb94d304292439e1
                                      • Opcode Fuzzy Hash: f94cb71c4561b8c6923c6fefcbc501b4b8d4fdb3e413577fc832a8f856eb4163
                                      • Instruction Fuzzy Hash: B861CF71500215BAEB249F65CC81BFF77ACBB04721F10461AF815E61D1EF78A981DBA8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                      • API String ID: 0-1645009161
                                      • Opcode ID: 108aef505b88aaf6eb04a613e0a2ede0bed63822ca23178567fc3494ef055a70
                                      • Instruction ID: c2f803d8f3adfb8565e28567489a8e4b90af71f628b535c857780b886b66bdbc
                                      • Opcode Fuzzy Hash: 108aef505b88aaf6eb04a613e0a2ede0bed63822ca23178567fc3494ef055a70
                                      • Instruction Fuzzy Hash: AC81F771B04215ABDB10AF62EC42FAF3764AF55304F54402BF904AA292EB7CD905C7AE
                                      APIs
                                      • LoadIconW.USER32(00000063), ref: 00485A2E
                                      • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00485A40
                                      • SetWindowTextW.USER32(?,?), ref: 00485A57
                                      • GetDlgItem.USER32(?,000003EA), ref: 00485A6C
                                      • SetWindowTextW.USER32(00000000,?), ref: 00485A72
                                      • GetDlgItem.USER32(?,000003E9), ref: 00485A82
                                      • SetWindowTextW.USER32(00000000,?), ref: 00485A88
                                      • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00485AA9
                                      • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00485AC3
                                      • GetWindowRect.USER32(?,?), ref: 00485ACC
                                      • _wcslen.LIBCMT ref: 00485B33
                                      • SetWindowTextW.USER32(?,?), ref: 00485B6F
                                      • GetDesktopWindow.USER32 ref: 00485B75
                                      • GetWindowRect.USER32(00000000), ref: 00485B7C
                                      • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00485BD3
                                      • GetClientRect.USER32(?,?), ref: 00485BE0
                                      • PostMessageW.USER32(?,00000005,00000000,?), ref: 00485C05
                                      • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00485C2F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                      • String ID:
                                      • API String ID: 895679908-0
                                      • Opcode ID: c4e428d20e91a7d7c8614166c35f20455bc3e75333c82f486c038fc78b5aefa1
                                      • Instruction ID: 34d14aec29990b82ac82f2047ebb9579a4331ef16674c094e716e09d4ea77adf
                                      • Opcode Fuzzy Hash: c4e428d20e91a7d7c8614166c35f20455bc3e75333c82f486c038fc78b5aefa1
                                      • Instruction Fuzzy Hash: EA716031900B05AFDB20EFA9CD85E6EBBF5FF48704F104A29E542A26A0D775F944CB58
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: _wcslen
                                      • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT$[N
                                      • API String ID: 176396367-1901738985
                                      • Opcode ID: 5f9d8d1514f9208ef6df96a0677cd2796ef760310de45da988d3ab8ac8a93857
                                      • Instruction ID: 51bd0744859d7a1a182a7fbcc4a60f40ca96274954b3fb8e6b0c79d91fa18c35
                                      • Opcode Fuzzy Hash: 5f9d8d1514f9208ef6df96a0677cd2796ef760310de45da988d3ab8ac8a93857
                                      • Instruction Fuzzy Hash: E5E11631A00516ABCB14FF79C4417EEBBB0BF44F15F54892BE856B7240DB38AE858798
                                      APIs
                                      • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 004400C6
                                        • Part of subcall function 004400ED: InitializeCriticalSectionAndSpinCount.KERNEL32(004F070C,00000FA0,906C95A5,?,?,?,?,004623B3,000000FF), ref: 0044011C
                                        • Part of subcall function 004400ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,004623B3,000000FF), ref: 00440127
                                        • Part of subcall function 004400ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,004623B3,000000FF), ref: 00440138
                                        • Part of subcall function 004400ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 0044014E
                                        • Part of subcall function 004400ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 0044015C
                                        • Part of subcall function 004400ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 0044016A
                                        • Part of subcall function 004400ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00440195
                                        • Part of subcall function 004400ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 004401A0
                                      • ___scrt_fastfail.LIBCMT ref: 004400E7
                                        • Part of subcall function 004400A3: __onexit.LIBCMT ref: 004400A9
                                      Strings
                                      • WakeAllConditionVariable, xrefs: 00440162
                                      • InitializeConditionVariable, xrefs: 00440148
                                      • kernel32.dll, xrefs: 00440133
                                      • SleepConditionVariableCS, xrefs: 00440154
                                      • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00440122
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                      • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                      • API String ID: 66158676-1714406822
                                      • Opcode ID: 411940ad8ffcd6f9f0839da535e99d69f72334cd12abd0fbfaeb3ed687c8bd4a
                                      • Instruction ID: 20e953e0ae749f2c24914de50ee6759394fe2179b4abbe8f900eb611ee766be0
                                      • Opcode Fuzzy Hash: 411940ad8ffcd6f9f0839da535e99d69f72334cd12abd0fbfaeb3ed687c8bd4a
                                      • Instruction Fuzzy Hash: 15210B32A447106BF7106BA5ACC6B6A33D8DF44B51F10023BFA05A2392DB7D9C108EAC
                                      APIs
                                      • CharLowerBuffW.USER32(00000000,00000000,004BCC08), ref: 00494527
                                      • _wcslen.LIBCMT ref: 0049453B
                                      • _wcslen.LIBCMT ref: 00494599
                                      • _wcslen.LIBCMT ref: 004945F4
                                      • _wcslen.LIBCMT ref: 0049463F
                                      • _wcslen.LIBCMT ref: 004946A7
                                        • Part of subcall function 0043F9F2: _wcslen.LIBCMT ref: 0043F9FD
                                      • GetDriveTypeW.KERNEL32(?,004E6BF0,00000061), ref: 00494743
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: _wcslen$BuffCharDriveLowerType
                                      • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                      • API String ID: 2055661098-1000479233
                                      • Opcode ID: aa120f5b614749acfc4c2f358837fc400f9dfae7901d86de43aec262550e020e
                                      • Instruction ID: e3a8e17fc955702dbd9411d7688f22329fba12ac50284da01779da595b274790
                                      • Opcode Fuzzy Hash: aa120f5b614749acfc4c2f358837fc400f9dfae7901d86de43aec262550e020e
                                      • Instruction Fuzzy Hash: 22B10F716083129FCB10DF29C890E6BBBE4AFE5764F50492EF09687291D738DC46CA5A
                                      APIs
                                        • Part of subcall function 00439BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00439BB2
                                      • DragQueryPoint.SHELL32(?,?), ref: 004B9147
                                        • Part of subcall function 004B7674: ClientToScreen.USER32(?,?), ref: 004B769A
                                        • Part of subcall function 004B7674: GetWindowRect.USER32(?,?), ref: 004B7710
                                        • Part of subcall function 004B7674: PtInRect.USER32(?,?,004B8B89), ref: 004B7720
                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 004B91B0
                                      • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 004B91BB
                                      • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 004B91DE
                                      • SendMessageW.USER32(?,000000C2,00000001,?), ref: 004B9225
                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 004B923E
                                      • SendMessageW.USER32(?,000000B1,?,?), ref: 004B9255
                                      • SendMessageW.USER32(?,000000B1,?,?), ref: 004B9277
                                      • DragFinish.SHELL32(?), ref: 004B927E
                                      • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 004B9371
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                      • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$p#O
                                      • API String ID: 221274066-2519363676
                                      • Opcode ID: 3c9bb93583626c7788eac1752686872bbea048307fd7731c17e28dab18c07c84
                                      • Instruction ID: 40fa824bdef83bda593f1870300ed7f5299a95d450a06643056b6eb5c672b39f
                                      • Opcode Fuzzy Hash: 3c9bb93583626c7788eac1752686872bbea048307fd7731c17e28dab18c07c84
                                      • Instruction Fuzzy Hash: D3618D71108301AFC701DF61DC85DAFBBE8EF99354F400A2EF591931A0DB749A49CB6A
                                      APIs
                                      • _wcslen.LIBCMT ref: 004AB198
                                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 004AB1B0
                                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 004AB1D4
                                      • _wcslen.LIBCMT ref: 004AB200
                                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 004AB214
                                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 004AB236
                                      • _wcslen.LIBCMT ref: 004AB332
                                        • Part of subcall function 004905A7: GetStdHandle.KERNEL32(000000F6), ref: 004905C6
                                      • _wcslen.LIBCMT ref: 004AB34B
                                      • _wcslen.LIBCMT ref: 004AB366
                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 004AB3B6
                                      • GetLastError.KERNEL32(00000000), ref: 004AB407
                                      • CloseHandle.KERNEL32(?), ref: 004AB439
                                      • CloseHandle.KERNEL32(00000000), ref: 004AB44A
                                      • CloseHandle.KERNEL32(00000000), ref: 004AB45C
                                      • CloseHandle.KERNEL32(00000000), ref: 004AB46E
                                      • CloseHandle.KERNEL32(?), ref: 004AB4E3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                      • String ID:
                                      • API String ID: 2178637699-0
                                      • Opcode ID: 37e214262b3545aa406cc1d542fa540a273d6c7e3aa13b3b9dce14ec21cb9335
                                      • Instruction ID: bc5367185fceef5c8ef636e2b4de92bcb22e564d2897603047f0702f10e09708
                                      • Opcode Fuzzy Hash: 37e214262b3545aa406cc1d542fa540a273d6c7e3aa13b3b9dce14ec21cb9335
                                      • Instruction Fuzzy Hash: 63F19D316082409FC714EF25C881B6FBBE1EF85318F14855EF8959B2A2CB39DC45CB9A
                                      APIs
                                      • GetMenuItemCount.USER32(004F1990), ref: 00462F8D
                                      • GetMenuItemCount.USER32(004F1990), ref: 0046303D
                                      • GetCursorPos.USER32(?), ref: 00463081
                                      • SetForegroundWindow.USER32(00000000), ref: 0046308A
                                      • TrackPopupMenuEx.USER32(004F1990,00000000,?,00000000,00000000,00000000), ref: 0046309D
                                      • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 004630A9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                      • String ID: 0
                                      • API String ID: 36266755-4108050209
                                      • Opcode ID: 05bf1da2d6ff4d0dc5cedf94c126955a6848c3dfceddaf93c8dab00476e2cfe0
                                      • Instruction ID: 3fcee39a24a7f0b58746034d41d19c11c5f0d9e72640ed5bd6fb21ba01f7634b
                                      • Opcode Fuzzy Hash: 05bf1da2d6ff4d0dc5cedf94c126955a6848c3dfceddaf93c8dab00476e2cfe0
                                      • Instruction Fuzzy Hash: 63711630640615BEEB258F24DD89FAABF79FF04324F204217F514662E0D7B9A910D79A
                                      APIs
                                      • DestroyWindow.USER32(00000000,?), ref: 004B6DEB
                                        • Part of subcall function 00426B57: _wcslen.LIBCMT ref: 00426B6A
                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 004B6E5F
                                      • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 004B6E81
                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 004B6E94
                                      • DestroyWindow.USER32(?), ref: 004B6EB5
                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00420000,00000000), ref: 004B6EE4
                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 004B6EFD
                                      • GetDesktopWindow.USER32 ref: 004B6F16
                                      • GetWindowRect.USER32(00000000), ref: 004B6F1D
                                      • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 004B6F35
                                      • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 004B6F4D
                                        • Part of subcall function 00439944: GetWindowLongW.USER32(?,000000EB), ref: 00439952
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                      • String ID: 0$tooltips_class32
                                      • API String ID: 2429346358-3619404913
                                      • Opcode ID: bf822c73ce773335369f27f74de272e43447f6f26297bcb0fe420d8f7ca8ff16
                                      • Instruction ID: 1745299b20319ee704297ed08a37dc6f4cfe56a2e4e763e6e7b55432a7504135
                                      • Opcode Fuzzy Hash: bf822c73ce773335369f27f74de272e43447f6f26297bcb0fe420d8f7ca8ff16
                                      • Instruction Fuzzy Hash: 88716871504244AFDB21CF18D884FBBBBE9EB99304F55052EF98987261C778E906CB29
                                      APIs
                                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0049C4B0
                                      • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0049C4C3
                                      • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0049C4D7
                                      • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0049C4F0
                                      • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0049C533
                                      • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0049C549
                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0049C554
                                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0049C584
                                      • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0049C5DC
                                      • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0049C5F0
                                      • InternetCloseHandle.WININET(00000000), ref: 0049C5FB
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                      • String ID:
                                      • API String ID: 3800310941-3916222277
                                      • Opcode ID: cccc4fe145fc9771d6abc857b0ec65ad1571c89cb7992b8e045591e13f1d361e
                                      • Instruction ID: a94ecf2dbe28d82360b962dfd6a64660a03ee993e6d95651826114a3a9af484b
                                      • Opcode Fuzzy Hash: cccc4fe145fc9771d6abc857b0ec65ad1571c89cb7992b8e045591e13f1d361e
                                      • Instruction Fuzzy Hash: 93514BB1500209BFEF219F61C9C8AAB7FFCFF08754F00452AF94596250DB38E9449BA9
                                      APIs
                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 004B8592
                                      • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 004B85A2
                                      • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 004B85AD
                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 004B85BA
                                      • GlobalLock.KERNEL32(00000000), ref: 004B85C8
                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 004B85D7
                                      • GlobalUnlock.KERNEL32(00000000), ref: 004B85E0
                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 004B85E7
                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 004B85F8
                                      • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,004BFC38,?), ref: 004B8611
                                      • GlobalFree.KERNEL32(00000000), ref: 004B8621
                                      • GetObjectW.GDI32(?,00000018,?), ref: 004B8641
                                      • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 004B8671
                                      • DeleteObject.GDI32(?), ref: 004B8699
                                      • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004B86AF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                      • String ID:
                                      • API String ID: 3840717409-0
                                      • Opcode ID: b0b46fdb2ff911a009ad9530e88b7d9ce4ccf1cfa3256e2d06f3a9f65dcd3653
                                      • Instruction ID: 1f42d503213cc3cda3856e3fe0efc81056e5de9c30a99e05184b91920fda64f7
                                      • Opcode Fuzzy Hash: b0b46fdb2ff911a009ad9530e88b7d9ce4ccf1cfa3256e2d06f3a9f65dcd3653
                                      • Instruction Fuzzy Hash: 0A410875600209BFDB119FA5CC88EAB7BBCEB89711F104569F909E7260DB349901CB68
                                      APIs
                                      • VariantInit.OLEAUT32(00000000), ref: 00491502
                                      • VariantCopy.OLEAUT32(?,?), ref: 0049150B
                                      • VariantClear.OLEAUT32(?), ref: 00491517
                                      • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 004915FB
                                      • VarR8FromDec.OLEAUT32(?,?), ref: 00491657
                                      • VariantInit.OLEAUT32(?), ref: 00491708
                                      • SysFreeString.OLEAUT32(?), ref: 0049178C
                                      • VariantClear.OLEAUT32(?), ref: 004917D8
                                      • VariantClear.OLEAUT32(?), ref: 004917E7
                                      • VariantInit.OLEAUT32(00000000), ref: 00491823
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                      • String ID: %4d%02d%02d%02d%02d%02d$Default
                                      • API String ID: 1234038744-3931177956
                                      • Opcode ID: 7fdcaa8238163a86f00a981a1da8417a331f577a202406e681c4760838fb044a
                                      • Instruction ID: 90110bf50ce5707283f2dd0c01043c8b72eff1871b730d4d3f450bcdd3243774
                                      • Opcode Fuzzy Hash: 7fdcaa8238163a86f00a981a1da8417a331f577a202406e681c4760838fb044a
                                      • Instruction Fuzzy Hash: 81D10471A00116EBDF009F66D884B7DBBB1BF44710F56806BF4469B2A0DB38DC46DB6A
                                      APIs
                                        • Part of subcall function 00429CB3: _wcslen.LIBCMT ref: 00429CBD
                                        • Part of subcall function 004AC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,004AB6AE,?,?), ref: 004AC9B5
                                        • Part of subcall function 004AC998: _wcslen.LIBCMT ref: 004AC9F1
                                        • Part of subcall function 004AC998: _wcslen.LIBCMT ref: 004ACA68
                                        • Part of subcall function 004AC998: _wcslen.LIBCMT ref: 004ACA9E
                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004AB6F4
                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004AB772
                                      • RegDeleteValueW.ADVAPI32(?,?), ref: 004AB80A
                                      • RegCloseKey.ADVAPI32(?), ref: 004AB87E
                                      • RegCloseKey.ADVAPI32(?), ref: 004AB89C
                                      • LoadLibraryA.KERNEL32(advapi32.dll), ref: 004AB8F2
                                      • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 004AB904
                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 004AB922
                                      • FreeLibrary.KERNEL32(00000000), ref: 004AB983
                                      • RegCloseKey.ADVAPI32(00000000), ref: 004AB994
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                      • String ID: RegDeleteKeyExW$advapi32.dll
                                      • API String ID: 146587525-4033151799
                                      • Opcode ID: 03e6031b3abe0d3f58af369c1a1b203e8070058a3c3bdefc51d2594aa54cf99f
                                      • Instruction ID: b9cc7c2162b91778004ee0e1d176901b088042cd126e03e01bec389453ce354f
                                      • Opcode Fuzzy Hash: 03e6031b3abe0d3f58af369c1a1b203e8070058a3c3bdefc51d2594aa54cf99f
                                      • Instruction Fuzzy Hash: 36C19A74208201AFC710DF15C494B2ABBE5FF95308F54855EE49A8B3A2CB79EC46CBD6
                                      APIs
                                      • GetDC.USER32(00000000), ref: 004A25D8
                                      • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 004A25E8
                                      • CreateCompatibleDC.GDI32(?), ref: 004A25F4
                                      • SelectObject.GDI32(00000000,?), ref: 004A2601
                                      • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 004A266D
                                      • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 004A26AC
                                      • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 004A26D0
                                      • SelectObject.GDI32(?,?), ref: 004A26D8
                                      • DeleteObject.GDI32(?), ref: 004A26E1
                                      • DeleteDC.GDI32(?), ref: 004A26E8
                                      • ReleaseDC.USER32(00000000,?), ref: 004A26F3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                      • String ID: (
                                      • API String ID: 2598888154-3887548279
                                      • Opcode ID: 473acdee743de0dafac55b381bb3955c0dbd436035f1d5b95bb577f2e5ab6edf
                                      • Instruction ID: 5850538e5a5dd0f0e8605cd476da68c21e88af08afc53b25e449b48e2e9e387c
                                      • Opcode Fuzzy Hash: 473acdee743de0dafac55b381bb3955c0dbd436035f1d5b95bb577f2e5ab6edf
                                      • Instruction Fuzzy Hash: D761F275D00219EFCF04CFA8D984EAEBBB5FF48310F20852AE955A7250D774A941DFA4
                                      APIs
                                      • ___free_lconv_mon.LIBCMT ref: 0045DAA1
                                        • Part of subcall function 0045D63C: _free.LIBCMT ref: 0045D659
                                        • Part of subcall function 0045D63C: _free.LIBCMT ref: 0045D66B
                                        • Part of subcall function 0045D63C: _free.LIBCMT ref: 0045D67D
                                        • Part of subcall function 0045D63C: _free.LIBCMT ref: 0045D68F
                                        • Part of subcall function 0045D63C: _free.LIBCMT ref: 0045D6A1
                                        • Part of subcall function 0045D63C: _free.LIBCMT ref: 0045D6B3
                                        • Part of subcall function 0045D63C: _free.LIBCMT ref: 0045D6C5
                                        • Part of subcall function 0045D63C: _free.LIBCMT ref: 0045D6D7
                                        • Part of subcall function 0045D63C: _free.LIBCMT ref: 0045D6E9
                                        • Part of subcall function 0045D63C: _free.LIBCMT ref: 0045D6FB
                                        • Part of subcall function 0045D63C: _free.LIBCMT ref: 0045D70D
                                        • Part of subcall function 0045D63C: _free.LIBCMT ref: 0045D71F
                                        • Part of subcall function 0045D63C: _free.LIBCMT ref: 0045D731
                                      • _free.LIBCMT ref: 0045DA96
                                        • Part of subcall function 004529C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0045D7D1,00000000,00000000,00000000,00000000,?,0045D7F8,00000000,00000007,00000000,?,0045DBF5,00000000), ref: 004529DE
                                        • Part of subcall function 004529C8: GetLastError.KERNEL32(00000000,?,0045D7D1,00000000,00000000,00000000,00000000,?,0045D7F8,00000000,00000007,00000000,?,0045DBF5,00000000,00000000), ref: 004529F0
                                      • _free.LIBCMT ref: 0045DAB8
                                      • _free.LIBCMT ref: 0045DACD
                                      • _free.LIBCMT ref: 0045DAD8
                                      • _free.LIBCMT ref: 0045DAFA
                                      • _free.LIBCMT ref: 0045DB0D
                                      • _free.LIBCMT ref: 0045DB1B
                                      • _free.LIBCMT ref: 0045DB26
                                      • _free.LIBCMT ref: 0045DB5E
                                      • _free.LIBCMT ref: 0045DB65
                                      • _free.LIBCMT ref: 0045DB82
                                      • _free.LIBCMT ref: 0045DB9A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                      • String ID:
                                      • API String ID: 161543041-0
                                      • Opcode ID: b28f461fdd11ef3fee1936afcffcd966e508a5346beacfa43602d52e34a9d4e3
                                      • Instruction ID: 53ec7a0022f0938dbd41c3634ddb95293483a63b4bdbe943a5fb573791d91ed3
                                      • Opcode Fuzzy Hash: b28f461fdd11ef3fee1936afcffcd966e508a5346beacfa43602d52e34a9d4e3
                                      • Instruction Fuzzy Hash: FB314DB1A042049FDB31AA36D945B9777E9FF01316F11442BE849E7293DA79AC48C728
                                      APIs
                                      • GetClassNameW.USER32(?,?,00000100), ref: 0048369C
                                      • _wcslen.LIBCMT ref: 004836A7
                                      • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00483797
                                      • GetClassNameW.USER32(?,?,00000400), ref: 0048380C
                                      • GetDlgCtrlID.USER32(?), ref: 0048385D
                                      • GetWindowRect.USER32(?,?), ref: 00483882
                                      • GetParent.USER32(?), ref: 004838A0
                                      • ScreenToClient.USER32(00000000), ref: 004838A7
                                      • GetClassNameW.USER32(?,?,00000100), ref: 00483921
                                      • GetWindowTextW.USER32(?,?,00000400), ref: 0048395D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                      • String ID: %s%u
                                      • API String ID: 4010501982-679674701
                                      • Opcode ID: f0e3beafe023b78b3a0857e64bef80f659d0e6c7c7e2fa4e348a655ea3b6ba07
                                      • Instruction ID: 33094ff49ef600fbfbb14a3a21e878f5e01830b54b9106d5b6b44f0221d3343c
                                      • Opcode Fuzzy Hash: f0e3beafe023b78b3a0857e64bef80f659d0e6c7c7e2fa4e348a655ea3b6ba07
                                      • Instruction Fuzzy Hash: 5091D471204606AFD714EF24C884FAFF7A8FF44705F008A2AF999D2250DB38EA45CB95
                                      APIs
                                      • GetClassNameW.USER32(?,?,00000400), ref: 00484994
                                      • GetWindowTextW.USER32(?,?,00000400), ref: 004849DA
                                      • _wcslen.LIBCMT ref: 004849EB
                                      • CharUpperBuffW.USER32(?,00000000), ref: 004849F7
                                      • _wcsstr.LIBVCRUNTIME ref: 00484A2C
                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 00484A64
                                      • GetWindowTextW.USER32(?,?,00000400), ref: 00484A9D
                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 00484AE6
                                      • GetClassNameW.USER32(?,?,00000400), ref: 00484B20
                                      • GetWindowRect.USER32(?,?), ref: 00484B8B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                      • String ID: ThumbnailClass
                                      • API String ID: 1311036022-1241985126
                                      • Opcode ID: 3d4721df6c0b71a70bdda5b84269c52b21c1dceed51bd4512a1178de8ab81c7d
                                      • Instruction ID: 1d0dda2efd574100e938ee76ee5254b9d0b0cefac96e166f4d76d946ccbd6c89
                                      • Opcode Fuzzy Hash: 3d4721df6c0b71a70bdda5b84269c52b21c1dceed51bd4512a1178de8ab81c7d
                                      • Instruction Fuzzy Hash: B791BC711042069BDB04EF15C981FAF77A8FF84314F04886BFD859A296DB38ED45CBA9
                                      APIs
                                        • Part of subcall function 00439BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00439BB2
                                      • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 004B8D5A
                                      • GetFocus.USER32 ref: 004B8D6A
                                      • GetDlgCtrlID.USER32(00000000), ref: 004B8D75
                                      • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 004B8E1D
                                      • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 004B8ECF
                                      • GetMenuItemCount.USER32(?), ref: 004B8EEC
                                      • GetMenuItemID.USER32(?,00000000), ref: 004B8EFC
                                      • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 004B8F2E
                                      • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 004B8F70
                                      • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 004B8FA1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                      • String ID: 0
                                      • API String ID: 1026556194-4108050209
                                      • Opcode ID: 1ce019bb2ee7a343b135a55de4c556cea925a9dc5ff692d7f5c8ddd96e6140c9
                                      • Instruction ID: c84954fc4cbd1f57973e8b0a4a183cdc4c3aed03af693174087998497e1d3c7c
                                      • Opcode Fuzzy Hash: 1ce019bb2ee7a343b135a55de4c556cea925a9dc5ff692d7f5c8ddd96e6140c9
                                      • Instruction Fuzzy Hash: 14817E71504311ABDB10CF24C884AABB7EDFB88354F140A2EF985D7291DB78D901CB79
                                      APIs
                                      • GetFileVersionInfoSizeW.VERSION(?,?), ref: 0048DC20
                                      • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 0048DC46
                                      • _wcslen.LIBCMT ref: 0048DC50
                                      • _wcsstr.LIBVCRUNTIME ref: 0048DCA0
                                      • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 0048DCBC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                                      • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                      • API String ID: 1939486746-1459072770
                                      • Opcode ID: 37b4aefb29bb4be7699c518c752f4ec71c193dddfea77e3cc60916a752c63cbb
                                      • Instruction ID: 34a65b05baed336b206b3cca7cca5211770db721fc957b63000022d568f16c90
                                      • Opcode Fuzzy Hash: 37b4aefb29bb4be7699c518c752f4ec71c193dddfea77e3cc60916a752c63cbb
                                      • Instruction Fuzzy Hash: B0410232D402017AEB10B676DC83EBF77ACEF55754F10046FF900A6182EA6C990197AD
                                      APIs
                                      • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 004ACC64
                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 004ACC8D
                                      • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 004ACD48
                                        • Part of subcall function 004ACC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 004ACCAA
                                        • Part of subcall function 004ACC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 004ACCBD
                                        • Part of subcall function 004ACC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 004ACCCF
                                        • Part of subcall function 004ACC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 004ACD05
                                        • Part of subcall function 004ACC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 004ACD28
                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 004ACCF3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                      • String ID: RegDeleteKeyExW$advapi32.dll
                                      • API String ID: 2734957052-4033151799
                                      • Opcode ID: 9b23677c214e412feb25a264182ed8cce91d3de151bcfd7bdeda67dd5f19d897
                                      • Instruction ID: e59dbf787c30ed4c3ff64007a701e30d030501990c91df5b8ba6f8432c9d14b6
                                      • Opcode Fuzzy Hash: 9b23677c214e412feb25a264182ed8cce91d3de151bcfd7bdeda67dd5f19d897
                                      • Instruction Fuzzy Hash: B2318071901128BBD7209B95DCC8EFFBB7CEF26750F000166B906E2240DB789A459AB8
                                      APIs
                                      • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00493D40
                                      • _wcslen.LIBCMT ref: 00493D6D
                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00493D9D
                                      • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00493DBE
                                      • RemoveDirectoryW.KERNEL32(?), ref: 00493DCE
                                      • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00493E55
                                      • CloseHandle.KERNEL32(00000000), ref: 00493E60
                                      • CloseHandle.KERNEL32(00000000), ref: 00493E6B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                      • String ID: :$\$\??\%s
                                      • API String ID: 1149970189-3457252023
                                      • Opcode ID: 0a465d570f08c4bb23eab3e174a8eb2de3bc7eedc95688bdc226f478739956f4
                                      • Instruction ID: 5b925981eb73e55159e5ee93c6542b836739eded22e5e4c2dec1be62d445d1f5
                                      • Opcode Fuzzy Hash: 0a465d570f08c4bb23eab3e174a8eb2de3bc7eedc95688bdc226f478739956f4
                                      • Instruction Fuzzy Hash: 9231A375904109ABDF209FA4DC89FEB37BCEF89705F1042B6F515D6160E77897448B28
                                      APIs
                                      • timeGetTime.WINMM ref: 0048E6B4
                                        • Part of subcall function 0043E551: timeGetTime.WINMM(?,?,0048E6D4), ref: 0043E555
                                      • Sleep.KERNEL32(0000000A), ref: 0048E6E1
                                      • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 0048E705
                                      • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 0048E727
                                      • SetActiveWindow.USER32 ref: 0048E746
                                      • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 0048E754
                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 0048E773
                                      • Sleep.KERNEL32(000000FA), ref: 0048E77E
                                      • IsWindow.USER32 ref: 0048E78A
                                      • EndDialog.USER32(00000000), ref: 0048E79B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                      • String ID: BUTTON
                                      • API String ID: 1194449130-3405671355
                                      • Opcode ID: dfbdc9079dd3c2cd1ce914e8b51f33b69eeb55c0b2504dc666a10ed1ec47bd10
                                      • Instruction ID: 052e8e9a7e95f5040ec27539b4336f0b2930f42fa79fb6d97dfaf71ea67588a3
                                      • Opcode Fuzzy Hash: dfbdc9079dd3c2cd1ce914e8b51f33b69eeb55c0b2504dc666a10ed1ec47bd10
                                      • Instruction Fuzzy Hash: E32162B4200205AFFB106F66EDC9E3A3B69E754749F501936F801E12B1DBB5AC50DB2C
                                      APIs
                                        • Part of subcall function 00429CB3: _wcslen.LIBCMT ref: 00429CBD
