Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1520802
MD5:4bef7b2f09cef526ebce72fb190173ab
SHA1:4342c837573c7eb7823a5f749d2e167c9a1690d4
SHA256:e39b149e059d34e59eb76a80a65b44c952517da99ec78d2bfdefa891abc6db6c
Tags:exeuser-Bitsight
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of debugger detection
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sleep loop found (likely to delay execution)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 7396 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 4BEF7B2F09CEF526EBCE72FB190173AB)
    • chrome.exe (PID: 7432 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 7644 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=2056,i,12513433233535120327,12878368360979007082,262144 /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 7172 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5324 --field-trial-handle=2056,i,12513433233535120327,12878368360979007082,262144 /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 7196 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 --field-trial-handle=2056,i,12513433233535120327,12878368360979007082,262144 /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.6% probability
Source: file.exeJoe Sandbox ML: detected
Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:49742 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:49745 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.4:49772 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.4:49783 version: TLS 1.2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A0DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00A0DBBE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A168EE FindFirstFileW,FindClose,0_2_00A168EE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A1698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00A1698F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A0D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00A0D076
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A0D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00A0D3A9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A19642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00A19642
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A1979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00A1979D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A19B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00A19B2B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A15C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00A15C97
Source: Joe Sandbox ViewIP Address: 239.255.255.250 239.255.255.250
Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 87.248.202.1
Source: unknownTCP traffic detected without corresponding DNS query: 87.248.202.1
Source: unknownTCP traffic detected without corresponding DNS query: 87.248.202.1
Source: unknownTCP traffic detected without corresponding DNS query: 87.248.202.1
Source: unknownTCP traffic detected without corresponding DNS query: 87.248.202.1
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A1CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_00A1CE44
Source: global trafficHTTP traffic detected: GET /account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd HTTP/1.1Host: www.youtube.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiUocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUXSec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentsec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: YSC=lMkSnMHs0aI
Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
Source: global trafficHTTP traffic detected: GET /accounts/CheckConnection?pmpo=https%3A%2F%2Faccounts.google.com&v=-1282646132&timestamp=1727471647140 HTTP/1.1Host: accounts.youtube.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-full-version: "117.0.5938.132"sec-ch-ua-arch: "x86"sec-ch-ua-platform: "Windows"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-model: ""sec-ch-ua-bitness: "64"sec-ch-ua-wow64: ?0sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiUocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUXSec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: iframeReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Host: www.google.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-arch: "x86"sec-ch-ua-full-version: "117.0.5938.132"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiUocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUXSec-Fetch-Site: same-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=cY1Wm65weN86A1n&MD=YKCvLHU+ HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: global trafficHTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=cY1Wm65weN86A1n&MD=YKCvLHU+ HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: chromecache_73.3.drString found in binary or memory: _.iq(p)+"/familylink/privacy/notice/embedded?langCountry="+_.iq(p);break;case "PuZJUb":a+="https://www.youtube.com/t/terms?chromeless=1&hl="+_.iq(m);break;case "fxTQxb":a+="https://youtube.com/t/terms?gl="+_.iq(_.rq(c))+"&hl="+_.iq(d)+"&override_hl=1"+(f?"&linkless=1":"");break;case "prAmvd":a+="https://www.google.com/intl/"+_.iq(m)+"/chromebook/termsofservice.html?languageCode="+_.iq(d)+"&regionCode="+_.iq(c);break;case "NfnTze":a+="https://policies.google.com/privacy/google-partners"+(f?"/embedded": equals www.youtube.com (Youtube)
Source: global trafficDNS traffic detected: DNS query: youtube.com
Source: global trafficDNS traffic detected: DNS query: www.youtube.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: accounts.youtube.com
Source: global trafficDNS traffic detected: DNS query: play.google.com
Source: unknownHTTP traffic detected: POST /log?format=json&hasfast=true&authuser=0 HTTP/1.1Host: play.google.comConnection: keep-aliveContent-Length: 519sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-arch: "x86"Content-Type: application/x-www-form-urlencoded;charset=UTF-8sec-ch-ua-full-version: "117.0.5938.132"sec-ch-ua-platform-version: "10.0.0"X-Goog-AuthUser: 0sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: */*Origin: https://accounts.google.comX-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiUocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUXSec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: chromecache_73.3.drString found in binary or memory: https://accounts.google.com
Source: chromecache_73.3.drString found in binary or memory: https://accounts.google.com/TOS?loc=
Source: chromecache_80.3.drString found in binary or memory: https://apis.google.com/js/api.js
Source: chromecache_73.3.drString found in binary or memory: https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessage
Source: chromecache_73.3.drString found in binary or memory: https://families.google.com/intl/
Source: chromecache_80.3.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/drive_2020q4/v10/192px.svg
Source: chromecache_80.3.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/gmail_2020q4/v10/web-48dp/logo_gmail_2020q4_color_2x_web_
Source: chromecache_80.3.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/maps/v7/192px.svg
Source: chromecache_73.3.drString found in binary or memory: https://g.co/recover
Source: chromecache_73.3.drString found in binary or memory: https://play.google.com/log?format=json&hasfast=true
Source: chromecache_73.3.drString found in binary or memory: https://play.google.com/work/enroll?identifier=
Source: chromecache_73.3.drString found in binary or memory: https://play.google/intl/
Source: chromecache_73.3.drString found in binary or memory: https://policies.google.com/privacy
Source: chromecache_73.3.drString found in binary or memory: https://policies.google.com/privacy/additional
Source: chromecache_73.3.drString found in binary or memory: https://policies.google.com/privacy/google-partners
Source: chromecache_73.3.drString found in binary or memory: https://policies.google.com/technologies/cookies
Source: chromecache_73.3.drString found in binary or memory: https://policies.google.com/technologies/location-data
Source: chromecache_73.3.drString found in binary or memory: https://policies.google.com/terms
Source: chromecache_73.3.drString found in binary or memory: https://policies.google.com/terms/location
Source: chromecache_73.3.drString found in binary or memory: https://policies.google.com/terms/service-specific
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-email-pin.gif
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-password.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-sms-or-voice-pin.gif
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-sms-pin.gif
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-stop-go-landing-page_1x.png
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/animation/
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/ble_device.png
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/ble_pin.png
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync.png
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_1x.png
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_2x.png
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_darkmode_1x.png
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/continue_on_your_phone.png
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_phone_number_verification.png
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_silent_tap_yes_darkmode.gif
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_tap_yes.gif
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_tap_yes_darkmode.gif
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kid_success.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kid_success_darkmode.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_dark_v2.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_updated.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_updated_darkmode.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_v2.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_not_ready.png
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_stick_around_1.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_stick_around_dark_1.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_account_1.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_account_darkmode_1.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_privacy_1.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_privacy_darkmode_1.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_created.png
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_double_device.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_double_device_darkmode.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_full_house.png
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_link_accounts_1.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_link_accounts_darkmode_1.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_app_decision.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_app_decision_darkmode.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_supervision_1.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_supervision_darkmode_1.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_respect_others_1.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_respect_others_darkmode_1.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_single_device.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_single_device_darkmode.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_stop.png
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/personalization_reminders.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/phone_number_sign_in_2x.png
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/return_to_desktop.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/return_to_desktop_darkmode.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key.gif
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_ios_center.png
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_laptop.gif
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_nfc_discovered.gif
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_nfc_discovered_darkmode.gif
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_phone.gif
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_googleapp_ios.gif
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_googleapp_pulldown.gif
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_tapyes.gif
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/smart_lock_2x.png
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/usb_key.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/web_and_app_activity.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/who_will_be_using_this_device.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/you_tube_history.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/feature_not_available.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/feature_not_available_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/gmail_ios_authzen.gif
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/paaskey.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_challenge.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_challenge_darkmode.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_darkmode.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_cross_device.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_cross_device_darkmode.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_darkmode.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_error.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_error_darkmode.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_reauth.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_reauth_darkmode.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_success.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_success_darkmode.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkeyerror.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkeyerror_darkmode.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/red_globe_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/red_globe_light.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/screenlock.png
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_ipad.gif
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone.gif
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone_nfc.gif
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone_usb.gif
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_phone.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_keys.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/success_checkmark_2.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/success_checkmark_2_darkmode.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/loading_spinner_gm.gif
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/progress_spinner_color_20dp_4x.gif
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/success-gm-default_2x.png
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/apps/signup/resources/custom-email-address.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/images/hpp/shield_security_checkup_green_2x_web_96dp.png
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/account_setup_chapter_dark_1.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/account_setup_chapter_v1.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/device_setup_chapter_dark_v1.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/device_setup_chapter_v1.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/parental_control_chapter_dark_v1.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/parental_control_chapter_v1.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_accountslinked.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_accountslinked_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_childneedshelp.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_childneedshelp_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_nextstepsforparents.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_nextstepsforparents_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_allset.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_allset_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_apps_devices.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_apps_devices_darkmode.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_areyousurekid.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_areyousurekid_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_birthdayemail.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_birthdayemail_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_choose_apps.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_choose_apps_darkmode.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_confirmation.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_exploremore.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_exploremore_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_intro.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_intro_darkmode.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacy_terms_a18.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacy_terms_a18_darkmode.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacyterms.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacyterms_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_review_settings.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_review_settings_darkmode.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_safe_search.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_safe_search_darkmode.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_unchanged_a18.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_unchanged_a18_darkmode.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_update_a18.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_update_a18_darkmode.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_a18.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_a18_darkmode.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_darkmode.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervisiongrad.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervisiongrad_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/guardianlinking/linking_complete_0.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/guardianlinking/linking_complete_dark_0.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/ads_personalization.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/ads_personalization_darkmode.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/confirmation.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/confirmation_darkmode.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/eligibility_error.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/eligibility_error_darkmode.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/fork.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/fork_darkmode.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/intro.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/intro_darkmode.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/personal_results.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/personal_results_darkmode.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/safe_search.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/safe_search_darkmode.