                                      • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0048EA5D
                                      • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0048EA73
                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0048EA84
                                      • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0048EA96
                                      • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0048EAA7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: SendString$_wcslen
                                      • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                      • API String ID: 2420728520-1007645807
                                      • Opcode ID: ed2b69f846c50feac6b6c802ce8aa03c1403c7ff261486af3cafb8a73b0c5e5f
                                      • Instruction ID: ae891ed718cd405ccf14250d9a0ed62dbffb8b1ae2511c0b9e1d72db2f062fc2
                                      • Opcode Fuzzy Hash: ed2b69f846c50feac6b6c802ce8aa03c1403c7ff261486af3cafb8a73b0c5e5f
                                      • Instruction Fuzzy Hash: CB11826165026979D724F763DC4AEFF6A7CEBD1F44F51082BB801A20D1DA780945C6B8
                                      APIs
                                      • GetDlgItem.USER32(?,00000001), ref: 00485CE2
                                      • GetWindowRect.USER32(00000000,?), ref: 00485CFB
                                      • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00485D59
                                      • GetDlgItem.USER32(?,00000002), ref: 00485D69
                                      • GetWindowRect.USER32(00000000,?), ref: 00485D7B
                                      • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00485DCF
                                      • GetDlgItem.USER32(?,000003E9), ref: 00485DDD
                                      • GetWindowRect.USER32(00000000,?), ref: 00485DEF
                                      • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00485E31
                                      • GetDlgItem.USER32(?,000003EA), ref: 00485E44
                                      • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00485E5A
                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00485E67
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Window$ItemMoveRect$Invalidate
                                      • String ID:
                                      • API String ID: 3096461208-0
                                      • Opcode ID: 611fe9b2f1854a717d939cb35781acf2f9d0492e3ce50075508e1891fda845c5
                                      • Instruction ID: b0e0c8946ed99cef9116485d2d4a4861a3f937f72fc667073d9dd6331107c1a0
                                      • Opcode Fuzzy Hash: 611fe9b2f1854a717d939cb35781acf2f9d0492e3ce50075508e1891fda845c5
                                      • Instruction Fuzzy Hash: 6E510D71A00609AFDF18DFA8DD89AAEBBF5FB48300F148629F915E6290D7749E04CB54
                                      APIs
                                        • Part of subcall function 00438F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00438BE8,?,00000000,?,?,?,?,00438BBA,00000000,?), ref: 00438FC5
                                      • DestroyWindow.USER32(?), ref: 00438C81
                                      • KillTimer.USER32(00000000,?,?,?,?,00438BBA,00000000,?), ref: 00438D1B
                                      • DestroyAcceleratorTable.USER32(00000000), ref: 00476973
                                      • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00438BBA,00000000,?), ref: 004769A1
                                      • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00438BBA,00000000,?), ref: 004769B8
                                      • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00438BBA,00000000), ref: 004769D4
                                      • DeleteObject.GDI32(00000000), ref: 004769E6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                      • String ID:
                                      • API String ID: 641708696-0
                                      • Opcode ID: ad012e679e6fe8cfe916e999ec19e5ae42c2481a949ffac4e04b0b55d1fbd15b
                                      • Instruction ID: 4073c1240ef3383d6fd55069c77054874bed5b941f43f2c39adcce04d666bbb2
                                      • Opcode Fuzzy Hash: ad012e679e6fe8cfe916e999ec19e5ae42c2481a949ffac4e04b0b55d1fbd15b
                                      • Instruction Fuzzy Hash: 9061AD70102B00DFDB259F25C988B66B7F2FB48316F14A52EE04696670CB79AC91CF9D
                                      APIs
                                        • Part of subcall function 00439944: GetWindowLongW.USER32(?,000000EB), ref: 00439952
                                      • GetSysColor.USER32(0000000F), ref: 00439862
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ColorLongWindow
                                      • String ID:
                                      • API String ID: 259745315-0
                                      • Opcode ID: 94e07acad2a7c0755fc9b78a22b9c54c8f2fb0eb562f6202b504de1166f19318
                                      • Instruction ID: d856e25f8f0da12e4dd97e1e23d7488aa8c9b6b8d89ae7c452337e298399bdb5
                                      • Opcode Fuzzy Hash: 94e07acad2a7c0755fc9b78a22b9c54c8f2fb0eb562f6202b504de1166f19318
                                      • Instruction Fuzzy Hash: 5641D531104640AFDB246F3C9CC4BBA3B65EB4A330F145616F9A6972E2C7B99C42DF19
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: .D
                                      • API String ID: 0-3625442119
                                      • Opcode ID: ce12a0330fff31c5ac3319b6c0e2184d86dd2926c6ac8f26c6ab786bbf9e3bd4
                                      • Instruction ID: b8db4f4a45e9688cc903afd3798f038090bbe80441aac9bbc5750a36dab01d1b
                                      • Opcode Fuzzy Hash: ce12a0330fff31c5ac3319b6c0e2184d86dd2926c6ac8f26c6ab786bbf9e3bd4
                                      • Instruction Fuzzy Hash: 74C1E175904249EFDF11DFA9C841BAEBBB0BF49311F04409AE814A7393CB788D49CB69
                                      APIs
                                      • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,0046F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00489717
                                      • LoadStringW.USER32(00000000,?,0046F7F8,00000001), ref: 00489720
                                        • Part of subcall function 00429CB3: _wcslen.LIBCMT ref: 00429CBD
                                      • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,0046F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00489742
                                      • LoadStringW.USER32(00000000,?,0046F7F8,00000001), ref: 00489745
                                      • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00489866
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: HandleLoadModuleString$Message_wcslen
                                      • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                      • API String ID: 747408836-2268648507
                                      • Opcode ID: 0da02023d1b9faea68bf468b3f93fdcd0e257a390fc9a924c91f9b0122b56d6d
                                      • Instruction ID: 315f42e0503af1636a761416fa021e98f0badf8db14939f61a1af596cf0b0a27
                                      • Opcode Fuzzy Hash: 0da02023d1b9faea68bf468b3f93fdcd0e257a390fc9a924c91f9b0122b56d6d
                                      • Instruction Fuzzy Hash: 28416172900219ABCB04FBE2DD86EEE7778AF14745F54042AF50172091EB3D6F48CB69
                                      APIs
                                        • Part of subcall function 00426B57: _wcslen.LIBCMT ref: 00426B6A
                                      • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 004807A2
                                      • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 004807BE
                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 004807DA
                                      • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00480804
                                      • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 0048082C
                                      • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00480837
                                      • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0048083C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                      • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                      • API String ID: 323675364-22481851
                                      • Opcode ID: cd56ca3c3badfa68ef63769d66e3372a1aceb3ee48c39b684475d768da47836c
                                      • Instruction ID: cf6bcc40681bc4762d5d680904933e3b585e0e94b09034b4650811ee94175feb
                                      • Opcode Fuzzy Hash: cd56ca3c3badfa68ef63769d66e3372a1aceb3ee48c39b684475d768da47836c
                                      • Instruction Fuzzy Hash: F6412972D10228ABCF11FFA5DC858EEB778BF04744F54452AE801A3161EB385E58CBA4
                                      APIs
                                      • VariantInit.OLEAUT32(?), ref: 004A3C5C
                                      • CoInitialize.OLE32(00000000), ref: 004A3C8A
                                      • CoUninitialize.OLE32 ref: 004A3C94
                                      • _wcslen.LIBCMT ref: 004A3D2D
                                      • GetRunningObjectTable.OLE32(00000000,?), ref: 004A3DB1
                                      • SetErrorMode.KERNEL32(00000001,00000029), ref: 004A3ED5
                                      • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 004A3F0E
                                      • CoGetObject.OLE32(?,00000000,004BFB98,?), ref: 004A3F2D
                                      • SetErrorMode.KERNEL32(00000000), ref: 004A3F40
                                      • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 004A3FC4
                                      • VariantClear.OLEAUT32(?), ref: 004A3FD8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                      • String ID:
                                      • API String ID: 429561992-0
                                      • Opcode ID: af8cd87b0cf776d44909105eca82c49e194236b4364205d49ceb0141240c759f
                                      • Instruction ID: eb5a05ba37a47901f4185ba8cc1a766aaead13f6d96fff6bdfb159df2503da24
                                      • Opcode Fuzzy Hash: af8cd87b0cf776d44909105eca82c49e194236b4364205d49ceb0141240c759f
                                      • Instruction Fuzzy Hash: AAC158716083019FD700DF69C88492BB7E9FF9A749F10495EF98A9B210E734EE06CB56
                                      APIs
                                      • CoInitialize.OLE32(00000000), ref: 00497AF3
                                      • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00497B8F
                                      • SHGetDesktopFolder.SHELL32(?), ref: 00497BA3
                                      • CoCreateInstance.OLE32(004BFD08,00000000,00000001,004E6E6C,?), ref: 00497BEF
                                      • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00497C74
                                      • CoTaskMemFree.OLE32(?,?), ref: 00497CCC
                                      • SHBrowseForFolderW.SHELL32(?), ref: 00497D57
                                      • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00497D7A
                                      • CoTaskMemFree.OLE32(00000000), ref: 00497D81
                                      • CoTaskMemFree.OLE32(00000000), ref: 00497DD6
                                      • CoUninitialize.OLE32 ref: 00497DDC
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                      • String ID:
                                      • API String ID: 2762341140-0
                                      • Opcode ID: 3058253421494f28cdfbc118193bf6da85e839f39c56cb2ad133d8af7e2175f1
                                      • Instruction ID: ae5e0de2e2974df1621386b30b40767b86cdb3652a87cc91cf239549ebdc33aa
                                      • Opcode Fuzzy Hash: 3058253421494f28cdfbc118193bf6da85e839f39c56cb2ad133d8af7e2175f1
                                      • Instruction Fuzzy Hash: A4C13B75A04115AFCB14DF65C884DAEBBB9FF48308B1485AAE81A9B361C734EE41CB94
                                      APIs
                                      • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 004B5504
                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004B5515
                                      • CharNextW.USER32(00000158), ref: 004B5544
                                      • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 004B5585
                                      • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 004B559B
                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004B55AC
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: MessageSend$CharNext
                                      • String ID:
                                      • API String ID: 1350042424-0
                                      • Opcode ID: 32beaa9993a839c28410fd5858b6d44b52d27578782aaa08e33292029a34fe96
                                      • Instruction ID: e1d9647a36fadf8a2a13fe6dcee3dd830a3359484a789a1da014d33b2be4941b
                                      • Opcode Fuzzy Hash: 32beaa9993a839c28410fd5858b6d44b52d27578782aaa08e33292029a34fe96
                                      • Instruction Fuzzy Hash: 55618C70900608AFDF209F54CC84FFFBBB9EB19725F104156F925AA290D7788A81DB79
                                      APIs
                                      • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 0047FAAF
                                      • SafeArrayAllocData.OLEAUT32(?), ref: 0047FB08
                                      • VariantInit.OLEAUT32(?), ref: 0047FB1A
                                      • SafeArrayAccessData.OLEAUT32(?,?), ref: 0047FB3A
                                      • VariantCopy.OLEAUT32(?,?), ref: 0047FB8D
                                      • SafeArrayUnaccessData.OLEAUT32(?), ref: 0047FBA1
                                      • VariantClear.OLEAUT32(?), ref: 0047FBB6
                                      • SafeArrayDestroyData.OLEAUT32(?), ref: 0047FBC3
                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0047FBCC
                                      • VariantClear.OLEAUT32(?), ref: 0047FBDE
                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0047FBE9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                      • String ID:
                                      • API String ID: 2706829360-0
                                      • Opcode ID: 6f7b5fabf6a641d19eb368b8815915a0d98901539802755c89e72df79a96de6e
                                      • Instruction ID: 12f8588b67f0d5eb0c23d31db24640b0a29012802ef8d9ce2514bc301b8d20b5
                                      • Opcode Fuzzy Hash: 6f7b5fabf6a641d19eb368b8815915a0d98901539802755c89e72df79a96de6e
                                      • Instruction Fuzzy Hash: D3415435A00219DFCF00DF65D8949EEBBB9EF48344F00807AE955A7261D734AA45CFA4
                                      APIs
                                      • GetKeyboardState.USER32(?), ref: 00489CA1
                                      • GetAsyncKeyState.USER32(000000A0), ref: 00489D22
                                      • GetKeyState.USER32(000000A0), ref: 00489D3D
                                      • GetAsyncKeyState.USER32(000000A1), ref: 00489D57
                                      • GetKeyState.USER32(000000A1), ref: 00489D6C
                                      • GetAsyncKeyState.USER32(00000011), ref: 00489D84
                                      • GetKeyState.USER32(00000011), ref: 00489D96
                                      • GetAsyncKeyState.USER32(00000012), ref: 00489DAE
                                      • GetKeyState.USER32(00000012), ref: 00489DC0
                                      • GetAsyncKeyState.USER32(0000005B), ref: 00489DD8
                                      • GetKeyState.USER32(0000005B), ref: 00489DEA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: State$Async$Keyboard
                                      • String ID:
                                      • API String ID: 541375521-0
                                      • Opcode ID: dc4fe5f5d5711fbc66dfedc37fb57fefdd4825f2dfd1573658be8911a9f24aa0
                                      • Instruction ID: facacb03c0d2b656a947f478fa4b234fb4fac5978c6e194a4baa3494b5ee7614
                                      • Opcode Fuzzy Hash: dc4fe5f5d5711fbc66dfedc37fb57fefdd4825f2dfd1573658be8911a9f24aa0
                                      • Instruction Fuzzy Hash: A7419734504FC96AFF31A66488443BBBEE06B11344F0C885BDAC6567C2D7A99DC4C79E
                                      APIs
                                      • WSAStartup.WSOCK32(00000101,?), ref: 004A05BC
                                      • inet_addr.WSOCK32(?), ref: 004A061C
                                      • gethostbyname.WSOCK32(?), ref: 004A0628
                                      • IcmpCreateFile.IPHLPAPI ref: 004A0636
                                      • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 004A06C6
                                      • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 004A06E5
                                      • IcmpCloseHandle.IPHLPAPI(?), ref: 004A07B9
                                      • WSACleanup.WSOCK32 ref: 004A07BF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                      • String ID: Ping
                                      • API String ID: 1028309954-2246546115
                                      • Opcode ID: 46d83fbca524cc4f34e84c449eb976f662388ba53500abc1b4d359e78d72eca9
                                      • Instruction ID: 8d3317d853e11aa031c71c508584506f9589074b2490421e4458028613c0f45f
                                      • Opcode Fuzzy Hash: 46d83fbca524cc4f34e84c449eb976f662388ba53500abc1b4d359e78d72eca9
                                      • Instruction Fuzzy Hash: 23919E35604201AFD320DF15D489F1ABBE0AF59318F1485AAF46A9B7A2C738FC45CF95
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: _wcslen$BuffCharLower
                                      • String ID: cdecl$none$stdcall$winapi
                                      • API String ID: 707087890-567219261
                                      • Opcode ID: d86c4f65399035efaadcd4c73c0c3f273bf9d1b8e135e5c0efb322a4e6379e93
                                      • Instruction ID: d3f80d1d09995cd6af62bb8f295e3432b9a94d8eb4a3049616c51714734bef79
                                      • Opcode Fuzzy Hash: d86c4f65399035efaadcd4c73c0c3f273bf9d1b8e135e5c0efb322a4e6379e93
                                      • Instruction Fuzzy Hash: E2519E71A001269BCB14DF69C9409BFB7A5FF76324B61422EE826E7384DB38DD41C798
                                      APIs
                                      • CoInitialize.OLE32 ref: 004A3774
                                      • CoUninitialize.OLE32 ref: 004A377F
                                      • CoCreateInstance.OLE32(?,00000000,00000017,004BFB78,?), ref: 004A37D9
                                      • IIDFromString.OLE32(?,?), ref: 004A384C
                                      • VariantInit.OLEAUT32(?), ref: 004A38E4
                                      • VariantClear.OLEAUT32(?), ref: 004A3936
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                      • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                      • API String ID: 636576611-1287834457
                                      • Opcode ID: ce74c52e764c2352949c91a2a6a874c2f8bd0532e8528445569cddb123eda94d
                                      • Instruction ID: 0bcffe20d5025fc9f52f83c0e2bd06ce11bce1dd5c47163a1c6ff5fcdcc407e4
                                      • Opcode Fuzzy Hash: ce74c52e764c2352949c91a2a6a874c2f8bd0532e8528445569cddb123eda94d
                                      • Instruction Fuzzy Hash: EB61E170608301AFD310EF55D884B5BB7E4AF5A716F10481FF5859B290E778EE48CB9A
                                      APIs
                                        • Part of subcall function 00439BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00439BB2
                                        • Part of subcall function 0043912D: GetCursorPos.USER32(?), ref: 00439141
                                        • Part of subcall function 0043912D: ScreenToClient.USER32(00000000,?), ref: 0043915E
                                        • Part of subcall function 0043912D: GetAsyncKeyState.USER32(00000001), ref: 00439183
                                        • Part of subcall function 0043912D: GetAsyncKeyState.USER32(00000002), ref: 0043919D
                                      • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 004B8B6B
                                      • ImageList_EndDrag.COMCTL32 ref: 004B8B71
                                      • ReleaseCapture.USER32 ref: 004B8B77
                                      • SetWindowTextW.USER32(?,00000000), ref: 004B8C12
                                      • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 004B8C25
                                      • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 004B8CFF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                      • String ID: @GUI_DRAGFILE$@GUI_DROPID$p#O
                                      • API String ID: 1924731296-2598662188
                                      • Opcode ID: 2c372c40ca914b004e4e184c0c9a37365bc88312c283b8d9f9d7e56e47a3f408
                                      • Instruction ID: c8dba007dde681a94c968a701429484be5760089fd939bf6b6a0657addd1593d
                                      • Opcode Fuzzy Hash: 2c372c40ca914b004e4e184c0c9a37365bc88312c283b8d9f9d7e56e47a3f408
                                      • Instruction Fuzzy Hash: 2A518EB1204214AFD700EF25DC95FAA77E4FB88714F400A2EF952572E1CB75AD14CB6A
                                      APIs
                                      • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 004933CF
                                        • Part of subcall function 00429CB3: _wcslen.LIBCMT ref: 00429CBD
                                      • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 004933F0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: LoadString$_wcslen
                                      • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                      • API String ID: 4099089115-3080491070
                                      • Opcode ID: 5f7ec9dcdba26a75279a183d738bbcc7659c887b31a8f71826ecdc66fcc04c56
                                      • Instruction ID: 206525998a5395c8800700a879c6b29409dd401b671ec45590a38d9b386f1bdb
                                      • Opcode Fuzzy Hash: 5f7ec9dcdba26a75279a183d738bbcc7659c887b31a8f71826ecdc66fcc04c56
                                      • Instruction Fuzzy Hash: 7951D071900219AADF14EBE2DD42EEEB778AF14349F64446AF40572061EB392F58CB68
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: _wcslen$BuffCharUpper
                                      • String ID: APPEND$EXISTS$KEYS$REMOVE
                                      • API String ID: 1256254125-769500911
                                      • Opcode ID: 17fe15ae6fc3651b8928bd9c3faa69c8d8f62cb35973f02e17107d643a94b39d
                                      • Instruction ID: c612251e1c088bf734f639d4cdfeb93ba2e30a682181247396aa09b3e3bb1550
                                      • Opcode Fuzzy Hash: 17fe15ae6fc3651b8928bd9c3faa69c8d8f62cb35973f02e17107d643a94b39d
                                      • Instruction Fuzzy Hash: D4419632A001269ECB107E7D88905BF77A5EFA0754B25492BE861E7384F739CD82C7D5
                                      APIs
                                      • SetErrorMode.KERNEL32(00000001), ref: 004953A0
                                      • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00495416
                                      • GetLastError.KERNEL32 ref: 00495420
                                      • SetErrorMode.KERNEL32(00000000,READY), ref: 004954A7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Error$Mode$DiskFreeLastSpace
                                      • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                      • API String ID: 4194297153-14809454
                                      • Opcode ID: 8a71170d6d959359fe9ba135f183341e94382c1d040327b2202a9d63e516e671
                                      • Instruction ID: ea534ceca90174bb4888b5cc803cdc431cb2b9481c0309a2363265166ae538ab
                                      • Opcode Fuzzy Hash: 8a71170d6d959359fe9ba135f183341e94382c1d040327b2202a9d63e516e671
                                      • Instruction Fuzzy Hash: FE31B335A005049FCB52DF69D888BAA7BB4EF44309F64817BE405DB392D738DD82CB95
                                      APIs
                                      • CreateMenu.USER32 ref: 004B3C79
                                      • SetMenu.USER32(?,00000000), ref: 004B3C88
                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 004B3D10
                                      • IsMenu.USER32(?), ref: 004B3D24
                                      • CreatePopupMenu.USER32 ref: 004B3D2E
                                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004B3D5B
                                      • DrawMenuBar.USER32 ref: 004B3D63
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                      • String ID: 0$F
                                      • API String ID: 161812096-3044882817
                                      • Opcode ID: c30a2ea1a0e719dec03935eaf0f19c33471ec7cbfe3de43b2c37b9e29d2c3731
                                      • Instruction ID: 7496a156cd34fb984efa3b264c97d24f489854b8a62d354fa9fc87ab2b166998
                                      • Opcode Fuzzy Hash: c30a2ea1a0e719dec03935eaf0f19c33471ec7cbfe3de43b2c37b9e29d2c3731
                                      • Instruction Fuzzy Hash: EB419E75A01209EFDB24CF65D884EEA7BB9FF49341F14012AF94697360D774AA10CFA8
                                      APIs
                                      • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004B3A9D
                                      • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004B3AA0
                                      • GetWindowLongW.USER32(?,000000F0), ref: 004B3AC7
                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004B3AEA
                                      • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 004B3B62
                                      • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 004B3BAC
                                      • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004B3BC7
                                      • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 004B3BE2
                                      • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 004B3BF6
                                      • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 004B3C13
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: MessageSend$LongWindow
                                      • String ID:
                                      • API String ID: 312131281-0
                                      • Opcode ID: 049fc25da331cd723c18ca635e1f51963b151a49e962c6c9f8976ad4008ccb12
                                      • Instruction ID: 4ba89fe60fb444b3a21bc1f4beefe5e81f35b79a23582f7190513a106e2a46e9
                                      • Opcode Fuzzy Hash: 049fc25da331cd723c18ca635e1f51963b151a49e962c6c9f8976ad4008ccb12
                                      • Instruction Fuzzy Hash: BC617E75900248AFDB10DFA8CC81EEE77B8EB09704F10016AFA15E73A2D774AE55DB64
                                      APIs
                                      • GetCurrentThreadId.KERNEL32 ref: 0048B151
                                      • GetForegroundWindow.USER32(00000000,?,?,?,?,?,0048A1E1,?,00000001), ref: 0048B165
                                      • GetWindowThreadProcessId.USER32(00000000), ref: 0048B16C
                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0048A1E1,?,00000001), ref: 0048B17B
                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 0048B18D
                                      • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,0048A1E1,?,00000001), ref: 0048B1A6
                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0048A1E1,?,00000001), ref: 0048B1B8
                                      • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,0048A1E1,?,00000001), ref: 0048B1FD
                                      • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,0048A1E1,?,00000001), ref: 0048B212
                                      • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,0048A1E1,?,00000001), ref: 0048B21D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                      • String ID:
                                      • API String ID: 2156557900-0
                                      • Opcode ID: 617172db625a1330e626f206561578d06ea6c59fbff0de08d0b2a7f59ac83e6e
                                      • Instruction ID: f7f6a70738f6c0c1b8fbc18cb0153fe01ecaf21ef3a7640360ac1cf2ad9dc7de
                                      • Opcode Fuzzy Hash: 617172db625a1330e626f206561578d06ea6c59fbff0de08d0b2a7f59ac83e6e
                                      • Instruction Fuzzy Hash: 343180B1540204AFDB10AF64DC88F7E7BA9FB51356F104927F901D6290DBB8A940CFAC
                                      APIs
                                      • _free.LIBCMT ref: 00452C94
                                        • Part of subcall function 004529C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0045D7D1,00000000,00000000,00000000,00000000,?,0045D7F8,00000000,00000007,00000000,?,0045DBF5,00000000), ref: 004529DE
                                        • Part of subcall function 004529C8: GetLastError.KERNEL32(00000000,?,0045D7D1,00000000,00000000,00000000,00000000,?,0045D7F8,00000000,00000007,00000000,?,0045DBF5,00000000,00000000), ref: 004529F0
                                      • _free.LIBCMT ref: 00452CA0
                                      • _free.LIBCMT ref: 00452CAB
                                      • _free.LIBCMT ref: 00452CB6
                                      • _free.LIBCMT ref: 00452CC1
                                      • _free.LIBCMT ref: 00452CCC
                                      • _free.LIBCMT ref: 00452CD7
                                      • _free.LIBCMT ref: 00452CE2
                                      • _free.LIBCMT ref: 00452CED
                                      • _free.LIBCMT ref: 00452CFB
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: _free$ErrorFreeHeapLast
                                      • String ID:
                                      • API String ID: 776569668-0
                                      • Opcode ID: a83211c1219ee6f80178e18ab4e08994b3e6e06ee4f255e394ea159246773c5b
                                      • Instruction ID: 64275a250ac089daa09298d036e174a82f593d2d4214a0e375de64f495e5c148
                                      • Opcode Fuzzy Hash: a83211c1219ee6f80178e18ab4e08994b3e6e06ee4f255e394ea159246773c5b
                                      • Instruction Fuzzy Hash: 1611F6B6200008AFCB02EF55DA42CDD3BA5FF06345F4040ABFE486B323D675EA549B94
                                      APIs
                                      • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00421459
                                      • OleUninitialize.OLE32(?,00000000), ref: 004214F8
                                      • UnregisterHotKey.USER32(?), ref: 004216DD
                                      • DestroyWindow.USER32(?), ref: 004624B9
                                      • FreeLibrary.KERNEL32(?), ref: 0046251E
                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0046254B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                      • String ID: close all
                                      • API String ID: 469580280-3243417748
                                      • Opcode ID: 5b4f86862d7831333155ab5417fa57704cb555ad48112824e734f6a972138546
                                      • Instruction ID: 852f70d196d7dd665ae9d2db4bb7c3070d10db517da492d242c17ec88131df72
                                      • Opcode Fuzzy Hash: 5b4f86862d7831333155ab5417fa57704cb555ad48112824e734f6a972138546
                                      • Instruction Fuzzy Hash: 0BD1BF31701222EFCB29EF15D595A29F7A0BF15304F5442AFE44A6B361DB38AC12CF5A
                                      APIs
                                      • SetWindowLongW.USER32(?,000000EB), ref: 00425C7A
                                        • Part of subcall function 00425D0A: GetClientRect.USER32(?,?), ref: 00425D30
                                        • Part of subcall function 00425D0A: GetWindowRect.USER32(?,?), ref: 00425D71
                                        • Part of subcall function 00425D0A: ScreenToClient.USER32(?,?), ref: 00425D99
                                      • GetDC.USER32 ref: 004646F5
                                      • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00464708
                                      • SelectObject.GDI32(00000000,00000000), ref: 00464716
                                      • SelectObject.GDI32(00000000,00000000), ref: 0046472B
                                      • ReleaseDC.USER32(?,00000000), ref: 00464733
                                      • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 004647C4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                      • String ID: U
                                      • API String ID: 4009187628-3372436214
                                      • Opcode ID: c41baa7ffc0b4014c439ef72a4f69aed51fb8420d04b3457c0f2a02fca43087a
                                      • Instruction ID: 302fdee9e09b0e2762ac7deca875f5178239081158cfcaaeec4ff95320d264e3
                                      • Opcode Fuzzy Hash: c41baa7ffc0b4014c439ef72a4f69aed51fb8420d04b3457c0f2a02fca43087a
                                      • Instruction Fuzzy Hash: 17711230500205DFCF218F64C984ABB7BB5FF8A325F14426BED515A2A6E3389841DF6A
                                      APIs
                                      • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 004935E4
                                        • Part of subcall function 00429CB3: _wcslen.LIBCMT ref: 00429CBD
                                      • LoadStringW.USER32(004F2390,?,00000FFF,?), ref: 0049360A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: LoadString$_wcslen
                                      • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                      • API String ID: 4099089115-2391861430
                                      • Opcode ID: b577fd90da45ad6173f2dc00d61363cf8e1c6324e7c3d9f3a70a574a940a9322
                                      • Instruction ID: 527e782805d85e0e51c77088e0fe1b70afb222000313e3be558e5f02d001a6e1
                                      • Opcode Fuzzy Hash: b577fd90da45ad6173f2dc00d61363cf8e1c6324e7c3d9f3a70a574a940a9322
                                      • Instruction Fuzzy Hash: 81518E71900219AADF14EFE2DC82EEEBB34AF14349F54412AF505721A1DB381F98CF69
                                      APIs
                                      • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0049C272
                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0049C29A
                                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0049C2CA
                                      • GetLastError.KERNEL32 ref: 0049C322
                                      • SetEvent.KERNEL32(?), ref: 0049C336
                                      • InternetCloseHandle.WININET(00000000), ref: 0049C341
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                      • String ID:
                                      • API String ID: 3113390036-3916222277
                                      • Opcode ID: d7e1436001a6d5fb5ad35b2d789b4e29e430333a7bdc8c6415f5ab3063b91b34
                                      • Instruction ID: ed7f78f74fbf3e75a8190e17767271ec81419458a401d3dafb35156d4ee0b2ef
                                      • Opcode Fuzzy Hash: d7e1436001a6d5fb5ad35b2d789b4e29e430333a7bdc8c6415f5ab3063b91b34
                                      • Instruction Fuzzy Hash: CD314FB1600604AFDB319F658CC8AAB7FFCEB49744B14853EF84692241DB38DD059BA9
                                      APIs
                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00463AAF,?,?,Bad directive syntax error,004BCC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 004898BC
                                      • LoadStringW.USER32(00000000,?,00463AAF,?), ref: 004898C3
                                        • Part of subcall function 00429CB3: _wcslen.LIBCMT ref: 00429CBD
                                      • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00489987
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: HandleLoadMessageModuleString_wcslen
                                      • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                      • API String ID: 858772685-4153970271
                                      • Opcode ID: 6c9f0ddd94a06e30ebdded05b29821338e643bc5b985c7f5f0eb3f36e7dda75a
                                      • Instruction ID: f637df02af12420a45f69c2377614a99c3bb43b72ac4807c869ad515684fd28c
                                      • Opcode Fuzzy Hash: 6c9f0ddd94a06e30ebdded05b29821338e643bc5b985c7f5f0eb3f36e7dda75a
                                      • Instruction Fuzzy Hash: FF219131D0021AABCF15EF91DC46EEE7735BF18749F08482BF515610A1EB399A28CB19
                                      APIs
                                      • GetParent.USER32 ref: 004820AB
                                      • GetClassNameW.USER32(00000000,?,00000100), ref: 004820C0
                                      • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 0048214D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ClassMessageNameParentSend
                                      • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                      • API String ID: 1290815626-3381328864
                                      • Opcode ID: e6f58091979ecf033e962cf35434fc1fb4c8294f95d1565fba6537e71e73ee6c
                                      • Instruction ID: 3ac4a1046c0be7d94a72e1a47f1b387fee03c7639d67d71fd27faede330ed03f