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/check_notifications.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/check_notifications_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_installing_family_link_2.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_installing_family_link_dark_2.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_location_sharing_2.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_location_sharing_dark_2.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_parental_controls_2.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_parental_controls_dark_2.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_school_time_2.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_school_time_dark_2.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/location_sharing_enabled_2.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/location_sharing_enabled_dark_3.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/parent_sign_in_prologue_1.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/parent_sign_in_prologue_dark_1.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_complete_1.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_complete_dark_1.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_contacts_2.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_contacts_dark_2.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_boy_1.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_boy_dark_1.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_girl_2.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_girl_dark_2.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/ulp_continue_without_gmail_dark_v2.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/ulp_continue_without_gmail_v2.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/all_set.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/all_set_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/are_you_sure_parent.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/are_you_sure_parent_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/content_restriction.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/content_restriction_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/error.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/error_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/how_controls_work.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/how_controls_work_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/next_steps.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/next_steps_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/setup_controls.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/setup_controls_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_parent.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_parent_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_teen.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_teen_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teentoadultgraduation/supervision_choice.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teentoadultgraduation/supervision_choice_darkmode.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/kid_setup_parent_escalation.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/kid_setup_parent_escalation_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/send_email_confirmation.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/send_email_confirmation_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/success_sent_email.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/success_sent_email_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulpupgrade/kidprofileupgrade_all_set.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulpupgrade/kidprofileupgrade_all_set_darkmode.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/all_set.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/all_set_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/almost_done_kids_space_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/almost_done_kids_space_v2.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_tablet_v2.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_tablet_v2_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_v2.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_v2_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/emailinstallfamilylink.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/emailinstallfamilylink_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/familylinkinstalling.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/familylinkinstalling_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/hand_over_device_dark_v2.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/hand_over_device_v2.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/linking_accounts_v2.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/linking_accounts_v2_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/locationsetup.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/locationsetup_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email_v2.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email_v2_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_v2.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_v2_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/open_family_link_v2.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/open_family_link_v2_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/parents_help.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/parents_help_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/set_up_kids_space.png
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/set_up_kids_space_dark.png
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setupcontrol.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setupcontrol_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuplocation.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuplocation_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuptimelimits.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuptimelimits_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/supervision_ready_v2.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/supervision_ready_v2_dark.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/youtubeaccess.svg
Source: chromecache_80.3.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/youtubeaccess_dark.svg
Source: chromecache_73.3.drString found in binary or memory: https://support.google.com/accounts?hl=
Source: chromecache_73.3.drString found in binary or memory: https://support.google.com/accounts?p=new-si-ui
Source: chromecache_73.3.drString found in binary or memory: https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072
Source: chromecache_80.3.drString found in binary or memory: https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=
Source: chromecache_73.3.drString found in binary or memory: https://www.google.com
Source: chromecache_73.3.drString found in binary or memory: https://www.google.com/intl/
Source: chromecache_80.3.drString found in binary or memory: https://www.gstatic.com/accounts/speedbump/authzen_optin_illustration.gif
Source: chromecache_80.3.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/chrome_48dp.png
Source: chromecache_80.3.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/googleg_48dp.png
Source: chromecache_80.3.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/gsa_48dp.png
Source: chromecache_80.3.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/play_prism_48dp.png
Source: chromecache_80.3.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/youtube_48dp.png
Source: chromecache_73.3.drString found in binary or memory: https://www.gstatic.com/images/branding/productlogos/googleg/v6/36px.svg
Source: chromecache_73.3.drString found in binary or memory: https://www.youtube.com/t/terms?chromeless=1&hl=
Source: file.exe, 00000000.00000002.2938890570.0000000003FFA000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2938647466.0000000003C23000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2936973819.00000000016ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
Source: file.exe, 00000000.00000002.2938890570.0000000003FFA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdB
Source: file.exe, 00000000.00000002.2937577152.000000000212C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdE
Source: file.exe, 00000000.00000002.2937017253.0000000001729000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdion;
Source: chromecache_73.3.drString found in binary or memory: https://youtube.com/t/terms?gl=
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:49742 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:49745 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.4:49772 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.4:49783 version: TLS 1.2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A1EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00A1EAFF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A1ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00A1ED6A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A1EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00A1EAFF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A0AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_00A0AA57
Source: file.exe, 00000000.00000002.2938341940.0000000003BC5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _WINAPI_GETRAWINPUTDATAmemstr_d4ad2048-9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A39576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00A39576

System Summary

barindex
Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.
Source: file.exe, 00000000.00000000.1680535028.0000000000A62000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_eee57f89-c
Source: file.exe, 00000000.00000000.1680535028.0000000000A62000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_6982fb94-8
Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_052e7ac7-d
Source: file.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_a632c1a3-0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A0D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_00A0D5EB
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A01201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00A01201
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A0E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00A0E8F6
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A120460_2_00A12046
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009A80600_2_009A8060
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A082980_2_00A08298
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009DE4FF0_2_009DE4FF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009D676B0_2_009D676B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A348730_2_00A34873
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009CCAA00_2_009CCAA0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009ACAF00_2_009ACAF0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009BCC390_2_009BCC39
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009D6DD90_2_009D6DD9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009A91C00_2_009A91C0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009BB1190_2_009BB119
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009C13940_2_009C1394
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009C17060_2_009C1706
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009C781B0_2_009C781B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009C19B00_2_009C19B0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009A79200_2_009A7920
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009B997D0_2_009B997D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009C7A4A0_2_009C7A4A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009C7CA70_2_009C7CA7
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009C1C770_2_009C1C77
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009D9EEE0_2_009D9EEE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A2BE440_2_00A2BE44
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009C1F320_2_009C1F32
Source: C:\Users\user\Desktop\file.exeCode function: String function: 009BF9F2 appears 31 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 009C0A30 appears 46 times
Source: file.exe, 00000000.00000002.2937847202.0000000003ACC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Comments|CompanyName|FileDescription|FileVersion|InternalName|LegalCopyright|LegalTrademarks|OriginalFilename|ProductName|ProductVersion|PrivateBuild|SpecialBuildUnkno) vs file.exe
Source: file.exe, 00000000.00000002.2937847202.0000000003ACC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Comments|CompanyName|FileDescription|FileVersion|InternalName|LegalCopyright|LegalTrademarks|OriginalFilename|ProductName|ProductVersion|PrivateBuild|SpecialBuildlatfo$ vs file.exe
Source: file.exe, 00000000.00000002.2936467890.00000000014BD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FV_ORIGINALFILENAME^ vs file.exe
Source: file.exe, 00000000.00000002.2936467890.00000000014BD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs file.exe
Source: file.exe, 00000000.00000002.2938890570.0000000003FFA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamechrome.exe< vs file.exe
Source: file.exe, 00000000.00000002.2936385308.0000000001458000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FV_ORIGINALFILENAME vs file.exe
Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: classification engineClassification label: mal60.evad.winEXE@29/30@14/7
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A137B5 GetLastError,FormatMessageW,0_2_00A137B5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A010BF AdjustTokenPrivileges,CloseHandle,0_2_00A010BF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A016C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00A016C3
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A151CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00A151CD
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A2A67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00A2A67C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A1648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_00A1648E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009A42A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_009A42A2
Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=2056,i,12513433233535120327,12878368360979007082,262144 /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5324 --field-trial-handle=2056,i,12513433233535120327,12878368360979007082,262144 /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 --field-trial-handle=2056,i,12513433233535120327,12878368360979007082,262144 /prefetch:8
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=2056,i,12513433233535120327,12878368360979007082,262144 /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5324 --field-trial-handle=2056,i,12513433233535120327,12878368360979007082,262144 /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 --field-trial-handle=2056,i,12513433233535120327,12878368360979007082,262144 /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: file.exeStatic file information: File size 1167360 > 1048576
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009A42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_009A42DE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009C0A76 push ecx; ret 0_2_009C0A89
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009BF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_009BF98E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A31C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00A31C41
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\file.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-97268
Source: C:\Users\user\Desktop\file.exeWindow / User API: threadDelayed 6879Jump to behavior
Source: C:\Users\user\Desktop\file.exeAPI coverage: 3.4 %