                                      • Opcode Fuzzy Hash: e6f58091979ecf033e962cf35434fc1fb4c8294f95d1565fba6537e71e73ee6c
                                      • Instruction Fuzzy Hash: D411E776684B07BAF60176219D0AEAB779CDB05329B30052BFB04B51D2EEED6802571D
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                      • String ID:
                                      • API String ID: 1282221369-0
                                      • Opcode ID: c7bccbd594999ae5e655dfc2f0b4c494233c3be77bb55b440b5f81c75b59ee00
                                      • Instruction ID: 8ad60c1b387fee4e17c39097f44f0fb8ae2d78b086d33544aa9cdefaf3503c6d
                                      • Opcode Fuzzy Hash: c7bccbd594999ae5e655dfc2f0b4c494233c3be77bb55b440b5f81c75b59ee00
                                      • Instruction Fuzzy Hash: 406128B2A04300AFDB31AFB598C166E7B95AF4531AF04416FED40A73C3D6799909C758
                                      APIs
                                      • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00476890
                                      • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 004768A9
                                      • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 004768B9
                                      • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 004768D1
                                      • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 004768F2
                                      • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00438874,00000000,00000000,00000000,000000FF,00000000), ref: 00476901
                                      • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0047691E
                                      • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00438874,00000000,00000000,00000000,000000FF,00000000), ref: 0047692D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Icon$DestroyExtractImageLoadMessageSend
                                      • String ID:
                                      • API String ID: 1268354404-0
                                      • Opcode ID: 0f601acfaa6061a9c049b20821e4aa6e67ead61fe18cdd3420363bc933414090
                                      • Instruction ID: 30ac4504e7e308912e206b7875339f4eaef5d5e6437eb66e81e5188214416d69
                                      • Opcode Fuzzy Hash: 0f601acfaa6061a9c049b20821e4aa6e67ead61fe18cdd3420363bc933414090
                                      • Instruction Fuzzy Hash: 68519DB0600706EFDB20CF25CC91FAABBB6EB48350F10452EF946972A0DB74E951CB58
                                      APIs
                                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0049C182
                                      • GetLastError.KERNEL32 ref: 0049C195
                                      • SetEvent.KERNEL32(?), ref: 0049C1A9
                                        • Part of subcall function 0049C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0049C272
                                        • Part of subcall function 0049C253: GetLastError.KERNEL32 ref: 0049C322
                                        • Part of subcall function 0049C253: SetEvent.KERNEL32(?), ref: 0049C336
                                        • Part of subcall function 0049C253: InternetCloseHandle.WININET(00000000), ref: 0049C341
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                      • String ID:
                                      • API String ID: 337547030-0
                                      • Opcode ID: 86ad46cbe2e9c096baf0467ebef0eec6351842a1e8425fde35ac88ffb85b0859
                                      • Instruction ID: 4f94156cae4b42429cddecc7e4845e6bcce2a40b79213275a35fcf35a34ff806
                                      • Opcode Fuzzy Hash: 86ad46cbe2e9c096baf0467ebef0eec6351842a1e8425fde35ac88ffb85b0859
                                      • Instruction Fuzzy Hash: 0F317871A00601AFDF219FA5DCC4A67BFE9FF58300B14457EF95682610DB38E815AFA8
                                      APIs
                                        • Part of subcall function 00483A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00483A57
                                        • Part of subcall function 00483A3D: GetCurrentThreadId.KERNEL32 ref: 00483A5E
                                        • Part of subcall function 00483A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,004825B3), ref: 00483A65
                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 004825BD
                                      • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 004825DB
                                      • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 004825DF
                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 004825E9
                                      • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00482601
                                      • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00482605
                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 0048260F
                                      • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00482623
                                      • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00482627
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                      • String ID:
                                      • API String ID: 2014098862-0
                                      • Opcode ID: d76fa3326f87348e075695a197fe14dd4640acfb31eca8e48f74af659bae5e59
                                      • Instruction ID: e1f13d1b6f58077a693cde06514521028fb767f63ae67eeb7c9f34f671571d06
                                      • Opcode Fuzzy Hash: d76fa3326f87348e075695a197fe14dd4640acfb31eca8e48f74af659bae5e59
                                      • Instruction Fuzzy Hash: 6801D470390210BBFB107B699CCAF593F59DB5EB12F100516F358BE0D1C9F224448A6E
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00481449,?,?,00000000), ref: 0048180C
                                      • HeapAlloc.KERNEL32(00000000,?,00481449,?,?,00000000), ref: 00481813
                                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00481449,?,?,00000000), ref: 00481828
                                      • GetCurrentProcess.KERNEL32(?,00000000,?,00481449,?,?,00000000), ref: 00481830
                                      • DuplicateHandle.KERNEL32(00000000,?,00481449,?,?,00000000), ref: 00481833
                                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00481449,?,?,00000000), ref: 00481843
                                      • GetCurrentProcess.KERNEL32(00481449,00000000,?,00481449,?,?,00000000), ref: 0048184B
                                      • DuplicateHandle.KERNEL32(00000000,?,00481449,?,?,00000000), ref: 0048184E
                                      • CreateThread.KERNEL32(00000000,00000000,00481874,00000000,00000000,00000000), ref: 00481868
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                      • String ID:
                                      • API String ID: 1957940570-0
                                      • Opcode ID: d631d11af02698459253fc460f7877285b269d4375a03e864ac6181dff0ad0d4
                                      • Instruction ID: 64ea281f8ce7c83871fcf2c73bae32f62586ac24df9806aa3bbc3d2187c58643
                                      • Opcode Fuzzy Hash: d631d11af02698459253fc460f7877285b269d4375a03e864ac6181dff0ad0d4
                                      • Instruction Fuzzy Hash: 6701ACB5240304BFE610AFA5DCC9F5B3BACEB89B11F404521FA05EB1A1C6749C008F24
                                      APIs
                                        • Part of subcall function 0048D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 0048D501
                                        • Part of subcall function 0048D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 0048D50F
                                        • Part of subcall function 0048D4DC: CloseHandle.KERNEL32(00000000), ref: 0048D5DC
                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 004AA16D
                                      • GetLastError.KERNEL32 ref: 004AA180
                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 004AA1B3
                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 004AA268
                                      • GetLastError.KERNEL32(00000000), ref: 004AA273
                                      • CloseHandle.KERNEL32(00000000), ref: 004AA2C4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                      • String ID: SeDebugPrivilege
                                      • API String ID: 2533919879-2896544425
                                      • Opcode ID: bacc34a075d0d3b0b9a096ca6d126fdd1066f47e7dcd6b54d698e42701bd22df
                                      • Instruction ID: 38e199154f0ddf8151c8e44270ed0f7b9cc55614ac8aa6c071f1abdd61b95cbc
                                      • Opcode Fuzzy Hash: bacc34a075d0d3b0b9a096ca6d126fdd1066f47e7dcd6b54d698e42701bd22df
                                      • Instruction Fuzzy Hash: 5F61D131204242AFD320DF19C4C4F1ABBE0AF55318F54849EE4564BBA3C77AEC55CB9A
                                      APIs
                                      • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004B3925
                                      • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004B393A
                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004B3954
                                      • _wcslen.LIBCMT ref: 004B3999
                                      • SendMessageW.USER32(?,00001057,00000000,?), ref: 004B39C6
                                      • SendMessageW.USER32(?,00001061,?,0000000F), ref: 004B39F4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: MessageSend$Window_wcslen
                                      • String ID: SysListView32
                                      • API String ID: 2147712094-78025650
                                      • Opcode ID: 68fdd5e1b7d5aa3e09c41e29805eee63c25111f0625ac3c6d79af5b1eaf9cf94
                                      • Instruction ID: b5f9fb0d0364931a584dee5f01d0116ef9e0577c438f720f19ae05f810a4ce96
                                      • Opcode Fuzzy Hash: 68fdd5e1b7d5aa3e09c41e29805eee63c25111f0625ac3c6d79af5b1eaf9cf94
                                      • Instruction Fuzzy Hash: 9C41E871A00218ABEF219F65CC85FEB77A9EF08354F10052BF554E7291D7799D80CBA8
                                      APIs
                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0048BCFD
                                      • IsMenu.USER32(00000000), ref: 0048BD1D
                                      • CreatePopupMenu.USER32 ref: 0048BD53
                                      • GetMenuItemCount.USER32(01065BD8), ref: 0048BDA4
                                      • InsertMenuItemW.USER32(01065BD8,?,00000001,00000030), ref: 0048BDCC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Menu$Item$CountCreateInfoInsertPopup
                                      • String ID: 0$2
                                      • API String ID: 93392585-3793063076
                                      • Opcode ID: 42e553a4e654265a8d7419b793b2561eeb56eaa3cfbf1c199582a09e1ffee5f6
                                      • Instruction ID: cd84db14afbd3b5894fd28a9e3f47e533da171e5c950e98dd3c9c747690188a9
                                      • Opcode Fuzzy Hash: 42e553a4e654265a8d7419b793b2561eeb56eaa3cfbf1c199582a09e1ffee5f6
                                      • Instruction Fuzzy Hash: 2951D270A00205FFDB11EFA9D8C4BAEBBF5EF45314F144A1AE84197390D7789941CBA9
                                      APIs
                                      • _ValidateLocalCookies.LIBCMT ref: 00442D4B
                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 00442D53
                                      • _ValidateLocalCookies.LIBCMT ref: 00442DE1
                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 00442E0C
                                      • _ValidateLocalCookies.LIBCMT ref: 00442E61
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                      • String ID: &HD$csm
                                      • API String ID: 1170836740-3754641800
                                      • Opcode ID: c1ec314a482447e61c1304621720e007ad1c9b7c1ac6aee0eca966bb62e9e232
                                      • Instruction ID: 7da2b9e0d3ac9f83241b0665dfdac3b2bf4e020d0c22d8e36a8c6220d4c17f15
                                      • Opcode Fuzzy Hash: c1ec314a482447e61c1304621720e007ad1c9b7c1ac6aee0eca966bb62e9e232
                                      • Instruction Fuzzy Hash: BF41E674E00208DBDF10DF69C985A9FBBB4BF44328F54815BF814AB352D7799A01CB98
                                      APIs
                                      • LoadIconW.USER32(00000000,00007F03), ref: 0048C913
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: IconLoad
                                      • String ID: blank$info$question$stop$warning
                                      • API String ID: 2457776203-404129466
                                      • Opcode ID: 74d7359e8bfd31f226a72af272bf6fc4b5791d3eb41ca9ac5d58da4836e3ac2f
                                      • Instruction ID: bf5c668435d66832e1e5914eb625815cb74039cc67716dd9f940ee0ef2283cd1
                                      • Opcode Fuzzy Hash: 74d7359e8bfd31f226a72af272bf6fc4b5791d3eb41ca9ac5d58da4836e3ac2f
                                      • Instruction Fuzzy Hash: A3112B71789706BAA7007B159CC2EAF679CDF15369B21046FF500A6382E77C5E0153BD
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: _wcslen$LocalTime
                                      • String ID:
                                      • API String ID: 952045576-0
                                      • Opcode ID: fb5fb77bad73c2375e5b8240b5572293ef0bad95caba553eddaffee60a267e90
                                      • Instruction ID: c03bcf6af0a17558b2c0652073a371fcf2331b154489fa70ac542155895b4c53
                                      • Opcode Fuzzy Hash: fb5fb77bad73c2375e5b8240b5572293ef0bad95caba553eddaffee60a267e90
                                      • Instruction Fuzzy Hash: 8941B565C1011875EB11FBF6888AADFB7A8AF46310F50886BE514F3161FB38D245C3AE
                                      APIs
                                      • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0047682C,00000004,00000000,00000000), ref: 0043F953
                                      • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,0047682C,00000004,00000000,00000000), ref: 0047F3D1
                                      • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0047682C,00000004,00000000,00000000), ref: 0047F454
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ShowWindow
                                      • String ID:
                                      • API String ID: 1268545403-0
                                      • Opcode ID: 025238e3778da7027c2fb1bb9da6655355319097dc7431e8073c85d1c0539a81
                                      • Instruction ID: 64f2f4c6696daead36053a6a2c596add8b04f1a9be89c804e325fc8955552b97
                                      • Opcode Fuzzy Hash: 025238e3778da7027c2fb1bb9da6655355319097dc7431e8073c85d1c0539a81
                                      • Instruction Fuzzy Hash: E8412BB1904640BBD7388B2988C876B7B91AF5E324F14A13FE04B56760C67DA88DCB1D
                                      APIs
                                      • DeleteObject.GDI32(00000000), ref: 004B2D1B
                                      • GetDC.USER32(00000000), ref: 004B2D23
                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004B2D2E
                                      • ReleaseDC.USER32(00000000,00000000), ref: 004B2D3A
                                      • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 004B2D76
                                      • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 004B2D87
                                      • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,004B5A65,?,?,000000FF,00000000,?,000000FF,?), ref: 004B2DC2
                                      • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 004B2DE1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                      • String ID:
                                      • API String ID: 3864802216-0
                                      • Opcode ID: 75ac3929410914cbedcf8b4f41221053bc00435cb9047e006d6b5a1b1f005356
                                      • Instruction ID: 2a5cc7eb944f02e6a3524c952499a8e715fe81207836acc5dc3da49e210000c3
                                      • Opcode Fuzzy Hash: 75ac3929410914cbedcf8b4f41221053bc00435cb9047e006d6b5a1b1f005356
                                      • Instruction Fuzzy Hash: 13316D72201214BBEB114F54CC89FEB3BADEF49755F044166FE089A291C6B99C51CBB8
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: _memcmp
                                      • String ID:
                                      • API String ID: 2931989736-0
                                      • Opcode ID: 7d53b607085b7d3610ee87aa2d41c445eef6f44ef8e75a6ccfcfdc86c19e3a6f
                                      • Instruction ID: 8c1182f81441247f8bdf70ffc333d7de627ac004e89d796b877438f48b532967
                                      • Opcode Fuzzy Hash: 7d53b607085b7d3610ee87aa2d41c445eef6f44ef8e75a6ccfcfdc86c19e3a6f
                                      • Instruction Fuzzy Hash: A6219561650A0977F61479218D82FFF235CAE20398F544827FD0CAAA81F72DED5583BD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: NULL Pointer assignment$Not an Object type
                                      • API String ID: 0-572801152
                                      • Opcode ID: 14e81ad6aa309fb36b85da322cdce8b47933e75bd23a5b4841c02414b2bdcda8
                                      • Instruction ID: 7145fc80cf23ae31c0335effd7866888e62e3e02bb880759808bb3721cf415c9
                                      • Opcode Fuzzy Hash: 14e81ad6aa309fb36b85da322cdce8b47933e75bd23a5b4841c02414b2bdcda8
                                      • Instruction Fuzzy Hash: EAD1E371A0060AAFDF10CFA8C980BAEB7B5FF59304F14806AE915AB380E374DD45CB54
                                      APIs
                                      • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,004617FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 004615CE
                                      • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,004617FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00461651
                                      • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,004617FB,?,004617FB,00000000,00000000,?,00000000,?,?,?,?), ref: 004616E4
                                      • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,004617FB,00000000,00000000,?,00000000,?,?,?,?), ref: 004616FB
                                        • Part of subcall function 00453820: RtlAllocateHeap.NTDLL(00000000,?,004F1444,?,0043FDF5,?,?,0042A976,00000010,004F1440,004213FC,?,004213C6,?,00421129), ref: 00453852
                                      • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,004617FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00461777
                                      • __freea.LIBCMT ref: 004617A2
                                      • __freea.LIBCMT ref: 004617AE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                      • String ID:
                                      • API String ID: 2829977744-0
                                      • Opcode ID: 2389df38de1416c64d11ca6291093fee6dd364348eb7947c3f830de3caa32f31
                                      • Instruction ID: 0c3977db0187eaa3714440e9abc947447a31ed1e888733596a66854c4119b9de
                                      • Opcode Fuzzy Hash: 2389df38de1416c64d11ca6291093fee6dd364348eb7947c3f830de3caa32f31
                                      • Instruction Fuzzy Hash: FD91B471E00216ABDB208E65C881AEFBBB59F45314F1C465BE802E7261F739CD44CB6A
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Variant$ClearInit
                                      • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                      • API String ID: 2610073882-625585964
                                      • Opcode ID: 65bf68b0c17a58c3ff87e59d49310168b719a9373f7b73c369bc540d18cc3d87
                                      • Instruction ID: 2e98ec154a30a25a9474fd1a45db99cf22e8c5b377ce64b1aa993c8930b742f2
                                      • Opcode Fuzzy Hash: 65bf68b0c17a58c3ff87e59d49310168b719a9373f7b73c369bc540d18cc3d87
                                      • Instruction Fuzzy Hash: 4391B334A00215ABDF20CFA5C884FAFB7B8EFD6714F10855AF505AB281D7B89941CFA4
                                      APIs
                                      • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 0049125C
                                      • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00491284
                                      • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 004912A8
                                      • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 004912D8
                                      • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 0049135F
                                      • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 004913C4
                                      • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00491430
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ArraySafe$Data$Access$UnaccessVartype
                                      • String ID:
                                      • API String ID: 2550207440-0
                                      • Opcode ID: c5aab7c7c340e1480d7c63075f364fa3314840b5b0cc8ca3a28147e7fd3e4f41
                                      • Instruction ID: 9d022c636ff41d7259aa27df8603668a753854b4e99461b340388a5605d943e6
                                      • Opcode Fuzzy Hash: c5aab7c7c340e1480d7c63075f364fa3314840b5b0cc8ca3a28147e7fd3e4f41
                                      • Instruction Fuzzy Hash: 4E91C275A0021A9FEF009F95C885BBE7BB5FF48314F14407BE901EB2A1D778A941CB99
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ObjectSelect$BeginCreatePath
                                      • String ID:
                                      • API String ID: 3225163088-0
                                      • Opcode ID: a3abd98fb66e18bc0455fafe22fd54477256492348e6caf04fac0825479edea0
                                      • Instruction ID: 9db8cdb216f5efeaee49454a45a1c2bd6b28a9a08adadbd8b8e0ab16d02c4f0e
                                      • Opcode Fuzzy Hash: a3abd98fb66e18bc0455fafe22fd54477256492348e6caf04fac0825479edea0
                                      • Instruction Fuzzy Hash: 71911771D04219EFCB10CFA9C884AEEBBB8FF49320F14955AE515B7251D378AD82CB64
                                      APIs
                                      • VariantInit.OLEAUT32(?), ref: 004A396B
                                      • CharUpperBuffW.USER32(?,?), ref: 004A3A7A
                                      • _wcslen.LIBCMT ref: 004A3A8A
                                      • VariantClear.OLEAUT32(?), ref: 004A3C1F
                                        • Part of subcall function 00490CDF: VariantInit.OLEAUT32(00000000), ref: 00490D1F
                                        • Part of subcall function 00490CDF: VariantCopy.OLEAUT32(?,?), ref: 00490D28
                                        • Part of subcall function 00490CDF: VariantClear.OLEAUT32(?), ref: 00490D34
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                      • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                      • API String ID: 4137639002-1221869570
                                      • Opcode ID: 3f2cf1ba57e26a597ce0ed90bb40f77d12cf2913e3c72ed583895ac70f99c509
                                      • Instruction ID: f691192dc17508075fc939fe4e6d77cc2b5939a189b5a319429f79702050577d
                                      • Opcode Fuzzy Hash: 3f2cf1ba57e26a597ce0ed90bb40f77d12cf2913e3c72ed583895ac70f99c509
                                      • Instruction Fuzzy Hash: 71918C746083059FC700EF25C48096AB7E5FF99319F14886EF88997351EB38EE45CB9A
                                      APIs
                                        • Part of subcall function 0048000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0047FF41,80070057,?,?,?,0048035E), ref: 0048002B
                                        • Part of subcall function 0048000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0047FF41,80070057,?,?), ref: 00480046
                                        • Part of subcall function 0048000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0047FF41,80070057,?,?), ref: 00480054
                                        • Part of subcall function 0048000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0047FF41,80070057,?), ref: 00480064
                                      • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 004A4C51
                                      • _wcslen.LIBCMT ref: 004A4D59
                                      • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 004A4DCF
                                      • CoTaskMemFree.OLE32(?), ref: 004A4DDA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                      • String ID: NULL Pointer assignment
                                      • API String ID: 614568839-2785691316
                                      • Opcode ID: 1e3719f63b0d876ebe5452d6b1455f52e883dba1d66a8cd547c804dc6346db32
                                      • Instruction ID: 63b5bf5502287940d34635f8d6666354b9bdb87cd765cbbb8d83a298c2e3433c
                                      • Opcode Fuzzy Hash: 1e3719f63b0d876ebe5452d6b1455f52e883dba1d66a8cd547c804dc6346db32
                                      • Instruction Fuzzy Hash: C2915971D0022D9FDF10EFA5D880AEEB7B8BF49304F10856AE815A7241DB785E45CF64
                                      APIs
                                      • GetMenu.USER32(?), ref: 004B2183
                                      • GetMenuItemCount.USER32(00000000), ref: 004B21B5
                                      • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 004B21DD
                                      • _wcslen.LIBCMT ref: 004B2213
                                      • GetMenuItemID.USER32(?,?), ref: 004B224D
                                      • GetSubMenu.USER32(?,?), ref: 004B225B
                                        • Part of subcall function 00483A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00483A57
                                        • Part of subcall function 00483A3D: GetCurrentThreadId.KERNEL32 ref: 00483A5E
                                        • Part of subcall function 00483A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,004825B3), ref: 00483A65
                                      • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 004B22E3
                                        • Part of subcall function 0048E97B: Sleep.KERNEL32 ref: 0048E9F3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                      • String ID:
                                      • API String ID: 4196846111-0
                                      • Opcode ID: 962d203627fc265420a5dbe2ae4cd0137bf8d1233e6c4b06397c08628475bc04
                                      • Instruction ID: 9d37436190876bfbfb5dd21d343ebb4f9de92d6a0eb3ad90e3e2945c4d695983
                                      • Opcode Fuzzy Hash: 962d203627fc265420a5dbe2ae4cd0137bf8d1233e6c4b06397c08628475bc04
                                      • Instruction Fuzzy Hash: 8771A275E00215AFCB14DF69C985AEEB7F1EF48314F10849AE816EB341D778ED428BA4
                                      APIs
                                      • GetParent.USER32(?), ref: 0048AEF9
                                      • GetKeyboardState.USER32(?), ref: 0048AF0E
                                      • SetKeyboardState.USER32(?), ref: 0048AF6F
                                      • PostMessageW.USER32(?,00000101,00000010,?), ref: 0048AF9D
                                      • PostMessageW.USER32(?,00000101,00000011,?), ref: 0048AFBC
                                      • PostMessageW.USER32(?,00000101,00000012,?), ref: 0048AFFD
                                      • PostMessageW.USER32(?,00000101,0000005B,?), ref: 0048B020
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: MessagePost$KeyboardState$Parent
                                      • String ID:
                                      • API String ID: 87235514-0
                                      • Opcode ID: 353b4c5547c61892cc1a01d10b6c535a4bb7e1b16fc27a36de4cf509698dd9a9
                                      • Instruction ID: 5f6f96bfcd7d6069d0eb18a9ce637b0d3b0b6833741ad906bd86fa18f3ab97f4
                                      • Opcode Fuzzy Hash: 353b4c5547c61892cc1a01d10b6c535a4bb7e1b16fc27a36de4cf509698dd9a9
                                      • Instruction Fuzzy Hash: E451E2A0A047D13DFB3662348845BBFBEA99B06304F088D8BE2D5555C2D3DCA8D4D799
                                      APIs
                                      • GetParent.USER32(00000000), ref: 0048AD19
                                      • GetKeyboardState.USER32(?), ref: 0048AD2E
                                      • SetKeyboardState.USER32(?), ref: 0048AD8F
                                      • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 0048ADBB
                                      • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 0048ADD8
                                      • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 0048AE17
                                      • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 0048AE38
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: MessagePost$KeyboardState$Parent
                                      • String ID:
                                      • API String ID: 87235514-0
                                      • Opcode ID: 2c9818f71344e0ccc1137b930d208bdf21072f8fe437fe64a2b9bb71dc7a03af
                                      • Instruction ID: b7a618a5c98ef17c9a5c98377eac78a5a7f1dc95f86938f7a933deecec05cbcf
                                      • Opcode Fuzzy Hash: 2c9818f71344e0ccc1137b930d208bdf21072f8fe437fe64a2b9bb71dc7a03af
                                      • Instruction Fuzzy Hash: 7651E3A05447D13DFB32A2248C85B7FBED95B05301F088D8BE1D5869C2C3D8ACA8D75A
                                      APIs
                                      • GetConsoleCP.KERNEL32(00463CD6,?,?,?,?,?,?,?,?,00455BA3,?,?,00463CD6,?,?), ref: 00455470
                                      • __fassign.LIBCMT ref: 004554EB
                                      • __fassign.LIBCMT ref: 00455506
                                      • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00463CD6,00000005,00000000,00000000), ref: 0045552C
                                      • WriteFile.KERNEL32(?,00463CD6,00000000,00455BA3,00000000,?,?,?,?,?,?,?,?,?,00455BA3,?), ref: 0045554B
                                      • WriteFile.KERNEL32(?,?,00000001,00455BA3,00000000,?,?,?,?,?,?,?,?,?,00455BA3,?), ref: 00455584
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                      • String ID:
                                      • API String ID: 1324828854-0
                                      • Opcode ID: 9e8a69dd4787431b915cabe45a6e977eaa48928a237a9770a7e6f6e4d3d434a7
                                      • Instruction ID: 7857c19f1e9ab352ca2ac924b2e0c20065e7a1ded79c89eca5170c348a9c590b
                                      • Opcode Fuzzy Hash: 9e8a69dd4787431b915cabe45a6e977eaa48928a237a9770a7e6f6e4d3d434a7
                                      • Instruction Fuzzy Hash: 8251E8B0900649AFDB10CFA8D891AFEBBF5EF09301F14412BF955E7292E7349A45CB64
                                      APIs
                                        • Part of subcall function 004A304E: inet_addr.WSOCK32(?), ref: 004A307A
                                        • Part of subcall function 004A304E: _wcslen.LIBCMT ref: 004A309B
                                      • socket.WSOCK32(00000002,00000001,00000006), ref: 004A1112
                                      • WSAGetLastError.WSOCK32 ref: 004A1121
                                      • WSAGetLastError.WSOCK32 ref: 004A11C9
                                      • closesocket.WSOCK32(00000000), ref: 004A11F9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                      • String ID:
                                      • API String ID: 2675159561-0
                                      • Opcode ID: 3741b5adc8bb47ded1506396d380caf5450d009170dbc5f82c670e6cbfc79893
                                      • Instruction ID: fc188b51260ba0a8c38eefb33624ec9d2db336a970aa17ed96534c70c903cba8
                                      • Opcode Fuzzy Hash: 3741b5adc8bb47ded1506396d380caf5450d009170dbc5f82c670e6cbfc79893
                                      • Instruction Fuzzy Hash: 32412931200114AFDB109F14C8C4BAAB7E9EF5A358F14815AFD059B391D778ED41CBE9
                                      APIs
                                        • Part of subcall function 0048DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0048CF22,?), ref: 0048DDFD
                                        • Part of subcall function 0048DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0048CF22,?), ref: 0048DE16
                                      • lstrcmpiW.KERNEL32(?,?), ref: 0048CF45
                                      • MoveFileW.KERNEL32(?,?), ref: 0048CF7F
                                      • _wcslen.LIBCMT ref: 0048D005
                                      • _wcslen.LIBCMT ref: 0048D01B
                                      • SHFileOperationW.SHELL32(?), ref: 0048D061
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                      • String ID: \*.*
                                      • API String ID: 3164238972-1173974218
                                      • Opcode ID: adfb0a64dc75d8b10bd21107e8c8082dff19a14f3d8d2cf59f26608f49a1994a
                                      • Instruction ID: 6384eaf3ca9ca5c9d8ea3072bd62a16a53c4306d7454dcce828da671608179bb
                                      • Opcode Fuzzy Hash: adfb0a64dc75d8b10bd21107e8c8082dff19a14f3d8d2cf59f26608f49a1994a
                                      • Instruction Fuzzy Hash: 42414471D052185FDF12FBA5D9C1ADE77B8AF04384F1004EBA605EB141EB38AA85CB58
                                      APIs
                                      • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 004B2E1C
                                      • GetWindowLongW.USER32(?,000000F0), ref: 004B2E4F
                                      • GetWindowLongW.USER32(?,000000F0), ref: 004B2E84
                                      • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 004B2EB6
                                      • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 004B2EE0
                                      • GetWindowLongW.USER32(?,000000F0), ref: 004B2EF1
                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004B2F0B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: LongWindow$MessageSend
                                      • String ID:
                                      • API String ID: 2178440468-0
                                      • Opcode ID: a04485f467e6f40779985848d69ac8c8b75b0c6352e861a65ecd16f8a7318bff
                                      • Instruction ID: 7d879b14d72dd1b7cfb8b19e780b0303e7810c265dcf4c0a8b5384e7aa31c4ae
                                      • Opcode Fuzzy Hash: a04485f467e6f40779985848d69ac8c8b75b0c6352e861a65ecd16f8a7318bff
                                      • Instruction Fuzzy Hash: 5C31F230604250AFDB218F59DDC4FA637E5EBAA710F150166F9048B2B1CBB5E850DB69
                                      APIs
                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00487769
                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0048778F
                                      • SysAllocString.OLEAUT32(00000000), ref: 00487792
                                      • SysAllocString.OLEAUT32(?), ref: 004877B0
                                      • SysFreeString.OLEAUT32(?), ref: 004877B9
                                      • StringFromGUID2.OLE32(?,?,00000028), ref: 004877DE
                                      • SysAllocString.OLEAUT32(?), ref: 004877EC
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                      • String ID:
                                      • API String ID: 3761583154-0
                                      • Opcode ID: 1494360375da68cf0b8721f606c38bda96e22d9de525c1d31cec5b7859257f49
                                      • Instruction ID: e165aaae60e89b09778bb666a4000c1f468bf3329cd5f08815febd8778a10a16
                                      • Opcode Fuzzy Hash: 1494360375da68cf0b8721f606c38bda96e22d9de525c1d31cec5b7859257f49
                                      • Instruction Fuzzy Hash: 7E21A176604219AFDB10EFA8CC88CBF77ACEB09764B148536B914DB250D674ED41CB68
                                      APIs
                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00487842
                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00487868
                                      • SysAllocString.OLEAUT32(00000000), ref: 0048786B
                                      • SysAllocString.OLEAUT32 ref: 0048788C
                                      • SysFreeString.OLEAUT32 ref: 00487895
                                      • StringFromGUID2.OLE32(?,?,00000028), ref: 004878AF
                                      • SysAllocString.OLEAUT32(?), ref: 004878BD
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                      • String ID:
                                      • API String ID: 3761583154-0
                                      • Opcode ID: 081c19e35a206fb32eaa4b7f6110c762b23754a292afe8368ba1c6d508ef6455
                                      • Instruction ID: 5c37bfb3c0aa21ed01384b14e79359dee0b98b2736d20ef5c9fe5b4f5e0a550e
                                      • Opcode Fuzzy Hash: 081c19e35a206fb32eaa4b7f6110c762b23754a292afe8368ba1c6d508ef6455
                                      • Instruction Fuzzy Hash: D4218131608104AF9B10BBA8DCD8DAB77ACEB083607208536B915CB2A1DA74DC45CB68
                                      APIs
                                      • GetStdHandle.KERNEL32(0000000C), ref: 004904F2
                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 0049052E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: CreateHandlePipe
                                      • String ID: nul
                                      • API String ID: 1424370930-2873401336
                                      • Opcode ID: 59fa1aa536f28aba27fd3fd65d7e1a15bf44ad6a1777931dc950058d3aff0edf
                                      • Instruction ID: ef9868e18a876d0f9b68340b4e915a7ae302d954e49aadef16c7fdefad09a77e
                                      • Opcode Fuzzy Hash: 59fa1aa536f28aba27fd3fd65d7e1a15bf44ad6a1777931dc950058d3aff0edf
                                      • Instruction Fuzzy Hash: 45216075500305AFDF209F29DC44A9A7BB8AF44774F614A3AF8A1D62E0D774D940CF28
                                      APIs
                                      • GetStdHandle.KERNEL32(000000F6), ref: 004905C6
                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00490601
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: CreateHandlePipe
                                      • String ID: nul
                                      • API String ID: 1424370930-2873401336
                                      • Opcode ID: 66b28b1e7b7a336c309193bd51ece1aa954d7ea096c5a1f863ccb65364181d9d
                                      • Instruction ID: b3e0fa8d79786bc98b47d794294ab0c54523cf83d0122e44d48857516d8f5ad5
                                      • Opcode Fuzzy Hash: 66b28b1e7b7a336c309193bd51ece1aa954d7ea096c5a1f863ccb65364181d9d
                                      • Instruction Fuzzy Hash: CC214175500305AFDF209F699C44A5A7BE8AF95724F200B3AE8A1E72D0D7749D61CB28
                                      APIs
                                        • Part of subcall function 0042600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0042604C
                                        • Part of subcall function 0042600E: GetStockObject.GDI32(00000011), ref: 00426060
                                        • Part of subcall function 0042600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0042606A
                                      • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 004B4112
                                      • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 004B411F
                                      • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 004B412A
                                      • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 004B4139
                                      • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 004B4145
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: MessageSend$CreateObjectStockWindow
                                      • String ID: Msctls_Progress32
                                      • API String ID: 1025951953-3636473452
                                      • Opcode ID: 2f8a4387596836db87d39fc656b16d4f678fea8cf1198189dc8b6c098d2f06b5
                                      • Instruction ID: 9bd20f14e30e053c0eb208ca3883fec397afd26c4a207c52fb60da249d928866
                                      • Opcode Fuzzy Hash: 2f8a4387596836db87d39fc656b16d4f678fea8cf1198189dc8b6c098d2f06b5
                                      • Instruction Fuzzy Hash: 6411B2B2150219BEEF119F65CC85EE77F5DEF18798F014111BA18A2150C7769C21DBB8
                                      APIs
                                        • Part of subcall function 0045D7A3: _free.LIBCMT ref: 0045D7CC
                                      • _free.LIBCMT ref: 0045D82D
                                        • Part of subcall function 004529C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0045D7D1,00000000,00000000,00000000,00000000,?,0045D7F8,00000000,00000007,00000000,?,0045DBF5,00000000), ref: 004529DE
                                        • Part of subcall function 004529C8: GetLastError.KERNEL32(00000000,?,0045D7D1,00000000,00000000,00000000,00000000,?,0045D7F8,00000000,00000007,00000000,?,0045DBF5,00000000,00000000), ref: 004529F0
                                      • _free.LIBCMT ref: 0045D838
                                      • _free.LIBCMT ref: 0045D843
                                      • _free.LIBCMT ref: 0045D897
                                      • _free.LIBCMT ref: 0045D8A2
                                      • _free.LIBCMT ref: 0045D8AD
                                      • _free.LIBCMT ref: 0045D8B8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: _free$ErrorFreeHeapLast
                                      • String ID:
                                      • API String ID: 776569668-0
                                      • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                      • Instruction ID: 7ebe28a4b932df604b2a01c0e88d73bd6913986368dff43e5c020669f9e2aea6
                                      • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                      • Instruction Fuzzy Hash: FA1172B1940704ABD531BFB2CC07FCB7BDCAF05706F40081FBA99A6593D668B5094654
                                      APIs
                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 0048DA74
                                      • LoadStringW.USER32(00000000), ref: 0048DA7B
                                      • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0048DA91
                                      • LoadStringW.USER32(00000000), ref: 0048DA98
                                      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0048DADC
                                      Strings
                                      • %s (%d) : ==> %s: %s %s, xrefs: 0048DAB9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: HandleLoadModuleString$Message
                                      • String ID: %s (%d) : ==> %s: %s %s
                                      • API String ID: 4072794657-3128320259
                                      • Opcode ID: e74618ff28edf0ad9e8d318caa3e5aef9ac54d9f8af3514a1cacfd054bab3e55
                                      • Instruction ID: 8394a59882f0aec3ed402bef922e7f39affd9d41ebd827bd3191f98361928728
                                      • Opcode Fuzzy Hash: e74618ff28edf0ad9e8d318caa3e5aef9ac54d9f8af3514a1cacfd054bab3e55
                                      • Instruction Fuzzy Hash: 15018BF29002087FE711A7A49DC9EFB376CE708301F444966B705E2041E6749D844F7C
                                      APIs
                                      • InterlockedExchange.KERNEL32(0105B2B8,0105B2B8), ref: 0049097B
                                      • EnterCriticalSection.KERNEL32(0105B298,00000000), ref: 0049098D
                                      • TerminateThread.KERNEL32(?,000001F6), ref: 0049099B
                                      • WaitForSingleObject.KERNEL32(?,000003E8), ref: 004909A9
                                      • CloseHandle.KERNEL32(?), ref: 004909B8
                                      • InterlockedExchange.KERNEL32(0105B2B8,000001F6), ref: 004909C8
                                      • LeaveCriticalSection.KERNEL32(0105B298), ref: 004909CF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                      • String ID:
                                      • API String ID: 3495660284-0
                                      • Opcode ID: 263ad72b44c6f5e2cdebd56c776ce216e01e2eb32a3df0d7edbf50ba13c4061f
                                      • Instruction ID: 39bbb044e70190a3077d21fc97cb3f7e94cd35b26a462ed050e6a45f9ce8176b
                                      • Opcode Fuzzy Hash: 263ad72b44c6f5e2cdebd56c776ce216e01e2eb32a3df0d7edbf50ba13c4061f
                                      • Instruction Fuzzy Hash: D3F01D71442512ABDB455F94EEC8AD67A25BF01702F402136F101508A0C7749865CF98
                                      APIs
                                      • __WSAFDIsSet.WSOCK32(00000000,?), ref: 004A1DC0
                                      • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 004A1DE1
                                      • WSAGetLastError.WSOCK32 ref: 004A1DF2
                                      • htons.WSOCK32(?), ref: 004A1EDB
                                      • inet_ntoa.WSOCK32(?), ref: 004A1E8C
                                        • Part of subcall function 004839E8: _strlen.LIBCMT ref: 004839F2
                                        • Part of subcall function 004A3224: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,0049EC0C), ref: 004A3240
                                      • _strlen.LIBCMT ref: 004A1F35
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                      • String ID:
                                      • API String ID: 3203458085-0
                                      • Opcode ID: 85856ee1152df60e4148afefc264ba16b1bbd1acc8addb12a1de81f7cd9a4630
                                      • Instruction ID: 8ee84f1193e7e779f757c6a0412f236332ca8e7f27b8f97d43083de16caee85c
                                      • Opcode Fuzzy Hash: 85856ee1152df60e4148afefc264ba16b1bbd1acc8addb12a1de81f7cd9a4630
                                      • Instruction Fuzzy Hash: 8FB1EF30204340AFC324EF25C885E2A7BA5AF95318F94895EF4565B3E2CB39ED42CB95
                                      APIs
                                      • GetClientRect.USER32(?,?), ref: 00425D30
                                      • GetWindowRect.USER32(?,?), ref: 00425D71
                                      • ScreenToClient.USER32(?,?), ref: 00425D99
                                      • GetClientRect.USER32(?,?), ref: 00425ED7
                                      • GetWindowRect.USER32(?,?), ref: 00425EF8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Rect$Client$Window$Screen
                                      • String ID:
                                      • API String ID: 1296646539-0
                                      • Opcode ID: 8361f4efd6a044ec2349a7a98675ff2f524c9427a8456ace4c7383762fe15516
                                      • Instruction ID: c26a7c2ae5925e12eb3a4a98b3e87570540af974ab8fce6b8541e9ba10607644
                                      • Opcode Fuzzy Hash: 8361f4efd6a044ec2349a7a98675ff2f524c9427a8456ace4c7383762fe15516
                                      • Instruction Fuzzy Hash: D8B17B78A0064ADBDB10DFB8D4807EEB7F1FF54310F14851AE8A9D7250EB38AA51CB59
                                      APIs
                                      • __allrem.LIBCMT ref: 004500BA
                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004500D6
                                      • __allrem.LIBCMT ref: 004500ED
                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0045010B
                                      • __allrem.LIBCMT ref: 00450122
                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00450140
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                      • String ID:
                                      • API String ID: 1992179935-0
                                      • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                      • Instruction ID: dc5ed7609d7154a7c934bbac290a4fb3292000be86ed376792d00c3b1cee6279
                                      • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                      • Instruction Fuzzy Hash: 55810776A00B069BE7209E29CC41B6B73E8AF41729F24413FF851D77C2E779D9088799
                                      APIs
                                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,004482D9,004482D9,?,?,?,0045644F,00000001,00000001,8BE85006), ref: 00456258
                                      • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,0045644F,00000001,00000001,8BE85006,?,?,?), ref: 004562DE
                                      • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 004563D8
                                      • __freea.LIBCMT ref: 004563E5
                                        • Part of subcall function 00453820: RtlAllocateHeap.NTDLL(00000000,?,004F1444,?,0043FDF5,?,?,0042A976,00000010,004F1440,004213FC,?,004213C6,?,00421129), ref: 00453852
                                      • __freea.LIBCMT ref: 004563EE
                                      • __freea.LIBCMT ref: 00456413
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ByteCharMultiWide__freea$AllocateHeap
                                      • String ID:
                                      • API String ID: 1414292761-0
                                      • Opcode ID: 9529f64dfbe5dabeee30fadf127e8547f8bc879d6560ae43f0470961db2652d6
                                      • Instruction ID: 609a4fa9ac82a154296dc9237437ce9f36fc3cad8341b55943872cdd9d82cdb4
                                      • Opcode Fuzzy Hash: 9529f64dfbe5dabeee30fadf127e8547f8bc879d6560ae43f0470961db2652d6
                                      • Instruction Fuzzy Hash: FA512772600216ABDB259F64CC81EBF77A9EF44752F56422AFC05D7242EB38DC48C668
                                      APIs
                                        • Part of subcall function 00429CB3: _wcslen.LIBCMT ref: 00429CBD
                                        • Part of subcall function 004AC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,004AB6AE,?,?), ref: 004AC9B5
                                        • Part of subcall function 004AC998: _wcslen.LIBCMT ref: 004AC9F1
                                        • Part of subcall function 004AC998: _wcslen.LIBCMT ref: 004ACA68
                                        • Part of subcall function 004AC998: _wcslen.LIBCMT ref: 004ACA9E
                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004ABCCA
                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004ABD25
                                      • RegCloseKey.ADVAPI32(00000000), ref: 004ABD6A
                                      • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 004ABD99
                                      • RegCloseKey.ADVAPI32(?,?,00000000), ref: 004ABDF3
                                      • RegCloseKey.ADVAPI32(?), ref: 004ABDFF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                      • String ID:
                                      • API String ID: 1120388591-0
                                      • Opcode ID: c4953ac780050fd56199e9eac78ba601aecd603ed71ccb52dc086d94b7cf6052
                                      • Instruction ID: 3e1da3b602baeb096b8a096becfc9b490c217cf9be8507669ba474de1be074da
                                      • Opcode Fuzzy Hash: c4953ac780050fd56199e9eac78ba601aecd603ed71ccb52dc086d94b7cf6052
                                      • Instruction Fuzzy Hash: 5F81BE70208241AFD714DF25C881E2BBBE5FF85308F54896EF4594B2A2CB35ED45CB96
                                      APIs
                                      • VariantInit.OLEAUT32(00000035), ref: 0047F7B9
                                      • SysAllocString.OLEAUT32(00000001), ref: 0047F860
                                      • VariantCopy.OLEAUT32(0047FA64,00000000), ref: 0047F889
                                      • VariantClear.OLEAUT32(0047FA64), ref: 0047F8AD
                                      • VariantCopy.OLEAUT32(0047FA64,00000000), ref: 0047F8B1
                                      • VariantClear.OLEAUT32(?), ref: 0047F8BB
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Variant$ClearCopy$AllocInitString
                                      • String ID:
                                      • API String ID: 3859894641-0
                                      • Opcode ID: 0edc39368372805a216bb51bfb148b6a52b00fb77a6c411c7d0ccf4bcfd87d8f
                                      • Instruction ID: d95c8da53cece258f558205d4a36e978a6d0fdaa50631603717000ccf66c0058
                                      • Opcode Fuzzy Hash: 0edc39368372805a216bb51bfb148b6a52b00fb77a6c411c7d0ccf4bcfd87d8f
                                      • Instruction Fuzzy Hash: 4A51D9B1600310BACF20AB66D4957A9B3A4EF45314F14D46BE909EF291D7788C45C7AF
                                      APIs
                                        • Part of subcall function 00427620: _wcslen.LIBCMT ref: 00427625
                                        • Part of subcall function 00426B57: _wcslen.LIBCMT ref: 00426B6A
                                      • GetOpenFileNameW.COMDLG32(00000058), ref: 004994E5
                                      • _wcslen.LIBCMT ref: 00499506
                                      • _wcslen.LIBCMT ref: 0049952D
                                      • GetSaveFileNameW.COMDLG32(00000058), ref: 00499585
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: _wcslen$FileName$OpenSave
                                      • String ID: X
                                      • API String ID: 83654149-3081909835
                                      • Opcode ID: 45a7ce74aeb0aa0e994221af3f628c1015db5d1dd77df3282601855812240ff8
                                      • Instruction ID: db7880caed7ca69d2a39202bcc728cedaa3070b8a80573d26fee2f43182ba300
                                      • Opcode Fuzzy Hash: 45a7ce74aeb0aa0e994221af3f628c1015db5d1dd77df3282601855812240ff8
                                      • Instruction Fuzzy Hash: 21E1B4316043109FDB24DF25D481A6AB7E4BF85318F04896EF8899B392DB39DD05CB9A
                                      APIs
                                        • Part of subcall function 00439BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00439BB2
                                      • BeginPaint.USER32(?,?,?), ref: 00439241
                                      • GetWindowRect.USER32(?,?), ref: 004392A5
                                      • ScreenToClient.USER32(?,?), ref: 004392C2
                                      • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 004392D3
                                      • EndPaint.USER32(?,?,?,?,?), ref: 00439321
                                      • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 004771EA
                                        • Part of subcall function 00439339: BeginPath.GDI32(00000000), ref: 00439357
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                      • String ID:
                                      • API String ID: 3050599898-0
                                      • Opcode ID: bd3b406c11ed6788bc805e61fca317a4bd77c258fdada7f4f0cbaab4919037ae
                                      • Instruction ID: a052bafbaabb3243e4b2ca14dab2ae75c95ecfe0de31980b51631c2ab50d17ce
                                      • Opcode Fuzzy Hash: bd3b406c11ed6788bc805e61fca317a4bd77c258fdada7f4f0cbaab4919037ae
                                      • Instruction Fuzzy Hash: 4B41BC70104200AFD720DF25C8C4FBB7BA8EB49324F04066AF9A4872B1C7B59C45CBAA
                                      APIs
                                      • InterlockedExchange.KERNEL32(?,000001F5), ref: 0049080C
                                      • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00490847
                                      • EnterCriticalSection.KERNEL32(?), ref: 00490863
                                      • LeaveCriticalSection.KERNEL32(?), ref: 004908DC
                                      • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 004908F3
                                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 00490921
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                      • String ID:
                                      • API String ID: 3368777196-0
                                      • Opcode ID: 138b3f4d6b753ec16a40954bfee335736710627eaceb251b928e52269d692def
                                      • Instruction ID: 58c92ad0d55b50098961998481d6646f72c02c1413894c84e84d3dab9ee7b2c5
                                      • Opcode Fuzzy Hash: 138b3f4d6b753ec16a40954bfee335736710627eaceb251b928e52269d692def
                                      • Instruction Fuzzy Hash: 7E415871A00205EFDF14AF55DCC5A6ABB78FF04304F1440BAED00AA296DB34DE64DBA8
                                      APIs
                                      • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,0047F3AB,00000000,?,?,00000000,?,0047682C,00000004,00000000,00000000), ref: 004B824C
                                      • EnableWindow.USER32(?,00000000), ref: 004B8272
                                      • ShowWindow.USER32(FFFFFFFF,00000000), ref: 004B82D1
                                      • ShowWindow.USER32(?,00000004), ref: 004B82E5
                                      • EnableWindow.USER32(?,00000001), ref: 004B830B
                                      • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 004B832F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Window$Show$Enable$MessageSend
                                      • String ID:
                                      • API String ID: 642888154-0
                                      • Opcode ID: 1c2dda91cbecc5ce709a4c3bf2a7df5c759171c2b1326be84cb9ae823227aa57
                                      • Instruction ID: 963522e95a701a7e52bbb12b9393839bb6cd1db03a16ee78f48389ca045d3f4e
                                      • Opcode Fuzzy Hash: 1c2dda91cbecc5ce709a4c3bf2a7df5c759171c2b1326be84cb9ae823227aa57
                                      • Instruction Fuzzy Hash: 7C41A034601644EFDB15CF15C899FE57BE4FB0A714F1812BEE9084B272CB76A851CB68
                                      APIs
                                      • IsWindowVisible.USER32(?), ref: 00484C95
                                      • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00484CB2
                                      • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00484CEA
                                      • _wcslen.LIBCMT ref: 00484D08
                                      • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00484D10
                                      • _wcsstr.LIBVCRUNTIME ref: 00484D1A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                      • String ID:
                                      • API String ID: 72514467-0
                                      • Opcode ID: 1457ceacedf8d43beb1cc2aa59e5bb40e41ec8e7d74b38460e5f36e96ab9ae30
                                      • Instruction ID: 98730f1a4ca9ca88a19cfc9a3fb867d3a9c3ec0d231a17c56c8f42c5e871542d
                                      • Opcode Fuzzy Hash: 1457ceacedf8d43beb1cc2aa59e5bb40e41ec8e7d74b38460e5f36e96ab9ae30
                                      • Instruction Fuzzy Hash: 7F21F8726041017BEB156B369C45E7F7BDCDF89754F10443FF805CA291EA69DC0193A4
                                      APIs
                                        • Part of subcall function 00423AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00423A97,?,?,00422E7F,?,?,?,00000000), ref: 00423AC2
                                      • _wcslen.LIBCMT ref: 0049587B
                                      • CoInitialize.OLE32(00000000), ref: 00495995
                                      • CoCreateInstance.OLE32(004BFCF8,00000000,00000001,004BFB68,?), ref: 004959AE
                                      • CoUninitialize.OLE32 ref: 004959CC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                      • String ID: .lnk
                                      • API String ID: 3172280962-24824748
                                      • Opcode ID: 62957938a39fff87f4f5ff6cd48107409255f8df5ca92595183e97a811950d60
                                      • Instruction ID: adfb62f3290bfc1556189cad8d360cfa6b53cfdaf28da078ac44933ff0ced3d6
                                      • Opcode Fuzzy Hash: 62957938a39fff87f4f5ff6cd48107409255f8df5ca92595183e97a811950d60
                                      • Instruction Fuzzy Hash: 18D165716046119FCB04DF25C480A2ABBE1FF89718F24486EF8899B361D739EC45CB9A
                                      APIs
                                        • Part of subcall function 00480FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00480FCA
                                        • Part of subcall function 00480FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00480FD6
                                        • Part of subcall function 00480FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00480FE5
                                        • Part of subcall function 00480FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00480FEC
                                        • Part of subcall function 00480FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00481002
                                      • GetLengthSid.ADVAPI32(?,00000000,00481335), ref: 004817AE
                                      • GetProcessHeap.KERNEL32(00000008,00000000), ref: 004817BA
                                      • HeapAlloc.KERNEL32(00000000), ref: 004817C1
                                      • CopySid.ADVAPI32(00000000,00000000,?), ref: 004817DA
                                      • GetProcessHeap.KERNEL32(00000000,00000000,00481335), ref: 004817EE
                                      • HeapFree.KERNEL32(00000000), ref: 004817F5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                      • String ID:
                                      • API String ID: 3008561057-0
                                      • Opcode ID: 37cbae08b2ffe0f57851e00ccb0d7f2cbdcddb1b37132176c1d0bb22d86236a1
                                      • Instruction ID: 4c9a22716ad8f7b430c5a2f1327a400b68b454b97824dfed704e6d5cf0a019f9
                                      • Opcode Fuzzy Hash: 37cbae08b2ffe0f57851e00ccb0d7f2cbdcddb1b37132176c1d0bb22d86236a1
                                      • Instruction Fuzzy Hash: 0511AF71900205EFDB10AFA8DCC9BAFBBADEB41355F10492FF441A7220C739A945CB68
                                      APIs
                                      • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 004814FF
                                      • OpenProcessToken.ADVAPI32(00000000), ref: 00481506
                                      • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00481515
                                      • CloseHandle.KERNEL32(00000004), ref: 00481520
                                      • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0048154F
                                      • DestroyEnvironmentBlock.USERENV(00000000), ref: 00481563
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                      • String ID:
                                      • API String ID: 1413079979-0
                                      • Opcode ID: 8d88a2c664c7f4472ff8c86a6f7ff9c77e37bc6d690ddbf5fd0df63053d32c3a
                                      • Instruction ID: 6ec0156a5150b0eaf5dbbba1108090e6a021894f8180584caaeaa4b279d3cc81
                                      • Opcode Fuzzy Hash: 8d88a2c664c7f4472ff8c86a6f7ff9c77e37bc6d690ddbf5fd0df63053d32c3a
                                      • Instruction Fuzzy Hash: 99115972504209ABDF119F98DE89FDE7BADEF48744F044126FA05A2160C3758E61DB64
                                      APIs
                                      • GetLastError.KERNEL32(?,?,00443379,00442FE5), ref: 00443390
                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0044339E
                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 004433B7
                                      • SetLastError.KERNEL32(00000000,?,00443379,00442FE5), ref: 00443409
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ErrorLastValue___vcrt_
                                      • String ID:
                                      • API String ID: 3852720340-0
                                      • Opcode ID: 1f5251aa52688d34eace88bea1e00a3135195cdef55b0d996821bb89d51eb76d
                                      • Instruction ID: dd18933cf4287b7b00d4be7af2c0977fee4b0049e3697695e8be95994c39331c
                                      • Opcode Fuzzy Hash: 1f5251aa52688d34eace88bea1e00a3135195cdef55b0d996821bb89d51eb76d
                                      • Instruction Fuzzy Hash: 5C01B533609712AFB6292FB56CC56572A94EB05F7B720023FF820852F3EF194E12554C
                                      APIs
                                      • GetLastError.KERNEL32(?,?,00455686,00463CD6,?,00000000,?,00455B6A,?,?,?,?,?,0044E6D1,?,004E8A48), ref: 00452D78
                                      • _free.LIBCMT ref: 00452DAB
                                      • _free.LIBCMT ref: 00452DD3
                                      • SetLastError.KERNEL32(00000000,?,?,?,?,0044E6D1,?,004E8A48,00000010,00424F4A,?,?,00000000,00463CD6), ref: 00452DE0
                                      • SetLastError.KERNEL32(00000000,?,?,?,?,0044E6D1,?,004E8A48,00000010,00424F4A,?,?,00000000,00463CD6), ref: 00452DEC
                                      • _abort.LIBCMT ref: 00452DF2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ErrorLast$_free$_abort
                                      • String ID:
                                      • API String ID: 3160817290-0
                                      • Opcode ID: 764594d53dc65ec72285fa3b04111a4fe4225b10fc3c7e614303559827b190e5
                                      • Instruction ID: 75ba0f4d5ba33e73fb9a2ab37e386690081dba7e2fdbe2cac518c3f97916d71a
                                      • Opcode Fuzzy Hash: 764594d53dc65ec72285fa3b04111a4fe4225b10fc3c7e614303559827b190e5
                                      • Instruction Fuzzy Hash: 19F0A93254490027C25227356E46E5B26656FC37ABF25452FFC2496293DFAC880E416D
                                      APIs
                                        • Part of subcall function 00439639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00439693
                                        • Part of subcall function 00439639: SelectObject.GDI32(?,00000000), ref: 004396A2
                                        • Part of subcall function 00439639: BeginPath.GDI32(?), ref: 004396B9
                                        • Part of subcall function 00439639: SelectObject.GDI32(?,00000000), ref: 004396E2
                                      • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 004B8A4E
                                      • LineTo.GDI32(?,00000003,00000000), ref: 004B8A62
                                      • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 004B8A70
                                      • LineTo.GDI32(?,00000000,00000003), ref: 004B8A80
                                      • EndPath.GDI32(?), ref: 004B8A90
                                      • StrokePath.GDI32(?), ref: 004B8AA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                      • String ID:
                                      • API String ID: 43455801-0
                                      • Opcode ID: 89c87c682785509f4b5c63dd9a876a6b279aacb30d20a9af0cb896223f30c3c8
                                      • Instruction ID: 023927b94f1a1aa63a5d690f656a135f3f775b83a35901e6f78d69a93d31bde7
                                      • Opcode Fuzzy Hash: 89c87c682785509f4b5c63dd9a876a6b279aacb30d20a9af0cb896223f30c3c8
                                      • Instruction Fuzzy Hash: 63110576400109FFEB129F94DC88EAA7F6CEB08354F008126BA199A1A1C7719D55DFA4
                                      APIs
                                      • GetDC.USER32(00000000), ref: 00485218
                                      • GetDeviceCaps.GDI32(00000000,00000058), ref: 00485229
                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00485230
                                      • ReleaseDC.USER32(00000000,00000000), ref: 00485238
                                      • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0048524F
                                      • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00485261
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: CapsDevice$Release
                                      • String ID:
                                      • API String ID: 1035833867-0
                                      • Opcode ID: 1954bfa46dface1e3abe3a67b4671f5faf8fe0b32790f7ee80cd116df5c8e259
                                      • Instruction ID: adc0572544aa26c001e2c895ac7b5876269b25c3ee56db803b7af235ecbaecb3
                                      • Opcode Fuzzy Hash: 1954bfa46dface1e3abe3a67b4671f5faf8fe0b32790f7ee80cd116df5c8e259
                                      • Instruction Fuzzy Hash: 14014475E00714BBEB106BA99C89E5EBFB8EB44751F044566FA04A7281DA709801CFA4
                                      APIs
                                      • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00421BF4
                                      • MapVirtualKeyW.USER32(00000010,00000000), ref: 00421BFC
                                      • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00421C07
                                      • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00421C12
                                      • MapVirtualKeyW.USER32(00000011,00000000), ref: 00421C1A
                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00421C22
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Virtual
                                      • String ID:
                                      • API String ID: 4278518827-0
                                      • Opcode ID: 6617e602e44aeee31bd09277525d3aff926be396c2926abe7a052b06bdfa4026
                                      • Instruction ID: f57bb350fa915c8d6b9f2a984555eae65bbcd05260944d52ec595473fd2ec07c
                                      • Opcode Fuzzy Hash: 6617e602e44aeee31bd09277525d3aff926be396c2926abe7a052b06bdfa4026
                                      • Instruction Fuzzy Hash: E10167B0902B5ABDE3008F6A8C85B52FFA8FF19354F00411BA15C4BA42C7F5A864CBE5
                                      APIs
                                      • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 0048EB30
                                      • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0048EB46
                                      • GetWindowThreadProcessId.USER32(?,?), ref: 0048EB55
                                      • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0048EB64
                                      • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0048EB6E
                                      • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0048EB75
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                      • String ID:
                                      • API String ID: 839392675-0
                                      • Opcode ID: 156ad284cb28ab4e19e40cebf8dc751263e2b29015278f46a3c658e6b29ecb35
                                      • Instruction ID: 8e6081d488735b2ea07310ab2fde13fd277374e6c6b254be93ba137490650a52
                                      • Opcode Fuzzy Hash: 156ad284cb28ab4e19e40cebf8dc751263e2b29015278f46a3c658e6b29ecb35
                                      • Instruction Fuzzy Hash: F2F05472140158BBE7215B529C8DEEF3F7CEFCAB11F000279FA01E1191E7A05A01CAB9
                                      APIs
                                      • GetClientRect.USER32(?), ref: 00477452
                                      • SendMessageW.USER32(?,00001328,00000000,?), ref: 00477469
                                      • GetWindowDC.USER32(?), ref: 00477475
                                      • GetPixel.GDI32(00000000,?,?), ref: 00477484
                                      • ReleaseDC.USER32(?,00000000), ref: 00477496
                                      • GetSysColor.USER32(00000005), ref: 004774B0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                      • String ID:
                                      • API String ID: 272304278-0
                                      • Opcode ID: 39228621121526a3ab81acea188482095573a8789add6600d4de4965989261d5
                                      • Instruction ID: 906b2f8b379643bfa72fb78c0dc8b9b1710a2fec830356cea15770b82c328355
                                      • Opcode Fuzzy Hash: 39228621121526a3ab81acea188482095573a8789add6600d4de4965989261d5
                                      • Instruction Fuzzy Hash: 84017831400215EFEB205F68DC88BEA7BB5FB04311F514275F919A21A0CB311E52AB59
                                      APIs
                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0048187F
                                      • UnloadUserProfile.USERENV(?,?), ref: 0048188B
                                      • CloseHandle.KERNEL32(?), ref: 00481894
                                      • CloseHandle.KERNEL32(?), ref: 0048189C
                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 004818A5
                                      • HeapFree.KERNEL32(00000000), ref: 004818AC
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                      • String ID:
                                      • API String ID: 146765662-0
                                      • Opcode ID: edeba653bc60e1358a10d890fefc0b83ba74fd386459db793210f9fe5f32ec8c
                                      • Instruction ID: 9bd3d8db170f6692ac09d065103fc1eda3b33a0014ff02743653e0d92213aba4
                                      • Opcode Fuzzy Hash: edeba653bc60e1358a10d890fefc0b83ba74fd386459db793210f9fe5f32ec8c
                                      • Instruction Fuzzy Hash: 98E0E576004101BBDB016FA5ED8C90ABF79FF49B22B508331F22591070CB329420DF68
                                      APIs
                                      • __Init_thread_footer.LIBCMT ref: 0042BEB3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Init_thread_footer
                                      • String ID: D%O$D%O$D%O$D%OD%O
                                      • API String ID: 1385522511-2668399839
                                      • Opcode ID: 8255199a9bc70091741540bd3acdde37be1fbf0312409d6f7d71d218bfea1693
                                      • Instruction ID: aa5a16b601e756f8891619615369944f3bf371238661e00f2df35c2f94952a3c
                                      • Opcode Fuzzy Hash: 8255199a9bc70091741540bd3acdde37be1fbf0312409d6f7d71d218bfea1693
                                      • Instruction Fuzzy Hash: EB917B75A0022ADFCB18CF59D0906AAB7F1FF58310BA4816ED941AB350D779AD81CBD8
                                      APIs
                                        • Part of subcall function 00440242: EnterCriticalSection.KERNEL32(004F070C,004F1884,?,?,0043198B,004F2518,?,?,?,004212F9,00000000), ref: 0044024D
                                        • Part of subcall function 00440242: LeaveCriticalSection.KERNEL32(004F070C,?,0043198B,004F2518,?,?,?,004212F9,00000000), ref: 0044028A
                                        • Part of subcall function 00429CB3: _wcslen.LIBCMT ref: 00429CBD
                                        • Part of subcall function 004400A3: __onexit.LIBCMT ref: 004400A9
                                      • __Init_thread_footer.LIBCMT ref: 004A7BFB
                                        • Part of subcall function 004401F8: EnterCriticalSection.KERNEL32(004F070C,?,?,00438747,004F2514), ref: 00440202
                                        • Part of subcall function 004401F8: LeaveCriticalSection.KERNEL32(004F070C,?,00438747,004F2514), ref: 00440235
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                      • String ID: +TG$5$G$Variable must be of type 'Object'.