Source: C:\Users\user\Desktop\file.exe TID: 7400Thread sleep time: -68790s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\file.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\file.exeThread sleep count: Count: 6879 delay: -10Jump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A0DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00A0DBBE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A168EE FindFirstFileW,FindClose,0_2_00A168EE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A1698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00A1698F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A0D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00A0D076
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A0D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00A0D3A9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A19642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00A19642
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A1979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00A1979D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A19B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00A19B2B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A15C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00A15C97
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009A42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_009A42DE
Source: file.exe, 00000000.00000002.2938647466.0000000003C23000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}kn

Anti Debugging

barindex
Source: C:\Users\user\Desktop\file.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_0-95913
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A1EAA2 BlockInput,0_2_00A1EAA2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009D2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_009D2622
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009A42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_009A42DE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009C4CE8 mov eax, dword ptr fs:[00000030h]0_2_009C4CE8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A00B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00A00B62
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009D2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_009D2622
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009C083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_009C083F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009C09D5 SetUnhandledExceptionFilter,0_2_009C09D5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009C0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_009C0C21
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A01201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00A01201
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009E2BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_009E2BA5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A0B226 SendInput,keybd_event,0_2_00A0B226
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A222DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_00A222DA
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A00B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00A00B62
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A01663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00A01663
Source: file.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
Source: file.exeBinary or memory string: Shell_TrayWnd
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009C0698 cpuid 0_2_009C0698
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A18195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00A18195
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009FD27A GetUserNameW,0_2_009FD27A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009DBB6F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_009DBB6F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009A42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_009A42DE
Source: file.exeBinary or memory string: WIN_81
Source: file.exeBinary or memory string: WIN_XP
Source: file.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
Source: file.exeBinary or memory string: WIN_XPe
Source: file.exeBinary or memory string: WIN_VISTA
Source: file.exeBinary or memory string: WIN_7
Source: file.exeBinary or memory string: WIN_8
Source: file.exe, 00000000.00000002.2936467890.00000000014BD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WIN_XPU
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A21204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00A21204
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A21806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00A21806
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure2
Valid Accounts
1
Native API
1
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Disable or Modify Tools
31
Input Capture
2
System Time Discovery
Remote Services1
Archive Collected Data
2
Ingress Tool Transfer
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/Job2
Valid Accounts
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory1
Account Discovery
Remote Desktop Protocol31
Input Capture
11
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
Valid Accounts
2
Obfuscated Files or Information
Security Account Manager2
File and Directory Discovery
SMB/Windows Admin Shares3
Clipboard Data
3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
Access Token Manipulation
1
DLL Side-Loading
NTDS15
System Information Discovery
Distributed Component Object ModelInput Capture4
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
Process Injection
2
Valid Accounts
LSA Secrets221
Security Software Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts22
Virtualization/Sandbox Evasion
Cached Domain Credentials22
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
Access Token Manipulation
DCSync2
Process Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job12
Process Injection
Proc Filesystem11
Application Window Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
System Owner/User Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://play.google/intl/0%URL Reputationsafe
https://families.google.com/intl/0%URL Reputationsafe
https://policies.google.com/technologies/location-data0%URL Reputationsafe
https://apis.google.com/js/api.js0%URL Reputationsafe
https://policies.google.com/privacy/google-partners0%URL Reputationsafe
https://policies.google.com/terms/service-specific0%URL Reputationsafe
https://g.co/recover0%URL Reputationsafe
https://policies.google.com/privacy/additional0%URL Reputationsafe
https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=32850720%URL Reputationsafe
https://policies.google.com/technologies/cookies0%URL Reputationsafe
https://policies.google.com/terms0%URL Reputationsafe
https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=0%URL Reputationsafe
https://support.google.com/accounts?hl=0%URL Reputationsafe