                                      • API String ID: 535116098-1348100212
                                      • Opcode ID: 2459b84b7094d4fd5f4a4fb6b4471991855979410f35227fcdd06d56e82325b4
                                      • Instruction ID: 9b15b032ea6dcef501bf0ed2737f1c01530fbf72e31ba169647124b915c358d8
                                      • Opcode Fuzzy Hash: 2459b84b7094d4fd5f4a4fb6b4471991855979410f35227fcdd06d56e82325b4
                                      • Instruction Fuzzy Hash: 1A91AE70A04208EFCB24EF55D9809BEB7B1BF5A304F10805EF8065B392DB79AE45CB59
                                      APIs
                                        • Part of subcall function 00427620: _wcslen.LIBCMT ref: 00427625
                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0048C6EE
                                      • _wcslen.LIBCMT ref: 0048C735
                                      • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0048C79C
                                      • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 0048C7CA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ItemMenu$Info_wcslen$Default
                                      • String ID: 0
                                      • API String ID: 1227352736-4108050209
                                      • Opcode ID: dd21fea91944b8e4a1fc18da470bccf5b89eafbe8d777ae708b3a4f335554bb8
                                      • Instruction ID: 8b6852a67f1c362976951e899450f4e10c590522281c6344ec9e4b99ea2f2c70
                                      • Opcode Fuzzy Hash: dd21fea91944b8e4a1fc18da470bccf5b89eafbe8d777ae708b3a4f335554bb8
                                      • Instruction Fuzzy Hash: 6951BE716143029BD714AF29C8C5A6F77E4AF49314F040E2FFA95E22A0DB78D904CB6A
                                      APIs
                                      • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00487206
                                      • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0048723C
                                      • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0048724D
                                      • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 004872CF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ErrorMode$AddressCreateInstanceProc
                                      • String ID: DllGetClassObject
                                      • API String ID: 753597075-1075368562
                                      • Opcode ID: 1b01b83a495eeaba9ca726d73377c9bcb32a229de59dbd7cdc0070a3500a8bcd
                                      • Instruction ID: 57cf4eb9bdefc398ee034841b6fc32ee46fc5a8afe2c142b363a94281b7554cb
                                      • Opcode Fuzzy Hash: 1b01b83a495eeaba9ca726d73377c9bcb32a229de59dbd7cdc0070a3500a8bcd
                                      • Instruction Fuzzy Hash: CF41BE71604204EFDB15EF54C894A9E7FA9EF44310F2488AEFD099F20AD7B8D941CBA4
                                      APIs
                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 004B3E35
                                      • IsMenu.USER32(?), ref: 004B3E4A
                                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004B3E92
                                      • DrawMenuBar.USER32 ref: 004B3EA5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Menu$Item$DrawInfoInsert
                                      • String ID: 0
                                      • API String ID: 3076010158-4108050209
                                      • Opcode ID: dddceb083cba89cf6cbdf9a6b397853a491cee3019047a8a03a937482e95fa96
                                      • Instruction ID: d7b38e935dbd01d3a5230e742cd45248f055653ec2f1c5d5d7375935f8a2911c
                                      • Opcode Fuzzy Hash: dddceb083cba89cf6cbdf9a6b397853a491cee3019047a8a03a937482e95fa96
                                      • Instruction Fuzzy Hash: 8A413675A00209EFDB20DF51D884EEABBB9FF48355F04412AE905AB350D738EE55CBA4
                                      APIs
                                        • Part of subcall function 00429CB3: _wcslen.LIBCMT ref: 00429CBD
                                        • Part of subcall function 00483CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00483CCA
                                      • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00481E66
                                      • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00481E79
                                      • SendMessageW.USER32(?,00000189,?,00000000), ref: 00481EA9
                                        • Part of subcall function 00426B57: _wcslen.LIBCMT ref: 00426B6A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: MessageSend$_wcslen$ClassName
                                      • String ID: ComboBox$ListBox
                                      • API String ID: 2081771294-1403004172
                                      • Opcode ID: 7c63d6c7fd16c660914e3babd0f8294abf227040ffc936161fb25a69a8ccb8b9
                                      • Instruction ID: bd9893c69bf0f394ec4d3b260d4dadedda35de082b8935d4593e04aae1e9a95b
                                      • Opcode Fuzzy Hash: 7c63d6c7fd16c660914e3babd0f8294abf227040ffc936161fb25a69a8ccb8b9
                                      • Instruction Fuzzy Hash: 5721F271A00104ABDB14AB66E886DFFB7A89B45358F14452BF821A32E0DB3C490A8728
                                      APIs
                                      • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 004B2F8D
                                      • LoadLibraryW.KERNEL32(?), ref: 004B2F94
                                      • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 004B2FA9
                                      • DestroyWindow.USER32(?), ref: 004B2FB1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: MessageSend$DestroyLibraryLoadWindow
                                      • String ID: SysAnimate32
                                      • API String ID: 3529120543-1011021900
                                      • Opcode ID: 3fae722c2992ac6257a6cd901510fff84e52ac5c65c3c36c2e08b89e49aacd83
                                      • Instruction ID: b85f201b49e0cecc8da7dc074b721eb8c1deccb5f9c410d38eef3a9f0effc3d2
                                      • Opcode Fuzzy Hash: 3fae722c2992ac6257a6cd901510fff84e52ac5c65c3c36c2e08b89e49aacd83
                                      • Instruction Fuzzy Hash: 4521AC71200205ABEF108F64DD84EFB37B9EB59368F10022AF950D22A0D7B9DC51A778
                                      APIs
                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00444D1E,004528E9,?,00444CBE,004528E9,004E88B8,0000000C,00444E15,004528E9,00000002), ref: 00444D8D
                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00444DA0
                                      • FreeLibrary.KERNEL32(00000000,?,?,?,00444D1E,004528E9,?,00444CBE,004528E9,004E88B8,0000000C,00444E15,004528E9,00000002,00000000), ref: 00444DC3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: AddressFreeHandleLibraryModuleProc
                                      • String ID: CorExitProcess$mscoree.dll
                                      • API String ID: 4061214504-1276376045
                                      • Opcode ID: 770c98dfd75bd365cbec7ae5476aa4869855e4ceb42fa576dc3f527ed88c497c
                                      • Instruction ID: fa30650c301d593e74ca500009bc75446bcdc9f291db641ad70cceae225fb82d
                                      • Opcode Fuzzy Hash: 770c98dfd75bd365cbec7ae5476aa4869855e4ceb42fa576dc3f527ed88c497c
                                      • Instruction Fuzzy Hash: 2BF06835940208FBEB555F94DC89B9EBFF5EF54751F000169F905A2250CB745D41CF98
                                      APIs
                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00424EDD,?,004F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00424E9C
                                      • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00424EAE
                                      • FreeLibrary.KERNEL32(00000000,?,?,00424EDD,?,004F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00424EC0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Library$AddressFreeLoadProc
                                      • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                      • API String ID: 145871493-3689287502
                                      • Opcode ID: 203a069dfd6bb676703e8673033adcafabe9c71b2032b7f1e0c2e0ca87e9b39e
                                      • Instruction ID: a7ac8e758baee5ad8d0333e97795404a1bf8f33eb23ab2e2bb9d644efc0db623
                                      • Opcode Fuzzy Hash: 203a069dfd6bb676703e8673033adcafabe9c71b2032b7f1e0c2e0ca87e9b39e
                                      • Instruction Fuzzy Hash: 7BE08635B016329BA2321B29BC98B5F6558EFC1F637060226FC00E2304DBA8CD0245BC
                                      APIs
                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00463CDE,?,004F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00424E62
                                      • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00424E74
                                      • FreeLibrary.KERNEL32(00000000,?,?,00463CDE,?,004F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00424E87
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Library$AddressFreeLoadProc
                                      • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                      • API String ID: 145871493-1355242751
                                      • Opcode ID: 2eb3e7558627c1f8a3a7b4cb612749afefd106928358c56ed9482860911f9451
                                      • Instruction ID: 8406569b2fbf4ea97cac0c29366a44cafc92623dd726abaa6f29c0303cd906d4
                                      • Opcode Fuzzy Hash: 2eb3e7558627c1f8a3a7b4cb612749afefd106928358c56ed9482860911f9451
                                      • Instruction Fuzzy Hash: 70D01D356016315755221B197C9CE8F6518EFC5B653560726F905B6224CF58CD02C5EC
                                      APIs
                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00492C05
                                      • DeleteFileW.KERNEL32(?), ref: 00492C87
                                      • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00492C9D
                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00492CAE
                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00492CC0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: File$Delete$Copy
                                      • String ID:
                                      • API String ID: 3226157194-0
                                      • Opcode ID: 7b7347bacdc69602d9c269631844009293993e74e16445e893d49638d80000b1
                                      • Instruction ID: 1757193daf9ac108e540f95cf7253142c16c555518d79d1d4b7752b63701c4a1
                                      • Opcode Fuzzy Hash: 7b7347bacdc69602d9c269631844009293993e74e16445e893d49638d80000b1
                                      • Instruction Fuzzy Hash: 35B16E71E00129ABDF20DFA5CD85EDE7BBDEF48314F0040ABF509A6141EA789E448F65
                                      APIs
                                      • GetCurrentProcessId.KERNEL32 ref: 004AA427
                                      • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 004AA435
                                      • GetProcessIoCounters.KERNEL32(00000000,?), ref: 004AA468
                                      • CloseHandle.KERNEL32(?), ref: 004AA63D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Process$CloseCountersCurrentHandleOpen
                                      • String ID:
                                      • API String ID: 3488606520-0
                                      • Opcode ID: ece2d36f94f23cd8ae9824498df5df6c3596238b1f30e3f178296c975d83e965
                                      • Instruction ID: 04af7b864724e39d1c884fd01f4fa0016050488717ed5ba0f72195e831d7fb06
                                      • Opcode Fuzzy Hash: ece2d36f94f23cd8ae9824498df5df6c3596238b1f30e3f178296c975d83e965
                                      • Instruction Fuzzy Hash: 42A1B171604300AFD720DF25D886B2AB7E1AF58718F54881EF99A9B3D2D774EC41CB86
                                      APIs
                                      • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,004C3700), ref: 0045BB91
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,004F121C,000000FF,00000000,0000003F,00000000,?,?), ref: 0045BC09
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,004F1270,000000FF,?,0000003F,00000000,?), ref: 0045BC36
                                      • _free.LIBCMT ref: 0045BB7F
                                        • Part of subcall function 004529C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0045D7D1,00000000,00000000,00000000,00000000,?,0045D7F8,00000000,00000007,00000000,?,0045DBF5,00000000), ref: 004529DE
                                        • Part of subcall function 004529C8: GetLastError.KERNEL32(00000000,?,0045D7D1,00000000,00000000,00000000,00000000,?,0045D7F8,00000000,00000007,00000000,?,0045DBF5,00000000,00000000), ref: 004529F0
                                      • _free.LIBCMT ref: 0045BD4B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                      • String ID:
                                      • API String ID: 1286116820-0
                                      • Opcode ID: 617f3981a01843c19272a0b7ae2321a3aed390b0475163e8d88f836e70543b20
                                      • Instruction ID: 990978235e6e9b60e2a895544510dca5783bd68b0d683bbaf57892af8a7d402a
                                      • Opcode Fuzzy Hash: 617f3981a01843c19272a0b7ae2321a3aed390b0475163e8d88f836e70543b20
                                      • Instruction Fuzzy Hash: F551D771900209DBC710DFA59C819BAB7B8EB41315B11426FED50E72A2EB745D49CB9C
                                      APIs
                                        • Part of subcall function 0048DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0048CF22,?), ref: 0048DDFD
                                        • Part of subcall function 0048DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0048CF22,?), ref: 0048DE16
                                        • Part of subcall function 0048E199: GetFileAttributesW.KERNEL32(?,0048CF95), ref: 0048E19A
                                      • lstrcmpiW.KERNEL32(?,?), ref: 0048E473
                                      • MoveFileW.KERNEL32(?,?), ref: 0048E4AC
                                      • _wcslen.LIBCMT ref: 0048E5EB
                                      • _wcslen.LIBCMT ref: 0048E603
                                      • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 0048E650
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                      • String ID:
                                      • API String ID: 3183298772-0
                                      • Opcode ID: 8d2ce359162edb54f4f00f81e4f5fb85806dc38565c6767e0a450734d176a57b
                                      • Instruction ID: 60787f0a9c1cefa1120e4c70d23cbfae7a86328f6df3a0f9e7a00464ca67ce38
                                      • Opcode Fuzzy Hash: 8d2ce359162edb54f4f00f81e4f5fb85806dc38565c6767e0a450734d176a57b
                                      • Instruction Fuzzy Hash: 6F514FB25083455BD724EBA1DC819DF73DCAF84344F40492FF68993191EF78A688876A
                                      APIs
                                        • Part of subcall function 00429CB3: _wcslen.LIBCMT ref: 00429CBD
                                        • Part of subcall function 004AC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,004AB6AE,?,?), ref: 004AC9B5
                                        • Part of subcall function 004AC998: _wcslen.LIBCMT ref: 004AC9F1
                                        • Part of subcall function 004AC998: _wcslen.LIBCMT ref: 004ACA68
                                        • Part of subcall function 004AC998: _wcslen.LIBCMT ref: 004ACA9E
                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004ABAA5
                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004ABB00
                                      • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 004ABB63
                                      • RegCloseKey.ADVAPI32(?,?), ref: 004ABBA6
                                      • RegCloseKey.ADVAPI32(00000000), ref: 004ABBB3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                      • String ID:
                                      • API String ID: 826366716-0
                                      • Opcode ID: 23d9cae6d88e7a7faf69db79d9addf3c5b335404d1ea566e1c67affaf676e0bb
                                      • Instruction ID: b7fd18cc6d48e5328e3c1282b51278e43c92fa8cc22a517c944069cb88f4a78f
                                      • Opcode Fuzzy Hash: 23d9cae6d88e7a7faf69db79d9addf3c5b335404d1ea566e1c67affaf676e0bb
                                      • Instruction Fuzzy Hash: 7561B031208201AFC714DF14C490E2ABBE5FF85308F54896EF4994B2A2CB35ED45CB96
                                      APIs
                                      • VariantInit.OLEAUT32(?), ref: 00488BCD
                                      • VariantClear.OLEAUT32 ref: 00488C3E
                                      • VariantClear.OLEAUT32 ref: 00488C9D
                                      • VariantClear.OLEAUT32(?), ref: 00488D10
                                      • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00488D3B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Variant$Clear$ChangeInitType
                                      • String ID:
                                      • API String ID: 4136290138-0
                                      • Opcode ID: 39310c669144a4c22efa8439d0ca2753041b9f90e1ba1ad640316a89604730c0
                                      • Instruction ID: b7157e97ab252369fc19d7966491ec59cb3ebb371813a6d150ecb9d7d55ae035
                                      • Opcode Fuzzy Hash: 39310c669144a4c22efa8439d0ca2753041b9f90e1ba1ad640316a89604730c0
                                      • Instruction Fuzzy Hash: 185189B5A00219EFCB10DF28C884AAAB7F8FF89310B15856EE905DB350E734E911CF94
                                      APIs
                                      • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00498BAE
                                      • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00498BDA
                                      • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00498C32
                                      • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00498C57
                                      • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00498C5F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: PrivateProfile$SectionWrite$String
                                      • String ID:
                                      • API String ID: 2832842796-0
                                      • Opcode ID: 73387155a575d5d868ba3a934b55a76839c43437ecae431621c6eff53b58d402
                                      • Instruction ID: 05f0eeecb1b2976e9f1042e06f751d8563369d4b7492461ab7355477f8759a4d
                                      • Opcode Fuzzy Hash: 73387155a575d5d868ba3a934b55a76839c43437ecae431621c6eff53b58d402
                                      • Instruction Fuzzy Hash: 03514E35A00215AFCB04DF55D881E6ABBF5FF49318F088069E849AB362DB35ED41CB94
                                      APIs
                                      • LoadLibraryW.KERNEL32(?,00000000,?), ref: 004A8F40
                                      • GetProcAddress.KERNEL32(00000000,?), ref: 004A8FD0
                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 004A8FEC
                                      • GetProcAddress.KERNEL32(00000000,?), ref: 004A9032
                                      • FreeLibrary.KERNEL32(00000000), ref: 004A9052
                                        • Part of subcall function 0043F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00491043,?,7529E610), ref: 0043F6E6
                                        • Part of subcall function 0043F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,0047FA64,00000000,00000000,?,?,00491043,?,7529E610,?,0047FA64), ref: 0043F70D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                      • String ID:
                                      • API String ID: 666041331-0
                                      • Opcode ID: f7dcdb0b4bc10c3f3d77358f3c44e4d2a0287f438f3422d89013429a62e47021
                                      • Instruction ID: c121400034c3a1548b3615a886046b752b13e6bf6a839fd0897e1b86522a10fb
                                      • Opcode Fuzzy Hash: f7dcdb0b4bc10c3f3d77358f3c44e4d2a0287f438f3422d89013429a62e47021
                                      • Instruction Fuzzy Hash: 03515B34604215DFC710DF58C4848AEBBF1FF5A358F4881AAE805AB362DB35ED86CB95
                                      APIs
                                      • SetWindowLongW.USER32(00000002,000000F0,?), ref: 004B6C33
                                      • SetWindowLongW.USER32(?,000000EC,?), ref: 004B6C4A
                                      • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 004B6C73
                                      • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,0049AB79,00000000,00000000), ref: 004B6C98
                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 004B6CC7
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Window$Long$MessageSendShow
                                      • String ID:
                                      • API String ID: 3688381893-0
                                      • Opcode ID: a3bc15db8e8236c7a7a8f267e40ca7662564f838f1bf6e1ec0a8c54c711d33d6
                                      • Instruction ID: 3e68013e34e3a81c320a38d4bea7814249aec2430d0e9e608d0965e7c034aa7c
                                      • Opcode Fuzzy Hash: a3bc15db8e8236c7a7a8f267e40ca7662564f838f1bf6e1ec0a8c54c711d33d6
                                      • Instruction Fuzzy Hash: 7E41A235604114AFDB24CF28CC98FE67FB5EB09350F16026AE995A73A0C379ED51CA68
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: _free
                                      • String ID:
                                      • API String ID: 269201875-0
                                      • Opcode ID: c81da19e7d2849a8bfc8b7c817ab5e8426332b244995363687fffbe44b676a71
                                      • Instruction ID: f527d3a08db834d2fbe276e10f69c827a0c5b2acce8a40cc14366a43bb4e240c
                                      • Opcode Fuzzy Hash: c81da19e7d2849a8bfc8b7c817ab5e8426332b244995363687fffbe44b676a71
                                      • Instruction Fuzzy Hash: 97410672A002009FCB20DF79CA81A5EB3E1EF8A714F15416BEA15EB392D775AD05CB84
                                      APIs
                                      • GetCursorPos.USER32(?), ref: 00439141
                                      • ScreenToClient.USER32(00000000,?), ref: 0043915E
                                      • GetAsyncKeyState.USER32(00000001), ref: 00439183
                                      • GetAsyncKeyState.USER32(00000002), ref: 0043919D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: AsyncState$ClientCursorScreen
                                      • String ID:
                                      • API String ID: 4210589936-0
                                      • Opcode ID: 238695e87decc54b6bd157083b614fac2c0ad6663180adaf62778986147b5758
                                      • Instruction ID: 18277a81020ec66eddff568756557cb5ca3d821dcf4c86763dce37a79d15c231
                                      • Opcode Fuzzy Hash: 238695e87decc54b6bd157083b614fac2c0ad6663180adaf62778986147b5758
                                      • Instruction Fuzzy Hash: 42414031A0851ABBDF159F64C884BEEB774FB09324F60822AE429A73D0C7785D50CF95
                                      APIs
                                      • GetInputState.USER32 ref: 004938CB
                                      • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00493922
                                      • TranslateMessage.USER32(?), ref: 0049394B
                                      • DispatchMessageW.USER32(?), ref: 00493955
                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00493966
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                      • String ID:
                                      • API String ID: 2256411358-0
                                      • Opcode ID: f20db02d6d783115647ddbea5af4b674885d4f071a7d52c031f26bdaa7c7a58e
                                      • Instruction ID: c86bda388a38a2791a0a61bb81b9e94972f6f4b27b6d1a2844cd322155af52e9
                                      • Opcode Fuzzy Hash: f20db02d6d783115647ddbea5af4b674885d4f071a7d52c031f26bdaa7c7a58e
                                      • Instruction Fuzzy Hash: 913195B0504241DFEF35DF259848FB73FE8AB16306F04057FD466862A0D7A8AA85CB19
                                      APIs
                                      • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,0049C21E,00000000), ref: 0049CF38
                                      • InternetReadFile.WININET(?,00000000,?,?), ref: 0049CF6F
                                      • GetLastError.KERNEL32(?,00000000,?,?,?,0049C21E,00000000), ref: 0049CFB4
                                      • SetEvent.KERNEL32(?,?,00000000,?,?,?,0049C21E,00000000), ref: 0049CFC8
                                      • SetEvent.KERNEL32(?,?,00000000,?,?,?,0049C21E,00000000), ref: 0049CFF2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                      • String ID:
                                      • API String ID: 3191363074-0
                                      • Opcode ID: ec58e77170e7a70d5a174fe9e1b367d055935aeb02961217e97165ddcaee3bd3
                                      • Instruction ID: 837179bca22fd6edc22a3afd85d2d76da3776529e11b447ae2215bf556820809
                                      • Opcode Fuzzy Hash: ec58e77170e7a70d5a174fe9e1b367d055935aeb02961217e97165ddcaee3bd3
                                      • Instruction Fuzzy Hash: 57314C71900205EFDF24DFA5C8C49ABBBF9EB14354B10447FF506D2285EB38AE419B68
                                      APIs
                                      • GetWindowRect.USER32(?,?), ref: 00481915
                                      • PostMessageW.USER32(00000001,00000201,00000001), ref: 004819C1
                                      • Sleep.KERNEL32(00000000,?,?,?), ref: 004819C9
                                      • PostMessageW.USER32(00000001,00000202,00000000), ref: 004819DA
                                      • Sleep.KERNEL32(00000000,?,?,?,?), ref: 004819E2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: MessagePostSleep$RectWindow
                                      • String ID:
                                      • API String ID: 3382505437-0
                                      • Opcode ID: 1414e6d8111652a584aa8dfee306264c116ed3c02acd699729c58edaebc16dca
                                      • Instruction ID: 3712d19a601aa7187fe5d1434d6e40ca2c3c6380f14aa01ef709c99f74b99ace
                                      • Opcode Fuzzy Hash: 1414e6d8111652a584aa8dfee306264c116ed3c02acd699729c58edaebc16dca
                                      • Instruction Fuzzy Hash: 1231C2B1900219EFCB00DFACCD99AEE3BB9EB04315F10472AF961A72E1C7749955CB94
                                      APIs
                                      • SendMessageW.USER32(?,00001053,000000FF,?), ref: 004B5745
                                      • SendMessageW.USER32(?,00001074,?,00000001), ref: 004B579D
                                      • _wcslen.LIBCMT ref: 004B57AF
                                      • _wcslen.LIBCMT ref: 004B57BA
                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 004B5816
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: MessageSend$_wcslen
                                      • String ID:
                                      • API String ID: 763830540-0
                                      • Opcode ID: f5724bfde3225b01becafc95a65ada82560397b72ffb4233d447ce2b2db600ef
                                      • Instruction ID: 28fe900400b80d8ccfd2b165bebfe0e42393ba137618e9432c877cbf6fa7b421
                                      • Opcode Fuzzy Hash: f5724bfde3225b01becafc95a65ada82560397b72ffb4233d447ce2b2db600ef
                                      • Instruction Fuzzy Hash: CC2184719046189ADB209F64CC85BEEB778FF54724F104217E919DA280D7788985CF68
                                      APIs
                                      • IsWindow.USER32(00000000), ref: 004A0951
                                      • GetForegroundWindow.USER32 ref: 004A0968
                                      • GetDC.USER32(00000000), ref: 004A09A4
                                      • GetPixel.GDI32(00000000,?,00000003), ref: 004A09B0
                                      • ReleaseDC.USER32(00000000,00000003), ref: 004A09E8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Window$ForegroundPixelRelease
                                      • String ID:
                                      • API String ID: 4156661090-0
                                      • Opcode ID: 5c1fbecd186fe8a796b3b6025b6a33f8d3121a32340326174612f3aa9ea5aada
                                      • Instruction ID: 9918a764f49a44a8de8bbd74e00acc4bc6128f1348cf7671a85014ec48c4fb2f
                                      • Opcode Fuzzy Hash: 5c1fbecd186fe8a796b3b6025b6a33f8d3121a32340326174612f3aa9ea5aada
                                      • Instruction Fuzzy Hash: AF21A475600214AFDB04EF69D984E5EBBE9EF45704F00813DF84697361CB34AC04CB94
                                      APIs
                                      • GetEnvironmentStringsW.KERNEL32 ref: 0045CDC6
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0045CDE9
                                        • Part of subcall function 00453820: RtlAllocateHeap.NTDLL(00000000,?,004F1444,?,0043FDF5,?,?,0042A976,00000010,004F1440,004213FC,?,004213C6,?,00421129), ref: 00453852
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0045CE0F
                                      • _free.LIBCMT ref: 0045CE22
                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0045CE31
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                      • String ID:
                                      • API String ID: 336800556-0
                                      • Opcode ID: 837d5aecd2069d124c5e5fa4895791fd7af67f9e034e5f966b07d1e8bd7d1343
                                      • Instruction ID: b0ec4ff219fc43bafa908d6858b9b884a7b77d05def789e94a43604a952a1936
                                      • Opcode Fuzzy Hash: 837d5aecd2069d124c5e5fa4895791fd7af67f9e034e5f966b07d1e8bd7d1343
                                      • Instruction Fuzzy Hash: 920188726013157F2321167A6CCAD7F796DDEC6BA2315022FFD05D7202DA698D0681B8
                                      APIs
                                      • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00439693
                                      • SelectObject.GDI32(?,00000000), ref: 004396A2
                                      • BeginPath.GDI32(?), ref: 004396B9
                                      • SelectObject.GDI32(?,00000000), ref: 004396E2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ObjectSelect$BeginCreatePath
                                      • String ID:
                                      • API String ID: 3225163088-0
                                      • Opcode ID: 97df360eee23c836ca3f2398229c1593c4bfce03877ba528395d27f356e649ba
                                      • Instruction ID: 1cce26d8e3724cbc38c2882189e9a370e405898c0bc9db57da13c752c78295b9
                                      • Opcode Fuzzy Hash: 97df360eee23c836ca3f2398229c1593c4bfce03877ba528395d27f356e649ba
                                      • Instruction Fuzzy Hash: FD217FB0802305EBDB119F69DC55BBA3BA8BB14315F104226F810A62B0D3F85CA1CFDC
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: _memcmp
                                      • String ID:
                                      • API String ID: 2931989736-0
                                      • Opcode ID: af124623660d335008a532e4e6e4148036d4d186ee2e4555ae921884cbf32ddd
                                      • Instruction ID: e1f31f31bbe9dbeada6dd38b4531952f6e10e1c82cdf75704d84f16ad3db89d9
                                      • Opcode Fuzzy Hash: af124623660d335008a532e4e6e4148036d4d186ee2e4555ae921884cbf32ddd
                                      • Instruction Fuzzy Hash: 5701D265241A09BAF20869159D82FFF635C9B20398F508437FD089AA41F62CED5583BD
                                      APIs
                                      • GetLastError.KERNEL32(?,?,?,0044F2DE,00453863,004F1444,?,0043FDF5,?,?,0042A976,00000010,004F1440,004213FC,?,004213C6), ref: 00452DFD
                                      • _free.LIBCMT ref: 00452E32
                                      • _free.LIBCMT ref: 00452E59
                                      • SetLastError.KERNEL32(00000000,00421129), ref: 00452E66
                                      • SetLastError.KERNEL32(00000000,00421129), ref: 00452E6F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ErrorLast$_free
                                      • String ID:
                                      • API String ID: 3170660625-0
                                      • Opcode ID: 0a558dec2018940fe393fa1b2bfa3e4e75b2d6f02d60b537415c9972b5e7c3d2
                                      • Instruction ID: 930a75c9f22df098711cec38c6baf6d320aee8bd8af17dc4aa85bf6566b37e4b
                                      • Opcode Fuzzy Hash: 0a558dec2018940fe393fa1b2bfa3e4e75b2d6f02d60b537415c9972b5e7c3d2
                                      • Instruction Fuzzy Hash: 2201FE7124590067C61227756EC7D2B16599BD33ABB25413FFC25A2393DEEC9C0E412C
                                      APIs
                                      • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0047FF41,80070057,?,?,?,0048035E), ref: 0048002B
                                      • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0047FF41,80070057,?,?), ref: 00480046
                                      • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0047FF41,80070057,?,?), ref: 00480054
                                      • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0047FF41,80070057,?), ref: 00480064
                                      • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0047FF41,80070057,?,?), ref: 00480070
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: From$Prog$FreeStringTasklstrcmpi
                                      • String ID:
                                      • API String ID: 3897988419-0
                                      • Opcode ID: f6e8e6b9cdbc7e6931752f303c37d028b93033cb3d078f82634eacb49f039f2e
                                      • Instruction ID: f6c5fd5bf5d7f1d26580bb6ab739e3d15e56509ef18736ea87ce5032d2de0c39
                                      • Opcode Fuzzy Hash: f6e8e6b9cdbc7e6931752f303c37d028b93033cb3d078f82634eacb49f039f2e
                                      • Instruction Fuzzy Hash: B101FD72610204BFDB506F68EC84BAE7AEDEF44392F144625F805E2210E779CD049BA4
                                      APIs
                                      • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00481114
                                      • GetLastError.KERNEL32(?,00000000,00000000,?,?,00480B9B,?,?,?), ref: 00481120
                                      • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00480B9B,?,?,?), ref: 0048112F
                                      • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00480B9B,?,?,?), ref: 00481136
                                      • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0048114D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                      • String ID:
                                      • API String ID: 842720411-0
                                      • Opcode ID: 48c2655b77cc6b8a8298bb4aacb8372a9e6e98ac3bcb142a0a82b625db415609
                                      • Instruction ID: d917cf516430060be8b686c2996dfaeb779d44ee710da23d3e2d6475a2487045
                                      • Opcode Fuzzy Hash: 48c2655b77cc6b8a8298bb4aacb8372a9e6e98ac3bcb142a0a82b625db415609
                                      • Instruction Fuzzy Hash: 14011D75100605BFDB115FA5DC8DAAB3B6EEF89360B104526FA46D7360DA31DC019B64
                                      APIs
                                      • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00480FCA
                                      • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00480FD6
                                      • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00480FE5
                                      • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00480FEC
                                      • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00481002
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: HeapInformationToken$AllocErrorLastProcess
                                      • String ID:
                                      • API String ID: 44706859-0
                                      • Opcode ID: 7311d10b4b97b0d333d44501bbc6a58fc2aa6c3c29bb80fb160ab414c7147831
                                      • Instruction ID: e2fda5904e328891e96e32de2e176286625fba70b205faa8b4bab99e7ec24cfa
                                      • Opcode Fuzzy Hash: 7311d10b4b97b0d333d44501bbc6a58fc2aa6c3c29bb80fb160ab414c7147831
                                      • Instruction Fuzzy Hash: 55F0AF75100301ABD7212FA49CC9F5B3BADEF8A761F100426F905D6260CA30DC408A64
                                      APIs
                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0048102A
                                      • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00481036
                                      • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00481045
                                      • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0048104C
                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00481062
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: HeapInformationToken$AllocErrorLastProcess
                                      • String ID:
                                      • API String ID: 44706859-0
                                      • Opcode ID: 8fcc501a26315e25ed68eeac97250e59f66f2b09ebb96e7edda84bbace03d1df
                                      • Instruction ID: edccd220124ec5fa6d49d4cecdeb913d7388f2aa85087cde0d205f0744ae92a1
                                      • Opcode Fuzzy Hash: 8fcc501a26315e25ed68eeac97250e59f66f2b09ebb96e7edda84bbace03d1df
                                      • Instruction Fuzzy Hash: E3F06275140301EBD7216FA4ECC9F5B3BADEF8A761F100526F945E7260CA74D8418B64
                                      APIs
                                      • CloseHandle.KERNEL32(?,?,?,?,0049017D,?,004932FC,?,00000001,00462592,?), ref: 00490324
                                      • CloseHandle.KERNEL32(?,?,?,?,0049017D,?,004932FC,?,00000001,00462592,?), ref: 00490331
                                      • CloseHandle.KERNEL32(?,?,?,?,0049017D,?,004932FC,?,00000001,00462592,?), ref: 0049033E
                                      • CloseHandle.KERNEL32(?,?,?,?,0049017D,?,004932FC,?,00000001,00462592,?), ref: 0049034B
                                      • CloseHandle.KERNEL32(?,?,?,?,0049017D,?,004932FC,?,00000001,00462592,?), ref: 00490358
                                      • CloseHandle.KERNEL32(?,?,?,?,0049017D,?,004932FC,?,00000001,00462592,?), ref: 00490365
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: CloseHandle
                                      • String ID:
                                      • API String ID: 2962429428-0
                                      • Opcode ID: 4a76357199183cb86dea2916cb5250c22fb095a08fe14fe5e356c72c89e91214
                                      • Instruction ID: ed570704167c4625fbdd6ac4fb9fec6c048d36119dd0c1c114731c2716f9d6ca
                                      • Opcode Fuzzy Hash: 4a76357199183cb86dea2916cb5250c22fb095a08fe14fe5e356c72c89e91214
                                      • Instruction Fuzzy Hash: 2801AA72800B159FCB30AF6AD880813FBF9BF603153158A3FD59652A31C3B5A998DF84
                                      APIs
                                      • _free.LIBCMT ref: 0045D752
                                        • Part of subcall function 004529C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0045D7D1,00000000,00000000,00000000,00000000,?,0045D7F8,00000000,00000007,00000000,?,0045DBF5,00000000), ref: 004529DE
                                        • Part of subcall function 004529C8: GetLastError.KERNEL32(00000000,?,0045D7D1,00000000,00000000,00000000,00000000,?,0045D7F8,00000000,00000007,00000000,?,0045DBF5,00000000,00000000), ref: 004529F0
                                      • _free.LIBCMT ref: 0045D764
                                      • _free.LIBCMT ref: 0045D776
                                      • _free.LIBCMT ref: 0045D788
                                      • _free.LIBCMT ref: 0045D79A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: _free$ErrorFreeHeapLast
                                      • String ID:
                                      • API String ID: 776569668-0
                                      • Opcode ID: e0f2a21b4f97225cbf08bbfc4ac70b52762c4dc9046e11cbdde593abb6fd362d
                                      • Instruction ID: 4b388fe234d9fda152e862e6c07ee8adc7013110369351195e53cf809d01dfed
                                      • Opcode Fuzzy Hash: e0f2a21b4f97225cbf08bbfc4ac70b52762c4dc9046e11cbdde593abb6fd362d
                                      • Instruction Fuzzy Hash: 68F044B2A00248AB8635FB55FAC1C577BDDBF09312794081BF844E7603C728FC84866C
                                      APIs
                                      • GetDlgItem.USER32(?,000003E9), ref: 00485C58
                                      • GetWindowTextW.USER32(00000000,?,00000100), ref: 00485C6F
                                      • MessageBeep.USER32(00000000), ref: 00485C87
                                      • KillTimer.USER32(?,0000040A), ref: 00485CA3
                                      • EndDialog.USER32(?,00000001), ref: 00485CBD
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: BeepDialogItemKillMessageTextTimerWindow
                                      • String ID:
                                      • API String ID: 3741023627-0
                                      • Opcode ID: cc10542c7e7a0ceab1ac54573bfa68b09312b5bdf51324188b809aa3d79a5ad6
                                      • Instruction ID: 0a838a0193c0566217ce4f85e012b82527c54a63bb2cf20d1240837792481f51
                                      • Opcode Fuzzy Hash: cc10542c7e7a0ceab1ac54573bfa68b09312b5bdf51324188b809aa3d79a5ad6
                                      • Instruction Fuzzy Hash: 9E018B305007049BFB216B10DDCEFAA77B8BB00705F00166AA583A14E1DBF469949F59
                                      APIs
                                      • _free.LIBCMT ref: 004522BE
                                        • Part of subcall function 004529C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0045D7D1,00000000,00000000,00000000,00000000,?,0045D7F8,00000000,00000007,00000000,?,0045DBF5,00000000), ref: 004529DE
                                        • Part of subcall function 004529C8: GetLastError.KERNEL32(00000000,?,0045D7D1,00000000,00000000,00000000,00000000,?,0045D7F8,00000000,00000007,00000000,?,0045DBF5,00000000,00000000), ref: 004529F0
                                      • _free.LIBCMT ref: 004522D0
                                      • _free.LIBCMT ref: 004522E3
                                      • _free.LIBCMT ref: 004522F4
                                      • _free.LIBCMT ref: 00452305
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: _free$ErrorFreeHeapLast
                                      • String ID:
                                      • API String ID: 776569668-0
                                      • Opcode ID: f17d8261ad30c9c5d074e03c18d8a7701c2f05758c84c7708e498129d7de1e53
                                      • Instruction ID: c773e2e05931d0de2ad6715253a48f93b819ca5d0a044b34456541b09b261cb8
                                      • Opcode Fuzzy Hash: f17d8261ad30c9c5d074e03c18d8a7701c2f05758c84c7708e498129d7de1e53
                                      • Instruction Fuzzy Hash: 6CF030F4500110DB8612BF95BE818693B64B719752B01056BF810F6373C7B90426DBAC
                                      APIs
                                      • EndPath.GDI32(?), ref: 004395D4
                                      • StrokeAndFillPath.GDI32(?,?,004771F7,00000000,?,?,?), ref: 004395F0
                                      • SelectObject.GDI32(?,00000000), ref: 00439603
                                      • DeleteObject.GDI32 ref: 00439616
                                      • StrokePath.GDI32(?), ref: 00439631
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Path$ObjectStroke$DeleteFillSelect
                                      • String ID:
                                      • API String ID: 2625713937-0
                                      • Opcode ID: b8e094ef599b38223ed017283183c3e81c52f771f088a9ee7625484d63ba14e7
                                      • Instruction ID: 0098941d5436ee94867e0b73aab18bb8645177949b71046b5e65b0b33d233bd7
                                      • Opcode Fuzzy Hash: b8e094ef599b38223ed017283183c3e81c52f771f088a9ee7625484d63ba14e7
                                      • Instruction Fuzzy Hash: 98F03C71006204EBDB166F69ED9CB793B65AB14322F048335F465551F0C7B489A1DFAC
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: __freea$_free
                                      • String ID: a/p$am/pm
                                      • API String ID: 3432400110-3206640213
                                      • Opcode ID: 105206133b2c8e860352b013de2525cf6d88d77948f91767e0fcb49d3babfe5b
                                      • Instruction ID: b6970d0efe840f00fc1f2ee2545f8803bf2eb38e9355ac87a8df1686a1e5e577
                                      • Opcode Fuzzy Hash: 105206133b2c8e860352b013de2525cf6d88d77948f91767e0fcb49d3babfe5b
                                      • Instruction Fuzzy Hash: 6CD1E3319002059AEB249F68C865BBBB7B0EF05702F14415BED01ABB62D37D9D89CB59
                                      APIs
                                        • Part of subcall function 00440242: EnterCriticalSection.KERNEL32(004F070C,004F1884,?,?,0043198B,004F2518,?,?,?,004212F9,00000000), ref: 0044024D
                                        • Part of subcall function 00440242: LeaveCriticalSection.KERNEL32(004F070C,?,0043198B,004F2518,?,?,?,004212F9,00000000), ref: 0044028A
                                        • Part of subcall function 004400A3: __onexit.LIBCMT ref: 004400A9
                                      • __Init_thread_footer.LIBCMT ref: 004A6238
                                        • Part of subcall function 004401F8: EnterCriticalSection.KERNEL32(004F070C,?,?,00438747,004F2514), ref: 00440202
                                        • Part of subcall function 004401F8: LeaveCriticalSection.KERNEL32(004F070C,?,00438747,004F2514), ref: 00440235
                                        • Part of subcall function 0049359C: LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 004935E4
                                        • Part of subcall function 0049359C: LoadStringW.USER32(004F2390,?,00000FFF,?), ref: 0049360A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterLeaveLoadString$Init_thread_footer__onexit
                                      • String ID: x#O$x#O$x#O
                                      • API String ID: 1072379062-1585387102
                                      • Opcode ID: e0a671a690923dec34fb7222bc678da1ef2f0e9c81d9d08d68a092e52971969b
                                      • Instruction ID: 4787d067b239ab745dc6c827bfd9894440a0f23e5039edcf9f5bbd66865290ba
                                      • Opcode Fuzzy Hash: e0a671a690923dec34fb7222bc678da1ef2f0e9c81d9d08d68a092e52971969b
                                      • Instruction Fuzzy Hash: BFC1BF71A00105AFCB14EF68D890EBEB7B9EF59304F15806EF9059B281DB78ED41CB98
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: JOB
                                      • API String ID: 0-1837081202
                                      • Opcode ID: ca289e7ff035b277a1aa53f0b16678c1739b1c895af169d836140af904229c59
                                      • Instruction ID: 41116ecbba32544a5049acc88b67cbaf315db936dd99e0f7c034559768e13806
                                      • Opcode Fuzzy Hash: ca289e7ff035b277a1aa53f0b16678c1739b1c895af169d836140af904229c59
                                      • Instruction Fuzzy Hash: 17510371D006099FDB119FA9C859FBF7BB4AF05316F10005BFC00AB293D6799A09CB6A
                                      APIs
                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000002,00000000,?,?,?,00000000,?,?,?,?), ref: 00458B6E
                                      • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,00000000,00001000,?), ref: 00458B7A
                                      • __dosmaperr.LIBCMT ref: 00458B81
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ByteCharErrorLastMultiWide__dosmaperr
                                      • String ID: .D
                                      • API String ID: 2434981716-3625442119
                                      • Opcode ID: 9c7f89c90aaa6a418ccb39cd11912d42fa7d9842e2e9944e0f54374b488840e6
                                      • Instruction ID: 2b43b71b691ca9c7a7952de0bb208ed3e7d500c1491ac1d6bcc61ec33cee1202
                                      • Opcode Fuzzy Hash: 9c7f89c90aaa6a418ccb39cd11912d42fa7d9842e2e9944e0f54374b488840e6
                                      • Instruction Fuzzy Hash: B2415CB0604045AFDB249F24C881A7E7FA9EB85305B2841AFFC45A7253DE399C17879C
                                      APIs
                                        • Part of subcall function 0048B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,004821D0,?,?,00000034,00000800,?,00000034), ref: 0048B42D
                                      • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00482760
                                        • Part of subcall function 0048B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,004821FF,?,?,00000800,?,00001073,00000000,?,?), ref: 0048B3F8
                                        • Part of subcall function 0048B32A: GetWindowThreadProcessId.USER32(?,?), ref: 0048B355
                                        • Part of subcall function 0048B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00482194,00000034,?,?,00001004,00000000,00000000), ref: 0048B365
                                        • Part of subcall function 0048B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00482194,00000034,?,?,00001004,00000000,00000000), ref: 0048B37B
                                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 004827CD
                                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0048281A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                      • String ID: @
                                      • API String ID: 4150878124-2766056989
                                      • Opcode ID: 68bc7d3d0e36bc466176894dfb6da9a07b9e38108367f05a13071d35261bd4b6
                                      • Instruction ID: 981b16b58dc40dc3c084e38782a5ce4f9ec9bead73b258c05586ab0b0faa37f8
                                      • Opcode Fuzzy Hash: 68bc7d3d0e36bc466176894dfb6da9a07b9e38108367f05a13071d35261bd4b6
                                      • Instruction Fuzzy Hash: DC416D72900218BFDB10EBA4CD81ADEBBB8EF09704F00445AFA55B7181DB746E45CBA4
                                      APIs
                                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\file.exe,00000104), ref: 00451769
                                      • _free.LIBCMT ref: 00451834
                                      • _free.LIBCMT ref: 0045183E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: _free$FileModuleName
                                      • String ID: C:\Users\user\Desktop\file.exe
                                      • API String ID: 2506810119-517116171
                                      • Opcode ID: 48077779d7ddf992d60763a72ff990ed2217d4dbe809c8963531c6153e8d3875
                                      • Instruction ID: d9d48bd8af958da5070941ae20d7a16f1a71e03745191e7650c402cdba091e19
                                      • Opcode Fuzzy Hash: 48077779d7ddf992d60763a72ff990ed2217d4dbe809c8963531c6153e8d3875
                                      • Instruction Fuzzy Hash: 00318675A00218EFDB21DB999C81E9FBBFCEB85315B1041ABFC0497322D6B44E44CB98
                                      APIs
                                      • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 0048C306
                                      • DeleteMenu.USER32(?,00000007,00000000), ref: 0048C34C
                                      • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,004F1990,01065BD8), ref: 0048C395
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Menu$Delete$InfoItem
                                      • String ID: 0
                                      • API String ID: 135850232-4108050209
                                      • Opcode ID: 5dd5126d07bdadd03a98b299f125f03a407fb457726b327dc3812fc79054afcf
                                      • Instruction ID: 6bf9573f0b25be86350bfd945495980d7889344203c72767b02a203235e56a2b
                                      • Opcode Fuzzy Hash: 5dd5126d07bdadd03a98b299f125f03a407fb457726b327dc3812fc79054afcf
                                      • Instruction Fuzzy Hash: B8419F31204301AFD720EF25D884B1FBBE4EB85314F048A2EFCA597391D738A905CB6A
                                      APIs
                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,004BCC08,00000000,?,?,?,?), ref: 004B44AA
                                      • GetWindowLongW.USER32 ref: 004B44C7
                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004B44D7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Window$Long
                                      • String ID: SysTreeView32
                                      • API String ID: 847901565-1698111956
                                      • Opcode ID: a3e35c5cb41f712149d687dc1e3d5f498d3e88efd80b24430ef2ee747d5d11fa
                                      • Instruction ID: 204cf708bcadb9cdcdda28ebfc0c9de7c9a0bbf77378ac9f136e8d5cc25ed836
                                      • Opcode Fuzzy Hash: a3e35c5cb41f712149d687dc1e3d5f498d3e88efd80b24430ef2ee747d5d11fa
                                      • Instruction Fuzzy Hash: 99317031210605AFDF209E38DC85BE777A9EB48334F204726F975922D1D778AC619764
                                      APIs
                                      • SysReAllocString.OLEAUT32(?,?), ref: 00486EED
                                      • VariantCopyInd.OLEAUT32(?,?), ref: 00486F08
                                      • VariantClear.OLEAUT32(?), ref: 00486F12
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Variant$AllocClearCopyString
                                      • String ID: *jH
                                      • API String ID: 2173805711-764301483
                                      • Opcode ID: 2f7f44927b0ce6e65b90ce0a89e67f274ff4e67c5affd040ccba11c8ba483775
                                      • Instruction ID: ac4effc132183ce3479042e71129b3a4e07c477b6cb3d441e5c3a415d3bdc5f8
                                      • Opcode Fuzzy Hash: 2f7f44927b0ce6e65b90ce0a89e67f274ff4e67c5affd040ccba11c8ba483775
                                      • Instruction Fuzzy Hash: CB31A171704255DBCB05BF65E8909BE3775EF88308B1108AEFB064B2A1C738D912EBD9
                                      APIs
                                        • Part of subcall function 004A335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,004A3077,?,?), ref: 004A3378
                                      • inet_addr.WSOCK32(?), ref: 004A307A
                                      • _wcslen.LIBCMT ref: 004A309B
                                      • htons.WSOCK32(00000000), ref: 004A3106
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                      • String ID: 255.255.255.255
                                      • API String ID: 946324512-2422070025
                                      • Opcode ID: 1a5cb7c6f8ac9489257cc064ff0c1e4dfb5bdaf805dbd42b5abbcb582ef90f6f
                                      • Instruction ID: e774f241db1fb02ff180f282e4c431f0812ee727b11b93867dede219b511785f
                                      • Opcode Fuzzy Hash: 1a5cb7c6f8ac9489257cc064ff0c1e4dfb5bdaf805dbd42b5abbcb582ef90f6f
                                      • Instruction Fuzzy Hash: 503107352042019FCB10CF69C485EAA77E0EF26319F24805AF8158F392EB39EE41C765
                                      APIs
                                      • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 004B4705
                                      • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 004B4713
                                      • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 004B471A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: MessageSend$DestroyWindow
                                      • String ID: msctls_updown32
                                      • API String ID: 4014797782-2298589950
                                      • Opcode ID: f82be2eeab1e12ce25c934dde41d5a09f57d8e26b90a3bd7c678d7a09a7fc234
                                      • Instruction ID: 70f1b440d169892d890dcbacfb40e469e6d13cc0af1cb9bc3e38db8c01cf0f87
                                      • Opcode Fuzzy Hash: f82be2eeab1e12ce25c934dde41d5a09f57d8e26b90a3bd7c678d7a09a7fc234
                                      • Instruction Fuzzy Hash: 572132B5600205AFDB10DF65DCC1DB737ADEB9A358B14015AFA0097361DB75EC21CA74
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: _wcslen
                                      • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                      • API String ID: 176396367-2734436370
                                      • Opcode ID: 33d56927308b5470342ee6abd57e9a5ed7dc402d271219a1fd63a88ca3e0c58f
                                      • Instruction ID: 8b665dd323efb9f2dba6666a9c507dfa533ed268a469f9ccfb59864a218d5ee9
                                      • Opcode Fuzzy Hash: 33d56927308b5470342ee6abd57e9a5ed7dc402d271219a1fd63a88ca3e0c58f
                                      • Instruction Fuzzy Hash: 7821387220492066D331BA259C02FBF73D89FA5314F58482FF949A7241FB5DAD46C3AD
                                      APIs
                                      • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 004B3840
                                      • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 004B3850
                                      • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 004B3876
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: MessageSend$MoveWindow
                                      • String ID: Listbox
                                      • API String ID: 3315199576-2633736733
                                      • Opcode ID: 3b91f3be9f384d003283e0c03bad898c98a46748bd223ad46c28a3864428da1b
                                      • Instruction ID: e631bfddd83fd2cb719c87a705301737f3890382b0f971c4e61941e767bdac22
                                      • Opcode Fuzzy Hash: 3b91f3be9f384d003283e0c03bad898c98a46748bd223ad46c28a3864428da1b
                                      • Instruction Fuzzy Hash: D421F272600118BBEF119F56CC84FFB37AEEF89754F108126F9009B290CA75DC1287A4
                                      APIs
                                      • SetErrorMode.KERNEL32(00000001), ref: 00494A08
                                      • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00494A5C
                                      • SetErrorMode.KERNEL32(00000000,?,?,004BCC08), ref: 00494AD0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ErrorMode$InformationVolume
                                      • String ID: %lu
                                      • API String ID: 2507767853-685833217
                                      • Opcode ID: b4025d4e7d137b08b4f2b74261b74566e04a1c5f9597c6bffebb024ca201ec6d
                                      • Instruction ID: 66d0c237914ec711c5d637fc1125b9ca6e1da710b368250bb5100d2eb150f541
                                      • Opcode Fuzzy Hash: b4025d4e7d137b08b4f2b74261b74566e04a1c5f9597c6bffebb024ca201ec6d
                                      • Instruction Fuzzy Hash: EA314F75A00108AFDB10DF55C885EAA7BF8EF48308F1440AAF505EB252D775ED46CB65
                                      APIs
                                      • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 004B424F
                                      • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 004B4264
                                      • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 004B4271
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID: msctls_trackbar32
                                      • API String ID: 3850602802-1010561917
                                      • Opcode ID: 01d06bf3f5704b66f945f0b061007fd55e58c3d053b1e7eac3a0ff6c0efe14a5
                                      • Instruction ID: 204ca203c13002ab3d639ae452addea04f5b4267f41e80a55fd05f08e03e7b4e
                                      • Opcode Fuzzy Hash: 01d06bf3f5704b66f945f0b061007fd55e58c3d053b1e7eac3a0ff6c0efe14a5
                                      • Instruction Fuzzy Hash: A711E331240248BEEF209E29CC46FEB3BACEF95B64F110129FA55E21A1D275DC119B68
                                      APIs
                                        • Part of subcall function 00426B57: _wcslen.LIBCMT ref: 00426B6A
                                        • Part of subcall function 00482DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00482DC5
                                        • Part of subcall function 00482DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00482DD6
                                        • Part of subcall function 00482DA7: GetCurrentThreadId.KERNEL32 ref: 00482DDD
                                        • Part of subcall function 00482DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00482DE4
                                      • GetFocus.USER32 ref: 00482F78
                                        • Part of subcall function 00482DEE: GetParent.USER32(00000000), ref: 00482DF9
                                      • GetClassNameW.USER32(?,?,00000100), ref: 00482FC3
                                      • EnumChildWindows.USER32(?,0048303B), ref: 00482FEB
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                      • String ID: %s%d
                                      • API String ID: 1272988791-1110647743
                                      • Opcode ID: 643ae62dce4d4d7ba371c44689d63e60232847ffba0135f477f2ec708deacf5a
                                      • Instruction ID: a4538c820e21ac1caddba05055e1d08bee8d88a6c2a9986f0ff6b7da4fe22347
                                      • Opcode Fuzzy Hash: 643ae62dce4d4d7ba371c44689d63e60232847ffba0135f477f2ec708deacf5a
                                      • Instruction Fuzzy Hash: D911D2717002156BCF10BF759CC5EEE3BAAAF84309F04447BF9099B252DE7899498B78
                                      APIs
                                      • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 004B58C1
                                      • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 004B58EE
                                      • DrawMenuBar.USER32(?), ref: 004B58FD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Menu$InfoItem$Draw
                                      • String ID: 0
                                      • API String ID: 3227129158-4108050209
                                      • Opcode ID: e25bac3bf1199dc0158d62ebc39f44b554df874c5e5445f84c858b1612c205f5
                                      • Instruction ID: ca80ad3e9d66659a38455b140cc0775a5c25ddc9b04a7f41823da67ed56f4b11
                                      • Opcode Fuzzy Hash: e25bac3bf1199dc0158d62ebc39f44b554df874c5e5445f84c858b1612c205f5
                                      • Instruction Fuzzy Hash: C3016D71500218EFDB219F21DC85BEFBBB4FB45364F1480AAE849D6251DB348A84EF39
                                      APIs
                                      • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 0047D3BF
                                      • FreeLibrary.KERNEL32 ref: 0047D3E5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: AddressFreeLibraryProc
                                      • String ID: GetSystemWow64DirectoryW$X64
                                      • API String ID: 3013587201-2590602151
                                      • Opcode ID: 0b8d616db385dfffcdef5f08b44d712a8af3f4131849a941405d62ebcfba0b75
                                      • Instruction ID: 20bd7460cb6750d3814360168ae0a30faa0cd7d032d5132e753d26021e2cf226
                                      • Opcode Fuzzy Hash: 0b8d616db385dfffcdef5f08b44d712a8af3f4131849a941405d62ebcfba0b75
                                      • Instruction Fuzzy Hash: EBF02721C1151087D33102104CD4AEA3234AF10701F55C297EC09F1249D75CCC4746AE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: de09f925af759e0ff21854ccfe1760e45a3a0db6480da31815d5f878691ee075
                                      • Instruction ID: 9ab60f6b421474d75d033d00a5a42908e79777749b3cc866d70c2233b6bf3388
                                      • Opcode Fuzzy Hash: de09f925af759e0ff21854ccfe1760e45a3a0db6480da31815d5f878691ee075
                                      • Instruction Fuzzy Hash: A9C19D35A10206EFDB54DF98C888EAEB7B5FF48304F108999E805EB251C735EE45CB94
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Variant$ClearInitInitializeUninitialize
                                      • String ID:
                                      • API String ID: 1998397398-0
                                      • Opcode ID: c974e687992121a6a7449308707f58d0d5d117612c31908c5a80fa048ea162f8
                                      • Instruction ID: 9fcc5de707a8e1feaef9ec97938c0ec05c1f4c8a7a4b3635c7b2dc1e05caad9f
                                      • Opcode Fuzzy Hash: c974e687992121a6a7449308707f58d0d5d117612c31908c5a80fa048ea162f8
                                      • Instruction Fuzzy Hash: 53A17E75604310AFC710DF29C485A1AB7E4FF89319F04885EF98A9B362DB38ED41CB99
                                      APIs
                                      • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,004BFC08,?), ref: 004805F0
                                      • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,004BFC08,?), ref: 00480608
                                      • CLSIDFromProgID.OLE32(?,?,00000000,004BCC40,000000FF,?,00000000,00000800,00000000,?,004BFC08,?), ref: 0048062D
                                      • _memcmp.LIBVCRUNTIME ref: 0048064E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: FromProg$FreeTask_memcmp
                                      • String ID:
                                      • API String ID: 314563124-0
                                      • Opcode ID: ee0be8135f365958da0ef97cc270e6efcb26184691b045c130151e62ddc14218
                                      • Instruction ID: fc907545fdf7bf24e909cb1e6184a20627883c6e2c8fe4f2b972bc731ada71bb
                                      • Opcode Fuzzy Hash: ee0be8135f365958da0ef97cc270e6efcb26184691b045c130151e62ddc14218
                                      • Instruction Fuzzy Hash: 65816A71A10109EFCB04DF98C984EEEB7B9FF89305F204559F506AB250DB35AE0ACB64
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: _free
                                      • String ID:
                                      • API String ID: 269201875-0
                                      • Opcode ID: 17ba1484cf829d3327b6c6cde29d96cfd78def2cf112363784942f9f5fb4a74c
                                      • Instruction ID: 1bfe3a0a426df0d41724d4e10dee73d1c6b4362e24bf8546ed1f722f5aa4c58e
                                      • Opcode Fuzzy Hash: 17ba1484cf829d3327b6c6cde29d96cfd78def2cf112363784942f9f5fb4a74c
                                      • Instruction Fuzzy Hash: 2E413F31900110ABEB256BBA8C456BF3AA4EF41374F1C426BF815D73B2FA7C4C45526B
                                      APIs
                                      • GetWindowRect.USER32(?,?), ref: 004B62E2
                                      • ScreenToClient.USER32(?,?), ref: 004B6315
                                      • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 004B6382
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Window$ClientMoveRectScreen
                                      • String ID:
                                      • API String ID: 3880355969-0
                                      • Opcode ID: fefe5fa3ee83f83da7a65df4fc1d8efff5f673be0dd509f6f301032b299389f2
                                      • Instruction ID: d8406250de2cbef6bdd8d73f0f24ec65dcaf85515f3c220e4f41130a1a425617
                                      • Opcode Fuzzy Hash: fefe5fa3ee83f83da7a65df4fc1d8efff5f673be0dd509f6f301032b299389f2
                                      • Instruction Fuzzy Hash: 9B514B70A00209EFDB14DF68D8809EE7BF5EB55360F11826AF915973A0D738ED51CBA4
                                      APIs
                                      • socket.WSOCK32(00000002,00000002,00000011), ref: 004A1AFD
                                      • WSAGetLastError.WSOCK32 ref: 004A1B0B
                                      • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 004A1B8A
                                      • WSAGetLastError.WSOCK32 ref: 004A1B94
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ErrorLast$socket
                                      • String ID:
                                      • API String ID: 1881357543-0
                                      • Opcode ID: 94f5da5c05df3d2cc175c750d77d5f1da24ce8200136cc1a9dbde37e766e33d4
                                      • Instruction ID: ba6158d5fc3aff056c11d256bdc5ff1c03b58d06852d8cdb6ee353809788f6b0
                                      • Opcode Fuzzy Hash: 94f5da5c05df3d2cc175c750d77d5f1da24ce8200136cc1a9dbde37e766e33d4
                                      • Instruction Fuzzy Hash: 0D41F134600200AFE720AF20D886F2A77E5AB48318F54854DF91A9F7D2D77AED418B94
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d1208194b4ad79bb7beba527b6985801d36ee099beef74277667249bdbc301f5
                                      • Instruction ID: 0a59505293fa7104a2b326d0f3faf6bc19c3567bcacbad053ccd949c0be44746
                                      • Opcode Fuzzy Hash: d1208194b4ad79bb7beba527b6985801d36ee099beef74277667249bdbc301f5
                                      • Instruction Fuzzy Hash: 39411771A00304BFD7249F39CC41B6ABBA9EB89715F20452FF941DB292E379A90587C4
                                      APIs
                                      • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00495783
                                      • GetLastError.KERNEL32(?,00000000), ref: 004957A9
                                      • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 004957CE
                                      • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 004957FA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: CreateHardLink$DeleteErrorFileLast
                                      • String ID:
                                      • API String ID: 3321077145-0
                                      • Opcode ID: d916f67ef3df59a166be62658cb0d740e59ee1474cd853f9b190e4c922489eb3
                                      • Instruction ID: c669df5704f72fa891aa3dd95937545812132123a14b359513d21d7a1adcef73
                                      • Opcode Fuzzy Hash: d916f67ef3df59a166be62658cb0d740e59ee1474cd853f9b190e4c922489eb3
                                      • Instruction Fuzzy Hash: 4F416035700610DFCB11EF55D584A1EBBE1EF49318B598499E84A6B361CB38FD40CB95
                                      APIs
                                      • MultiByteToWideChar.KERNEL32(?,00000000,?,00446D71,00000000,00000000,004482D9,?,004482D9,?,00000001,00446D71,?,00000001,004482D9,004482D9), ref: 0045D910
                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0045D999
                                      • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 0045D9AB
                                      • __freea.LIBCMT ref: 0045D9B4
                                        • Part of subcall function 00453820: RtlAllocateHeap.NTDLL(00000000,?,004F1444,?,0043FDF5,?,?,0042A976,00000010,004F1440,004213FC,?,004213C6,?,00421129), ref: 00453852
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                      • String ID:
                                      • API String ID: 2652629310-0
                                      • Opcode ID: 9457dccf3b8321d48c7204193e2fedc9ef839dc887097d9e6e0a7a5edabd7917
                                      • Instruction ID: f8d308ad01f2f33b2b8a5df883c787780ab5ba330c8c03114524331aca9c03d4
                                      • Opcode Fuzzy Hash: 9457dccf3b8321d48c7204193e2fedc9ef839dc887097d9e6e0a7a5edabd7917
                                      • Instruction Fuzzy Hash: 0731A2B2A0020AABDF24DF65DC81EAF7BA5EF41311F05416AFC04D6252EB39CD58CB94
                                      APIs
                                      • SendMessageW.USER32(?,00001024,00000000,?), ref: 004B5352
                                      • GetWindowLongW.USER32(?,000000F0), ref: 004B5375
                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004B5382
                                      • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 004B53A8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: LongWindow$InvalidateMessageRectSend
                                      • String ID:
                                      • API String ID: 3340791633-0
                                      • Opcode ID: f33e63b42cd8f4051f213b01eb4eaaadcc599b0b66d42fcad99f1bdd37d20f6a
                                      • Instruction ID: 0e6be3fb93005571dbf625096ca755da9f062133771ba449ee602e294daacbc5
                                      • Opcode Fuzzy Hash: f33e63b42cd8f4051f213b01eb4eaaadcc599b0b66d42fcad99f1bdd37d20f6a
                                      • Instruction Fuzzy Hash: 9D31E330A55A08EFEF309E14DC45FEAB7E1AB04390F586113BE00963E0C3BD9991D76A
                                      APIs
                                      • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 0048ABF1
                                      • SetKeyboardState.USER32(00000080,?,00008000), ref: 0048AC0D
                                      • PostMessageW.USER32(00000000,00000101,00000000), ref: 0048AC74
                                      • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 0048ACC6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: KeyboardState$InputMessagePostSend
                                      • String ID:
                                      • API String ID: 432972143-0
                                      • Opcode ID: ae933521faa7089b24bf4fc7925217221ef43c815738b662581163de69c6636e
                                      • Instruction ID: 06309ff33da90795a22d353672351e6ec802fa2cd1cb28ad035d0b17f13bfa76
                                      • Opcode Fuzzy Hash: ae933521faa7089b24bf4fc7925217221ef43c815738b662581163de69c6636e
                                      • Instruction Fuzzy Hash: 98311870A006186FFB35EB658848BFF7BA5AB45310F084B1BE481522D0C3BD89A1875A
                                      APIs
                                      • ClientToScreen.USER32(?,?), ref: 004B769A
                                      • GetWindowRect.USER32(?,?), ref: 004B7710
                                      • PtInRect.USER32(?,?,004B8B89), ref: 004B7720
                                      • MessageBeep.USER32(00000000), ref: 004B778C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Rect$BeepClientMessageScreenWindow
                                      • String ID:
                                      • API String ID: 1352109105-0
                                      • Opcode ID: c5cab7f38cb4b9fa88fbec202baf95c282a0d5e32bf9de60be190ba4343e86b1
                                      • Instruction ID: e8618f4d2f749d5fe1c815d1b6152c9bcd229f3e0189e84d5168ab5000a5e89d
                                      • Opcode Fuzzy Hash: c5cab7f38cb4b9fa88fbec202baf95c282a0d5e32bf9de60be190ba4343e86b1
                                      • Instruction Fuzzy Hash: F5418D74609214DFCB11CF59C894EE977F4FB88314F1541AAE4159B361CB78B942CFA8
                                      APIs
                                      • GetForegroundWindow.USER32 ref: 004B16EB
                                        • Part of subcall function 00483A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00483A57
                                        • Part of subcall function 00483A3D: GetCurrentThreadId.KERNEL32 ref: 00483A5E
                                        • Part of subcall function 00483A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,004825B3), ref: 00483A65
                                      • GetCaretPos.USER32(?), ref: 004B16FF
                                      • ClientToScreen.USER32(00000000,?), ref: 004B174C
                                      • GetForegroundWindow.USER32 ref: 004B1752
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                      • String ID:
                                      • API String ID: 2759813231-0
                                      • Opcode ID: c9975b9f9cac0f7070dd10f55953013153ca97af8349009b070d0191633d3171
                                      • Instruction ID: 184c7456119d58fffb0fe43f420fe7d621110ba106e8e589ebc2ae7b67f42ee1
                                      • Opcode Fuzzy Hash: c9975b9f9cac0f7070dd10f55953013153ca97af8349009b070d0191633d3171
                                      • Instruction Fuzzy Hash: 8F315271E00159AFC700EFAAD8C1DEEB7F9EF48308B50406EE415E7211DA359E45CBA4
                                      APIs
                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 0048D501
                                      • Process32FirstW.KERNEL32(00000000,?), ref: 0048D50F
                                      • Process32NextW.KERNEL32(00000000,?), ref: 0048D52F
                                      • CloseHandle.KERNEL32(00000000), ref: 0048D5DC
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                      • String ID:
                                      • API String ID: 420147892-0
                                      • Opcode ID: 92d6c7e96e70b6aa0a51d6c64c36c2637f256ab3119792e2f7f76013c549f901
                                      • Instruction ID: a0de815822e9480619cea1a073aa7c8eddbfb123211e31eb7355c880155afbd4
                                      • Opcode Fuzzy Hash: 92d6c7e96e70b6aa0a51d6c64c36c2637f256ab3119792e2f7f76013c549f901
                                      • Instruction Fuzzy Hash: 2831C471508300AFD300EF55D8C1AAFBBF8EF99348F54092EF581921A1EB759948CB96
                                      APIs
                                        • Part of subcall function 00439BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00439BB2
                                      • GetCursorPos.USER32(?), ref: 004B9001
                                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00477711,?,?,?,?,?), ref: 004B9016
                                      • GetCursorPos.USER32(?), ref: 004B905E
                                      • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00477711,?,?,?), ref: 004B9094
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Cursor$LongMenuPopupProcTrackWindow
                                      • String ID:
                                      • API String ID: 2864067406-0
                                      • Opcode ID: 2042b122bee4bedd48dfa86b67cda9ba5bdd2a320e7ca808fcba453ebec5cacd
                                      • Instruction ID: 6613b867b8a4de51f150d749f9c6bf061b01b5b977dabcd9ab291559f9ea9f78
                                      • Opcode Fuzzy Hash: 2042b122bee4bedd48dfa86b67cda9ba5bdd2a320e7ca808fcba453ebec5cacd
                                      • Instruction Fuzzy Hash: 28218D35600018FFCB259F94C898EFB7BB9EB4A350F14416AFA0547261C3799D60DB64
                                      APIs
                                      • GetFileAttributesW.KERNEL32(?,004BCB68), ref: 0048D2FB
                                      • GetLastError.KERNEL32 ref: 0048D30A
                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 0048D319
                                      • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,004BCB68), ref: 0048D376
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: CreateDirectory$AttributesErrorFileLast
                                      • String ID:
                                      • API String ID: 2267087916-0
                                      • Opcode ID: e9f23aee3665371ce93f30f9370e9a499ad6a424542d6c10d3666d003378992c
                                      • Instruction ID: de382b2a10fe0210150a9e9c9afb366803306e0f6e8a128d786eda0028050853
                                      • Opcode Fuzzy Hash: e9f23aee3665371ce93f30f9370e9a499ad6a424542d6c10d3666d003378992c
                                      • Instruction Fuzzy Hash: FB2182709092019F8700EF25D88146FB7E4AE5A368F504E2EF899C72E1D7349946CB9B
                                      APIs
                                        • Part of subcall function 00481014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0048102A
                                        • Part of subcall function 00481014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00481036
                                        • Part of subcall function 00481014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00481045
                                        • Part of subcall function 00481014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0048104C
                                        • Part of subcall function 00481014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00481062
                                      • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 004815BE
                                      • _memcmp.LIBVCRUNTIME ref: 004815E1
                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00481617
                                      • HeapFree.KERNEL32(00000000), ref: 0048161E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                      • String ID:
                                      • API String ID: 1592001646-0
                                      • Opcode ID: d9efd31d00b4ef152e7009c2a5e8d5021ca0b0d45118335ae36414df67d373a5
                                      • Instruction ID: 30ed0c53dc8b00ed638d413b024ec899f5cad5f42378d9621da02af680d24350
                                      • Opcode Fuzzy Hash: d9efd31d00b4ef152e7009c2a5e8d5021ca0b0d45118335ae36414df67d373a5
                                      • Instruction Fuzzy Hash: EF217C71E40108EFDB00EFA4C985BEEB7B8EF44344F08485AE441AB251E734AA06CBA4
                                      APIs
                                      • GetWindowLongW.USER32(?,000000EC), ref: 004B280A
                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 004B2824
                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 004B2832
                                      • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 004B2840
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Window$Long$AttributesLayered
                                      • String ID:
                                      • API String ID: 2169480361-0
                                      • Opcode ID: 4f100e35411f096193d924f6db43d37c538483f06ec6cc35c5273bb9d4437376
                                      • Instruction ID: 2db9a25236aa46288435b735dd4e31b1ea17117cd66de86a50de21ee9ec6e14d
                                      • Opcode Fuzzy Hash: 4f100e35411f096193d924f6db43d37c538483f06ec6cc35c5273bb9d4437376
                                      • Instruction Fuzzy Hash: E321B531204511BFD7149B24C984FAA7755AF45328F14425AF4268B6D2CBB9FC42C7E8
                                      APIs
                                        • Part of subcall function 00488D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,0048790A,?,000000FF,?,00488754,00000000,?,0000001C,?,?), ref: 00488D8C
                                        • Part of subcall function 00488D7D: lstrcpyW.KERNEL32(00000000,?,?,0048790A,?,000000FF,?,00488754,00000000,?,0000001C,?,?,00000000), ref: 00488DB2
                                        • Part of subcall function 00488D7D: lstrcmpiW.KERNEL32(00000000,?,0048790A,?,000000FF,?,00488754,00000000,?,0000001C,?,?), ref: 00488DE3
                                      • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00488754,00000000,?,0000001C,?,?,00000000), ref: 00487923
                                      • lstrcpyW.KERNEL32(00000000,?,?,00488754,00000000,?,0000001C,?,?,00000000), ref: 00487949
                                      • lstrcmpiW.KERNEL32(00000002,cdecl,?,00488754,00000000,?,0000001C,?,?,00000000), ref: 00487984
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: lstrcmpilstrcpylstrlen
                                      • String ID: cdecl
                                      • API String ID: 4031866154-3896280584
                                      • Opcode ID: 6f99052523e3d5439adeae1acf025477013065329c62765915e637b34acc6412
                                      • Instruction ID: 7f5926e7357e3536081469194d913d4d4ae6c4b81fd1643ca09f12e811ec1d6e
                                      • Opcode Fuzzy Hash: 6f99052523e3d5439adeae1acf025477013065329c62765915e637b34acc6412
                                      • Instruction Fuzzy Hash: 9C11E47A200202ABDB15AF39C895E7F77A9EF45394B50442FE842C7365EB35D801C759
                                      APIs
                                      • GetWindowLongW.USER32(?,000000F0), ref: 004B7D0B
                                      • SetWindowLongW.USER32(00000000,000000F0,?), ref: 004B7D2A
                                      • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 004B7D42
                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0049B7AD,00000000), ref: 004B7D6B
                                        • Part of subcall function 00439BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00439BB2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Window$Long
                                      • String ID:
                                      • API String ID: 847901565-0
                                      • Opcode ID: adf7e8ab50b9e2cd7efc97dc422cf6f84143961fe2954e0be94482fb9f7f5e2c
                                      • Instruction ID: 2fe2caa6182871a562d2068206ff8be75a8992095f73fe37a7fbcbcf1acdf0c6
                                      • Opcode Fuzzy Hash: adf7e8ab50b9e2cd7efc97dc422cf6f84143961fe2954e0be94482fb9f7f5e2c
                                      • Instruction Fuzzy Hash: 36119031604615AFCB109F28CC44EB63BA9AF853A0B254729F839D72F0D7359951CBA8
                                      APIs
                                      • SendMessageW.USER32(?,00001060,?,00000004), ref: 004B56BB
                                      • _wcslen.LIBCMT ref: 004B56CD
                                      • _wcslen.LIBCMT ref: 004B56D8
                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 004B5816
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: MessageSend_wcslen
                                      • String ID:
                                      • API String ID: 455545452-0
                                      • Opcode ID: f2599779d53c206d1e114f21a0529219c9104954eb086b883cecc2307d5863a2
                                      • Instruction ID: 022dbdf3068df7d3ad6fe211184b168dadec6c6da3fc42438481b9884a59d630
                                      • Opcode Fuzzy Hash: f2599779d53c206d1e114f21a0529219c9104954eb086b883cecc2307d5863a2
                                      • Instruction Fuzzy Hash: 3F11B471600608AADB20EF658C85BEFB77CEF20764F10412BF915D6181EB788985CB79
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2d09fbee280a60037c98980a0ad3f93bdecd0b79fb57fff8add633e2b2bbc11d
                                      • Instruction ID: 6c1588da84d5db776960ec0578b49e2a0bd71fd319df9ca0f26c843981aa70ff
                                      • Opcode Fuzzy Hash: 2d09fbee280a60037c98980a0ad3f93bdecd0b79fb57fff8add633e2b2bbc11d
                                      • Instruction Fuzzy Hash: ED0184B22056163EF62116796CC0F67662CDF813BAB30032BFD31612E3DB68AC4D4168
                                      APIs
                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00481A47
                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00481A59
                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00481A6F
                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00481A8A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID:
                                      • API String ID: 3850602802-0
                                      • Opcode ID: e7afcce0c5e6d0bd1cd1f8f0790d36536dce0635a0a0b696a7f2e4d61bc3c2b3
                                      • Instruction ID: 17f29cfd9b347f90bad695763cfc3c9acfc7f2e2d34679ac7f7349a17687473d
                                      • Opcode Fuzzy Hash: e7afcce0c5e6d0bd1cd1f8f0790d36536dce0635a0a0b696a7f2e4d61bc3c2b3
                                      • Instruction Fuzzy Hash: FA113C3AD01219FFEB11DBA5CD85FADBB78EB08750F200492E610B7290D6716E51DB98
                                      APIs
                                      • GetCurrentThreadId.KERNEL32 ref: 0048E1FD
                                      • MessageBoxW.USER32(?,?,?,?), ref: 0048E230
                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 0048E246
                                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0048E24D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                      • String ID:
                                      • API String ID: 2880819207-0
                                      • Opcode ID: 51f4cbf7a6ce11ceba81c30193d59b9e2d8b3fde74bb8a8f232a1ac28ba39f3a
                                      • Instruction ID: 32ae2fb48bfcd29af9fcba0a2de481cac6dffb03f7578fafceec169fca78f6c5
                                      • Opcode Fuzzy Hash: 51f4cbf7a6ce11ceba81c30193d59b9e2d8b3fde74bb8a8f232a1ac28ba39f3a
                                      • Instruction Fuzzy Hash: D1110872904214FBD701AFA99C85AAF7FADAB45310F104776F814E32A1D6B48D1087A8
                                      APIs
                                      • CreateThread.KERNEL32(00000000,?,0044CFF9,00000000,00000004,00000000), ref: 0044D218
                                      • GetLastError.KERNEL32 ref: 0044D224
                                      • __dosmaperr.LIBCMT ref: 0044D22B
                                      • ResumeThread.KERNEL32(00000000), ref: 0044D249
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Thread$CreateErrorLastResume__dosmaperr
                                      • String ID:
                                      • API String ID: 173952441-0
                                      • Opcode ID: 4bf0ea85e7e37efefc6af16c449324472e4c3ae72031332e3e026429e639588d
                                      • Instruction ID: 440429aa2624c5baef7450877472a1b924df2ecfb66f1cfdd2f9ee9b23403568
                                      • Opcode Fuzzy Hash: 4bf0ea85e7e37efefc6af16c449324472e4c3ae72031332e3e026429e639588d
                                      • Instruction Fuzzy Hash: FB012632C051047BEB105BA6DC49BAF7A68EF81334F10036BF824921D0CFB9C805C6A9
                                      APIs
                                      • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0042604C
                                      • GetStockObject.GDI32(00000011), ref: 00426060
                                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 0042606A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: CreateMessageObjectSendStockWindow
                                      • String ID:
                                      • API String ID: 3970641297-0
                                      • Opcode ID: 10673ed9f00e6fed51b8a31d7e4de800ef936a9aadb984801057af9a5bfd0b6f
                                      • Instruction ID: fe575ca44266ba6ec63ba3cca17420b353a1b669c7c07ed729124ab5da811ebc
                                      • Opcode Fuzzy Hash: 10673ed9f00e6fed51b8a31d7e4de800ef936a9aadb984801057af9a5bfd0b6f
                                      • Instruction Fuzzy Hash: 4211A172201519FFEF128FA49C84EEB7B69EF19354F410216FA0452110D736DC60EBA5
                                      APIs
                                      • ___BuildCatchObject.LIBVCRUNTIME ref: 00443B56
                                        • Part of subcall function 00443AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00443AD2
                                        • Part of subcall function 00443AA3: ___AdjustPointer.LIBCMT ref: 00443AED
                                      • _UnwindNestedFrames.LIBCMT ref: 00443B6B
                                      • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00443B7C
                                      • CallCatchBlock.LIBVCRUNTIME ref: 00443BA4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                      • String ID:
                                      • API String ID: 737400349-0
                                      • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                      • Instruction ID: 206eb459b937fce6a28a039aa3506fed5dda4049bff876752660758f0b2f6f89
                                      • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                      • Instruction Fuzzy Hash: F0014432100148BBEF115E96CC41EEB3F6DFF88B59F044019FE4856111C736E961DBA4
                                      APIs
                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,004213C6,00000000,00000000,?,0045301A,004213C6,00000000,00000000,00000000,?,0045328B,00000006,FlsSetValue), ref: 004530A5
                                      • GetLastError.KERNEL32(?,0045301A,004213C6,00000000,00000000,00000000,?,0045328B,00000006,FlsSetValue,004C2290,FlsSetValue,00000000,00000364,?,00452E46), ref: 004530B1
                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0045301A,004213C6,00000000,00000000,00000000,?,0045328B,00000006,FlsSetValue,004C2290,FlsSetValue,00000000), ref: 004530BF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: LibraryLoad$ErrorLast
                                      • String ID:
                                      • API String ID: 3177248105-0
                                      • Opcode ID: dd7fc8d1cfd95dbc5baf0579c7f496a5bd93271a8c482ed33eba8d43a673113f
                                      • Instruction ID: 336a146e823a2b2a7ee73a43b0fd93e24ad053cb28a573cda00137c387d9c391
                                      • Opcode Fuzzy Hash: dd7fc8d1cfd95dbc5baf0579c7f496a5bd93271a8c482ed33eba8d43a673113f
                                      • Instruction Fuzzy Hash: AC01D832741322ABCB214E789CC496777989F45FE3B100731FD05E3286C725D909C6E8
                                      APIs
                                      • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 0048747F
                                      • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00487497
                                      • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 004874AC
                                      • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 004874CA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Type$Register$FileLoadModuleNameUser
                                      • String ID:
                                      • API String ID: 1352324309-0
                                      • Opcode ID: 68622c86a70d8bee16650f7986c95fc4115da6de0aeb49d8b97ab966bf528cfa
                                      • Instruction ID: f9f274d6db1058f6f1d4245b326d65ae73a32cc6967e117db5d9f36d4bd88b0b
                                      • Opcode Fuzzy Hash: 68622c86a70d8bee16650f7986c95fc4115da6de0aeb49d8b97ab966bf528cfa
                                      • Instruction Fuzzy Hash: 001104B1205300AFE7209F14DD58F967FFCEB00F00F20896AEA56D6151D774E904CBA5
                                      APIs
                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0048ACD3,?,00008000), ref: 0048B0C4
                                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0048ACD3,?,00008000), ref: 0048B0E9
                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0048ACD3,?,00008000), ref: 0048B0F3
                                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0048ACD3,?,00008000), ref: 0048B126
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: CounterPerformanceQuerySleep
                                      • String ID:
                                      • API String ID: 2875609808-0
                                      • Opcode ID: 7ee710c1ccca07530ad4254533bd463c70f011b5f692a53a90c5b7f8f8a373ae
                                      • Instruction ID: 7a719b790e67c0d1363c4ba6f2ae16e8727efdbf9e7a86e4c7e08a59080af981
                                      • Opcode Fuzzy Hash: 7ee710c1ccca07530ad4254533bd463c70f011b5f692a53a90c5b7f8f8a373ae
                                      • Instruction Fuzzy Hash: 84115E31C0151CDBCF00EFE9D9986EEBB78FF0A751F10459AD981B6281CB3455518B99
                                      APIs
                                      • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00482DC5
                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 00482DD6
                                      • GetCurrentThreadId.KERNEL32 ref: 00482DDD
                                      • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00482DE4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                      • String ID:
                                      • API String ID: 2710830443-0
                                      • Opcode ID: 741799f5f7f852a9257eaef1b04031215606ab7dc41563f3f777abdedd7edd8a
                                      • Instruction ID: 25de511150d630fb7bfd87cb78a1817bf05eea82668b8fb4091b5849b5f900fb
                                      • Opcode Fuzzy Hash: 741799f5f7f852a9257eaef1b04031215606ab7dc41563f3f777abdedd7edd8a
                                      • Instruction Fuzzy Hash: 27E092725412247BD7202B729C8DFEB3FACEF42BA1F000626F505D10809AE4C841C7B4
                                      APIs
                                        • Part of subcall function 00439639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00439693
                                        • Part of subcall function 00439639: SelectObject.GDI32(?,00000000), ref: 004396A2
                                        • Part of subcall function 00439639: BeginPath.GDI32(?), ref: 004396B9
                                        • Part of subcall function 00439639: SelectObject.GDI32(?,00000000), ref: 004396E2
                                      • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 004B8887
                                      • LineTo.GDI32(?,?,?), ref: 004B8894
                                      • EndPath.GDI32(?), ref: 004B88A4
                                      • StrokePath.GDI32(?), ref: 004B88B2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                      • String ID:
                                      • API String ID: 1539411459-0
                                      • Opcode ID: f9fc80daa7187f23315b88871c360af5c27d8fa16118747172ed28453fb9b726
                                      • Instruction ID: 5eb27a4352b6de61ad9c23b333954d8197ee72f117333690417c05732d85534d
                                      • Opcode Fuzzy Hash: f9fc80daa7187f23315b88871c360af5c27d8fa16118747172ed28453fb9b726
                                      • Instruction Fuzzy Hash: ECF05E36042259FBDB126F94AC8AFDE3F59AF06310F048115FA11651E1C7B95521CFED
                                      APIs
                                      • GetSysColor.USER32(00000008), ref: 004398CC
                                      • SetTextColor.GDI32(?,?), ref: 004398D6
                                      • SetBkMode.GDI32(?,00000001), ref: 004398E9
                                      • GetStockObject.GDI32(00000005), ref: 004398F1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Color$ModeObjectStockText
                                      • String ID:
                                      • API String ID: 4037423528-0
                                      • Opcode ID: 40d7b848b5850b76976a4b610e4220acfa4ee3c2bcb40607897062a5d2673bb2
                                      • Instruction ID: 098c4cd04a098d7eae85ce8b764ac150a3f0574c0d9237674d49ecb4cb5764ca
                                      • Opcode Fuzzy Hash: 40d7b848b5850b76976a4b610e4220acfa4ee3c2bcb40607897062a5d2673bb2
                                      • Instruction Fuzzy Hash: E1E06D31244280BBDB215B78AC89BE93F20AB12336F04C32AF6FA681E1C37546509F24
                                      APIs
                                      • GetCurrentThread.KERNEL32 ref: 00481634
                                      • OpenThreadToken.ADVAPI32(00000000,?,?,?,004811D9), ref: 0048163B
                                      • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,004811D9), ref: 00481648
                                      • OpenProcessToken.ADVAPI32(00000000,?,?,?,004811D9), ref: 0048164F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: CurrentOpenProcessThreadToken
                                      • String ID:
                                      • API String ID: 3974789173-0
                                      • Opcode ID: 91c2dedbf86cb800545240d28ac6e754e9b6b7329db22a8f4e78390600bd474a
                                      • Instruction ID: 228221741c2d7fa44cfcfd0621087d1f22f7a53dbd51b66ff3d8cd797e6ee5f3
                                      • Opcode Fuzzy Hash: 91c2dedbf86cb800545240d28ac6e754e9b6b7329db22a8f4e78390600bd474a
                                      • Instruction Fuzzy Hash: BFE08631601211DBD7202FE09D8DB8B3B7CAF54791F184929F686D9090E6384441C7A8
                                      APIs
                                      • GetDesktopWindow.USER32 ref: 0047D858
                                      • GetDC.USER32(00000000), ref: 0047D862
                                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0047D882
                                      • ReleaseDC.USER32(?), ref: 0047D8A3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: CapsDesktopDeviceReleaseWindow
                                      • String ID:
                                      • API String ID: 2889604237-0
                                      • Opcode ID: 8d39a549cc9496daa7678e109253823c0b964ab58b179af5d504787145bc635c
                                      • Instruction ID: b354efc3c8101b157f3cb07dd2a10257ad8a79cbc724c26dee49697c82867619
                                      • Opcode Fuzzy Hash: 8d39a549cc9496daa7678e109253823c0b964ab58b179af5d504787145bc635c
                                      • Instruction Fuzzy Hash: DCE01AB4C00204DFCB41AFE5D988A6DBBB6FB48310F10812AE816E7250C7384902AF99
                                      APIs
                                      • GetDesktopWindow.USER32 ref: 0047D86C
                                      • GetDC.USER32(00000000), ref: 0047D876
                                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0047D882
                                      • ReleaseDC.USER32(?), ref: 0047D8A3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: CapsDesktopDeviceReleaseWindow
                                      • String ID:
                                      • API String ID: 2889604237-0
                                      • Opcode ID: fe960969649fdf88e299321a4ba1302ef6115bc71550dafd8e7e6409df986a82
                                      • Instruction ID: 554cd4f5033affcbce3eb312965048469e67e03ace21912cad6294bfde2b4267
                                      • Opcode Fuzzy Hash: fe960969649fdf88e299321a4ba1302ef6115bc71550dafd8e7e6409df986a82
                                      • Instruction Fuzzy Hash: B8E01A74C00204DFCB40AFA4D888A6DBBB1BB48310F108119E806E7250C7385902AF98
                                      APIs
                                        • Part of subcall function 00427620: _wcslen.LIBCMT ref: 00427625
                                      • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00494ED4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Connection_wcslen
                                      • String ID: *$LPT
                                      • API String ID: 1725874428-3443410124
                                      • Opcode ID: 4ed9f3de68f55c8d1dfb02af5e974d7f830299907923f79d35f31ea44eb4080f
                                      • Instruction ID: f8ddf7d5c9f34b8383e21942afc6efe4ec235de26040574c559739ebebd13d8f
                                      • Opcode Fuzzy Hash: 4ed9f3de68f55c8d1dfb02af5e974d7f830299907923f79d35f31ea44eb4080f
                                      • Instruction Fuzzy Hash: 91917175A002159FCF14DF54C484EAABBF1AF88308F1480AAE40A9F752D739ED86CB95
                                      APIs
                                      • __startOneArgErrorHandling.LIBCMT ref: 0044E30D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ErrorHandling__start
                                      • String ID: pow
                                      • API String ID: 3213639722-2276729525
                                      • Opcode ID: 368d4c3248682da70af12363761c2889b51ff9307fcadf9c9367446f8873363b
                                      • Instruction ID: a1fd25de100252a31deeac5836686e7d40dfcd50b5f178c9825d9d7ea2863853
                                      • Opcode Fuzzy Hash: 368d4c3248682da70af12363761c2889b51ff9307fcadf9c9367446f8873363b
                                      • Instruction Fuzzy Hash: EE51826190C20196D7127B16E94277B37A4BB00742F3049BFECD5423EADB7D8C8D964E
                                      APIs
                                      • CharUpperBuffW.USER32(0047569E,00000000,?,004BCC08,?,00000000,00000000), ref: 004A78DD
                                        • Part of subcall function 00426B57: _wcslen.LIBCMT ref: 00426B6A
                                      • CharUpperBuffW.USER32(0047569E,00000000,?,004BCC08,00000000,?,00000000,00000000), ref: 004A783B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: BuffCharUpper$_wcslen
                                      • String ID: <sN
                                      • API String ID: 3544283678-1195803460
                                      • Opcode ID: 7dbb17dc15ab0abaff1db9f8908fe8d1cf52eb9555755235b640563ad187b01d
                                      • Instruction ID: bfb7160f030093b10e1312432d3d507ff0b3eecf7b7d8cdc80c962e03b333f0b
                                      • Opcode Fuzzy Hash: 7dbb17dc15ab0abaff1db9f8908fe8d1cf52eb9555755235b640563ad187b01d
                                      • Instruction Fuzzy Hash: 35618371A14128ABCF14FBA5DC91DFEB378BF24304F84402BE54263151EB3C5A45CBA8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: #
                                      • API String ID: 0-1885708031
                                      • Opcode ID: b58e661c8c8f58677a9a40fc8a1c624904e470d6ffea147c94e07fb9b0686dd1
                                      • Instruction ID: 5d0063d1ee91fe7a48ca78b4491e3e04105434701f5a4d2751376aa415c7774d
                                      • Opcode Fuzzy Hash: b58e661c8c8f58677a9a40fc8a1c624904e470d6ffea147c94e07fb9b0686dd1
                                      • Instruction Fuzzy Hash: 7E514431501206DFDB18DF2AD080AFB7BA8EF19310F24819BE8519B3D0D6389D43CB59
                                      APIs
                                      • Sleep.KERNEL32(00000000), ref: 0043F2A2
                                      • GlobalMemoryStatusEx.KERNEL32(?), ref: 0043F2BB
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: GlobalMemorySleepStatus
                                      • String ID: @
                                      • API String ID: 2783356886-2766056989
                                      • Opcode ID: d3c9e4fcd253d113fe5b9c1131d0fc875bd405e76db8f4ace76d508ea9dc134d
                                      • Instruction ID: 24293c0fc56896a0c17fc01ec14f76f0ebf77e849ef1aa67b9eff314bc8757a7
                                      • Opcode Fuzzy Hash: d3c9e4fcd253d113fe5b9c1131d0fc875bd405e76db8f4ace76d508ea9dc134d
                                      • Instruction Fuzzy Hash: CF5148715087449BD320AF51EC86BAFBBF8FF84304F81885EF1D9411A5EB348529CB6A
                                      APIs
                                      • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 004A57E0
                                      • _wcslen.LIBCMT ref: 004A57EC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: BuffCharUpper_wcslen
                                      • String ID: CALLARGARRAY
                                      • API String ID: 157775604-1150593374
                                      • Opcode ID: 0d4333210c44517850576a9a69c0cf6add2215937ef55cc9879586a03bf7d6c2
                                      • Instruction ID: 3a3f3b33b7eba67267eeaed76f1bcfdaff2b883447ccf224b8572cac2ddc9f89
                                      • Opcode Fuzzy Hash: 0d4333210c44517850576a9a69c0cf6add2215937ef55cc9879586a03bf7d6c2
                                      • Instruction Fuzzy Hash: 3041B071E001099FCB14EFAAC9819AEBBB5FF6A354F10402EE505A7351D73C9D81CBA8
                                      APIs
                                      • _wcslen.LIBCMT ref: 0049D130
                                      • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 0049D13A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: CrackInternet_wcslen
                                      • String ID: |
                                      • API String ID: 596671847-2343686810
                                      • Opcode ID: 003f5cbe8a8f7175c3ba88dea07e84418879ac93c8f370e087472f095aca8684
                                      • Instruction ID: 736f4d12072c409749e33176b69ce7ebfd3ba280f3f7de2d32b83d25b9567af9
                                      • Opcode Fuzzy Hash: 003f5cbe8a8f7175c3ba88dea07e84418879ac93c8f370e087472f095aca8684
                                      • Instruction Fuzzy Hash: A7315071D01119ABCF15EFA5DC85AEF7FB9FF04304F40002AF815A6261DB35A906CB58
                                      APIs
                                      • DestroyWindow.USER32(?,?,?,?), ref: 004B3621
                                      • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 004B365C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Window$DestroyMove
                                      • String ID: static
                                      • API String ID: 2139405536-2160076837
                                      • Opcode ID: 6864f57a17b4fe17a4ce4078a9c87466e0464187cc64ce3612ebed01b397ac20
                                      • Instruction ID: 58368c63d7bbd561711ed666e0bd31592f11f89031b813fd106afa30e35df157
                                      • Opcode Fuzzy Hash: 6864f57a17b4fe17a4ce4078a9c87466e0464187cc64ce3612ebed01b397ac20
                                      • Instruction Fuzzy Hash: C531AF71100204AADB20DF29DC80EFB73A9FF48724F00961EF8A597280DA38AD81C778
                                      APIs
                                      • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 004B461F
                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 004B4634
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID: '
                                      • API String ID: 3850602802-1997036262
                                      • Opcode ID: a3a58be972ad0f3c29614ba8ef764ef152694097b34fcc9ef01055ca68f37b76
                                      • Instruction ID: 30260dacc0fdddac43ede56ec8b66548444d675559a2e153b0998c6e7738055a
                                      • Opcode Fuzzy Hash: a3a58be972ad0f3c29614ba8ef764ef152694097b34fcc9ef01055ca68f37b76
                                      • Instruction Fuzzy Hash: 46313974A01619AFDB14CFA9C980BDA7BB5FF49300F10406AEA04AB392D774A941CFA4
                                      APIs
                                      • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 004B327C
                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004B3287
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID: Combobox
                                      • API String ID: 3850602802-2096851135
                                      • Opcode ID: a181b101bfa112e583c4e55024ee9d75d814e15be74c6989a9097374b0ff4886
                                      • Instruction ID: 828c9295c97ae8d11b5a3734258305c54e6ac8e5b703674e9abbdaa1f48e8852
                                      • Opcode Fuzzy Hash: a181b101bfa112e583c4e55024ee9d75d814e15be74c6989a9097374b0ff4886
                                      • Instruction Fuzzy Hash: 9311E2713002087FEF29DF95DC81EFB376AEB983A5F10022AF91897290D6399D518774
                                      APIs
                                        • Part of subcall function 0042600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0042604C
                                        • Part of subcall function 0042600E: GetStockObject.GDI32(00000011), ref: 00426060
                                        • Part of subcall function 0042600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0042606A
                                      • GetWindowRect.USER32(00000000,?), ref: 004B377A
                                      • GetSysColor.USER32(00000012), ref: 004B3794
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Window$ColorCreateMessageObjectRectSendStock
                                      • String ID: static
                                      • API String ID: 1983116058-2160076837
                                      • Opcode ID: 1dc484658074b73b29de8a2c4424bc135ca3df1952679b2f2e2608c412df5872
                                      • Instruction ID: 93d197a51515d9b8fe9c4d0d2ee5ca415e3ee195788b75d55eef33fd7b5cb874
                                      • Opcode Fuzzy Hash: 1dc484658074b73b29de8a2c4424bc135ca3df1952679b2f2e2608c412df5872
                                      • Instruction Fuzzy Hash: 53113DB2610209AFDF00DFA9CC85EFA7BB8FB08355F004525F955E2250EB39E861DB64
                                      APIs
                                      • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0049CD7D
                                      • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 0049CDA6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Internet$OpenOption
                                      • String ID: <local>
                                      • API String ID: 942729171-4266983199
                                      • Opcode ID: 4604eae719371b9fcb4b84beb364b2b7dce79b7217c784f8e7c6392c784731b9
                                      • Instruction ID: 019fe09223ef862a6351760ae9bccdf9f6d916059c0178f55483b8278c4450e7
                                      • Opcode Fuzzy Hash: 4604eae719371b9fcb4b84beb364b2b7dce79b7217c784f8e7c6392c784731b9
                                      • Instruction Fuzzy Hash: BC11A3B12456327ADB244A668CC5EE7BE6CEB627A4F104337B10982180D6689841D6F4
                                      APIs
                                      • GetWindowTextLengthW.USER32(00000000), ref: 004B34AB
                                      • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 004B34BA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: LengthMessageSendTextWindow
                                      • String ID: edit
                                      • API String ID: 2978978980-2167791130
                                      • Opcode ID: 08d46580469858b598ee2073541cc5ea09152ce494a0cda33052b47fd7af83d7
                                      • Instruction ID: 00414e64087dbc60cd52d75b02e4707a6b3f3a0c98655f4b3b79a6ced5c5b53d
                                      • Opcode Fuzzy Hash: 08d46580469858b598ee2073541cc5ea09152ce494a0cda33052b47fd7af83d7
                                      • Instruction Fuzzy Hash: C3118F71100108ABEB118E6ADC84AFB376AEF15379F504326F961932E0C779EC519B68
                                      APIs
                                        • Part of subcall function 00429CB3: _wcslen.LIBCMT ref: 00429CBD
                                      • CharUpperBuffW.USER32(?,?,?), ref: 00486CB6
                                      • _wcslen.LIBCMT ref: 00486CC2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: _wcslen$BuffCharUpper
                                      • String ID: STOP
                                      • API String ID: 1256254125-2411985666
                                      • Opcode ID: 649eca99164d664fd81f12b1de975c5e891a118253a2cf6bdedfabb1cbc47fd5
                                      • Instruction ID: 9603ecd60b66666a460064f521ce0e1c4231ac2c3172a4706ce49770f47f9b59
                                      • Opcode Fuzzy Hash: 649eca99164d664fd81f12b1de975c5e891a118253a2cf6bdedfabb1cbc47fd5
                                      • Instruction Fuzzy Hash: B6010832A105268BCB51BFBEDC809BF77E5FF60714B42093AE85292290EB39D801C758
                                      APIs
                                        • Part of subcall function 00429CB3: _wcslen.LIBCMT ref: 00429CBD
                                        • Part of subcall function 00483CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00483CCA
                                      • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00481D4C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ClassMessageNameSend_wcslen
                                      • String ID: ComboBox$ListBox
                                      • API String ID: 624084870-1403004172
                                      • Opcode ID: 43e39cd45aecdb84fe2649d3388cfc4edaba172d2cd0e8f5794461840d68442a
                                      • Instruction ID: ff954f0df645e3802015412b42eba476a5874e5a7192afd4f056c4caac3c4bfa
                                      • Opcode Fuzzy Hash: 43e39cd45aecdb84fe2649d3388cfc4edaba172d2cd0e8f5794461840d68442a
                                      • Instruction Fuzzy Hash: 2801F571600228ABCB04FBA1DC51EFE73A8FB06354F140A1FA822573D1EA3869098768
                                      APIs
                                        • Part of subcall function 00429CB3: _wcslen.LIBCMT ref: 00429CBD
                                        • Part of subcall function 00483CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00483CCA
                                      • SendMessageW.USER32(?,00000180,00000000,?), ref: 00481C46
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ClassMessageNameSend_wcslen
                                      • String ID: ComboBox$ListBox
                                      • API String ID: 624084870-1403004172
                                      • Opcode ID: a006372478169e1328a2f27c7ed6f5f1c6064fec2aa3bdf052180d50a0a31e09
                                      • Instruction ID: 83fe8a9627cc855c32a6320419396b85fcf8d54cd10816e21bb5f049807c89f0
                                      • Opcode Fuzzy Hash: a006372478169e1328a2f27c7ed6f5f1c6064fec2aa3bdf052180d50a0a31e09
                                      • Instruction Fuzzy Hash: B601F775B801186BCB04FB91D951EFF73ACAB11344F14042FA40663291EA289E09C7B9
                                      APIs
                                        • Part of subcall function 00429CB3: _wcslen.LIBCMT ref: 00429CBD
                                        • Part of subcall function 00483CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00483CCA
                                      • SendMessageW.USER32(?,00000182,?,00000000), ref: 00481CC8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ClassMessageNameSend_wcslen
                                      • String ID: ComboBox$ListBox
                                      • API String ID: 624084870-1403004172
                                      • Opcode ID: e7565f81518e4dae0a09cb59c9a1e20d7f6281bf90c5b2cad8c977268e742d9b
                                      • Instruction ID: b09f04ddc1a981da7ba7840bba9ece7c6ecd9840b38ebda2a243ea4a6fe588cd
                                      • Opcode Fuzzy Hash: e7565f81518e4dae0a09cb59c9a1e20d7f6281bf90c5b2cad8c977268e742d9b
                                      • Instruction Fuzzy Hash: 5B01DBB574011867CB04FB92DA51EFF73AC9B11344F54041BB80173291EA689F09D779
                                      APIs
                                      • __Init_thread_footer.LIBCMT ref: 0043A529
                                        • Part of subcall function 00429CB3: _wcslen.LIBCMT ref: 00429CBD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Init_thread_footer_wcslen
                                      • String ID: ,%O$3yG
                                      • API String ID: 2551934079-126591655
                                      • Opcode ID: 492639bb915695f6f92672855808be862d2bdfc6e2de3d0089eaf832a32f228a
                                      • Instruction ID: eb137ba0ff73ce6218fe9c992c2f5bb711dd04bea45345356acedca89393daf2
                                      • Opcode Fuzzy Hash: 492639bb915695f6f92672855808be862d2bdfc6e2de3d0089eaf832a32f228a
                                      • Instruction Fuzzy Hash: F2017B31780614A7C604F76AEC57B6D3364DB08714F50206FF641172C2EF6CAD11869F
                                      APIs
                                        • Part of subcall function 00429CB3: _wcslen.LIBCMT ref: 00429CBD
                                        • Part of subcall function 00483CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00483CCA
                                      • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00481DD3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: ClassMessageNameSend_wcslen
                                      • String ID: ComboBox$ListBox
                                      • API String ID: 624084870-1403004172
                                      • Opcode ID: df84694fc821704b1b5e74f945a4bce9908f4c14984326695ac6bd9dc3f8b013
                                      • Instruction ID: a1de429d400446cc1572a1ebbebd0116c0b3ace65c37deca04ef20d1794804d9
                                      • Opcode Fuzzy Hash: df84694fc821704b1b5e74f945a4bce9908f4c14984326695ac6bd9dc3f8b013
                                      • Instruction Fuzzy Hash: 53F0F971B4022867C704F7A6DC51FFF73ACAB01344F440D1BB822632D1DA7869098368
                                      APIs
                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,004F3018,004F305C), ref: 004B81BF
                                      • CloseHandle.KERNEL32 ref: 004B81D1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: CloseCreateHandleProcess
                                      • String ID: \0O
                                      • API String ID: 3712363035-2747425844
                                      • Opcode ID: f8c9b56ccaa76cd2b9ffaee1e8b222ca2d1087e162ab48520865163869ce8c89
                                      • Instruction ID: 9e388ae0e579585d00d1167caacdc7fc5adc08f44081a5f9308e7e6f62d5cc4d
                                      • Opcode Fuzzy Hash: f8c9b56ccaa76cd2b9ffaee1e8b222ca2d1087e162ab48520865163869ce8c89
                                      • Instruction Fuzzy Hash: 3FF03AB2640304BFE2206F65AC86FB73A9CDB05756F404436BF08D51A6DA798E2092BC
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: _wcslen
                                      • String ID: 3, 3, 16, 1
                                      • API String ID: 176396367-3042988571
                                      • Opcode ID: a888d059e1516204494c0985e5483a3fad1805cb7be0dccab407aca630a244c7
                                      • Instruction ID: e8ca3bee27a3a809a9a30c61ac81708c5d049a43d8066fadeea782ae70f807be
                                      • Opcode Fuzzy Hash: a888d059e1516204494c0985e5483a3fad1805cb7be0dccab407aca630a244c7
                                      • Instruction Fuzzy Hash: 2EE02B4221422010A271127B9CC1B7F578DCFEE7A0710182FF981C2366EE9C8D92A3A8
                                      APIs
                                      • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00480B23
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Message
                                      • String ID: AutoIt$Error allocating memory.
                                      • API String ID: 2030045667-4017498283
                                      • Opcode ID: 67723e7c24583e9e4fb5eec78e14c993401490720aff1ea5f1a4dd809abaca06
                                      • Instruction ID: 1d5a1161e737bee80e62f01e9c4622b9040ad87e39fb02b5be6ba710722b9ec9
                                      • Opcode Fuzzy Hash: 67723e7c24583e9e4fb5eec78e14c993401490720aff1ea5f1a4dd809abaca06
                                      • Instruction Fuzzy Hash: 1FE0483224435827E21436967C87FC97A848F09B59F20442FFB58555C38AE9645446ED
                                      APIs
                                        • Part of subcall function 0043F7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00440D71,?,?,?,0042100A), ref: 0043F7CE
                                      • IsDebuggerPresent.KERNEL32(?,?,?,0042100A), ref: 00440D75
                                      • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0042100A), ref: 00440D84
                                      Strings
                                      • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00440D7F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                      • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                      • API String ID: 55579361-631824599
                                      • Opcode ID: 44fb6bf6fd8308dc4c0f94f12175fb61b9fc2013d2bf6b9f62d1bfd8cc5b9799
                                      • Instruction ID: 4d85261dab1750e24a7bbf4da3a69803500e5b18fc760208075486c7a188854e
                                      • Opcode Fuzzy Hash: 44fb6bf6fd8308dc4c0f94f12175fb61b9fc2013d2bf6b9f62d1bfd8cc5b9799
                                      • Instruction Fuzzy Hash: F1E06DB0A007118BE3309FBDE8447527BE0AF04744F008A7EE586C6651DBB9E4488BA9
                                      APIs
                                      • __Init_thread_footer.LIBCMT ref: 0043E3D5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Init_thread_footer
                                      • String ID: 0%O$8%O
                                      • API String ID: 1385522511-3010797974
                                      • Opcode ID: a6b2332fa0081381ba9ad3e40dc223a0100565831a9e07da145240f387df00ef
                                      • Instruction ID: 0d151e98a5d2f19d873d3d509c09f44602e43b0439c0cad557f310aee3a42fe9
                                      • Opcode Fuzzy Hash: a6b2332fa0081381ba9ad3e40dc223a0100565831a9e07da145240f387df00ef
                                      • Instruction Fuzzy Hash: D0E02631402914EBC604971ABA55AAB3353AB0C324F9031BBEA028B2D19BBD6C41C64D
                                      APIs
                                      • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 0049302F
                                      • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00493044
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: Temp$FileNamePath
                                      • String ID: aut
                                      • API String ID: 3285503233-3010740371
                                      • Opcode ID: 9fc48bc46cde1e1b2994d0837aa07b3e67cdb86dddbc477eb8e0594478554c97
                                      • Instruction ID: 0ca8e3582d9054a55922d8ac9dd6c3459477540c252384947d98ec679ee22efe
                                      • Opcode Fuzzy Hash: 9fc48bc46cde1e1b2994d0837aa07b3e67cdb86dddbc477eb8e0594478554c97
                                      • Instruction Fuzzy Hash: DBD05E7290032867DA20A7A9AC8EFCB3A6CDB05751F0002B2B755E2091DAB49984CBE4
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: LocalTime
                                      • String ID: %.3d$X64
                                      • API String ID: 481472006-1077770165
                                      • Opcode ID: 630480e188a2fd449b1528c851599cbbb8a51dcb0af68dbc577d68ad602c5e92
                                      • Instruction ID: 2024f39a5eb0595e47f05eba7bd0ee93cf11fd3aceb065a8fb3cc418547d0046
                                      • Opcode Fuzzy Hash: 630480e188a2fd449b1528c851599cbbb8a51dcb0af68dbc577d68ad602c5e92
                                      • Instruction Fuzzy Hash: 9ED012A1C18108EACB9096D0DC859FDB37CAF08301F60C4A3FD0AA1042D62CD50BA76B
                                      APIs
                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 004B236C
                                      • PostMessageW.USER32(00000000), ref: 004B2373
                                        • Part of subcall function 0048E97B: Sleep.KERNEL32 ref: 0048E9F3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: FindMessagePostSleepWindow
                                      • String ID: Shell_TrayWnd
                                      • API String ID: 529655941-2988720461
                                      • Opcode ID: 4747f0f30c941a505a951ba68b2ef8e99b11ac1a32664e66be17e90d5c382de4
                                      • Instruction ID: 2e6f6bbc22d3979a4eee0c9a589862643890a0a647db86d6333008579b075771
                                      • Opcode Fuzzy Hash: 4747f0f30c941a505a951ba68b2ef8e99b11ac1a32664e66be17e90d5c382de4
                                      • Instruction Fuzzy Hash: B2D0A9323C0310BBE264B7329C8FFDA66049B14B00F000A26B281AA0D0C9E4A8008A0C
                                      APIs
                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 004B232C
                                      • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 004B233F
                                        • Part of subcall function 0048E97B: Sleep.KERNEL32 ref: 0048E9F3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3313825081.0000000000421000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: true
                                      • Associated: 00000000.00000002.3313801702.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313887829.00000000004E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313954578.00000000004EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.3313973822.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_420000_file.jbxd
                                      Similarity
                                      • API ID: FindMessagePostSleepWindow
                                      • String ID: Shell_TrayWnd
                                      • API String ID: 529655941-2988720461
                                      • Opcode ID: 29673ff92225645716458e6e0a8387a7fc4524511fb017d1266e07c7f53ea531
                                      • Instruction ID: 615d680e4cfaccff0ac47b18216361921318bb901db945ec0fc010dff5413499
                                      • Opcode Fuzzy Hash: 29673ff92225645716458e6e0a8387a7fc4524511fb017d1266e07c7f53ea531
                                      • Instruction Fuzzy Hash: 1BD0A932380310B7E264B7329C8FFEA6A049B10B00F000A26B285AA0D0C9E4A8008A08