https://policies.google.com/privacy0%URL Reputationsafe
https://support.google.com/accounts?p=new-si-ui0%URL Reputationsafe
https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessage0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
youtube-ui.l.google.com
142.250.186.174
truefalse
    unknown
    www3.l.google.com
    142.250.186.110
    truefalse
      unknown
      play.google.com
      216.58.206.78
      truefalse
        unknown
        www.google.com
        142.250.186.132
        truefalse
          unknown
          youtube.com
          142.250.186.46
          truefalse
            unknown
            accounts.youtube.com
            unknown
            unknownfalse
              unknown
              www.youtube.com
              unknown
              unknownfalse
                unknown
                NameMaliciousAntivirus DetectionReputation
                https://play.google.com/log?format=json&hasfast=true&authuser=0false
                  unknown
                  https://www.google.com/favicon.icofalse
                    unknown
                    https://play.google.com/log?hasfast=true&authuser=0&format=jsonfalse
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://play.google/intl/chromecache_73.3.drfalse
                      • URL Reputation: safe
                      unknown
                      https://families.google.com/intl/chromecache_73.3.drfalse
                      • URL Reputation: safe
                      unknown
                      https://youtube.com/t/terms?gl=chromecache_73.3.drfalse
                        unknown
                        https://policies.google.com/technologies/location-datachromecache_73.3.drfalse
                        • URL Reputation: safe
                        unknown
                        https://www.google.com/intl/chromecache_73.3.drfalse
                          unknown
                          https://apis.google.com/js/api.jschromecache_80.3.drfalse
                          • URL Reputation: safe
                          unknown
                          https://policies.google.com/privacy/google-partnerschromecache_73.3.drfalse
                          • URL Reputation: safe
                          unknown
                          https://play.google.com/work/enroll?identifier=chromecache_73.3.drfalse
                            unknown
                            https://policies.google.com/terms/service-specificchromecache_73.3.drfalse
                            • URL Reputation: safe
                            unknown
                            https://g.co/recoverchromecache_73.3.drfalse
                            • URL Reputation: safe
                            unknown
                            https://policies.google.com/privacy/additionalchromecache_73.3.drfalse
                            • URL Reputation: safe
                            unknown
                            https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072chromecache_73.3.drfalse
                            • URL Reputation: safe
                            unknown
                            https://policies.google.com/technologies/cookieschromecache_73.3.drfalse
                            • URL Reputation: safe
                            unknown
                            https://policies.google.com/termschromecache_73.3.drfalse
                            • URL Reputation: safe
                            unknown
                            https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=chromecache_80.3.drfalse
                            • URL Reputation: safe
                            unknown
                            https://www.google.comchromecache_73.3.drfalse
                              unknown
                              https://play.google.com/log?format=json&hasfast=truechromecache_73.3.drfalse
                                unknown
                                https://www.youtube.com/t/terms?chromeless=1&hl=chromecache_73.3.drfalse
                                  unknown
                                  https://support.google.com/accounts?hl=chromecache_73.3.drfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://policies.google.com/terms/locationchromecache_73.3.drfalse
                                    unknown
                                    https://policies.google.com/privacychromecache_73.3.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://support.google.com/accounts?p=new-si-uichromecache_73.3.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessagechromecache_73.3.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    142.250.186.174
                                    youtube-ui.l.google.comUnited States
                                    15169GOOGLEUSfalse
                                    216.58.206.78
                                    play.google.comUnited States
                                    15169GOOGLEUSfalse
                                    239.255.255.250
                                    unknownReserved
                                    unknownunknownfalse
                                    142.250.186.132
                                    www.google.comUnited States
                                    15169GOOGLEUSfalse
                                    142.250.186.110
                                    www3.l.google.comUnited States
                                    15169GOOGLEUSfalse
                                    142.250.184.206
                                    unknownUnited States
                                    15169GOOGLEUSfalse
                                    IP
                                    192.168.2.4
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1520802
                                    Start date and time:2024-09-27 23:13:05 +02:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 4m 47s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:10
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:file.exe
                                    Detection:MAL
                                    Classification:mal60.evad.winEXE@29/30@14/7
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:
                                    • Successful, ratio: 98%
                                    • Number of executed functions: 45
                                    • Number of non-executed functions: 309
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                    • Excluded IPs from analysis (whitelisted): 172.217.16.195, 142.250.185.206, 108.177.15.84, 34.104.35.123, 142.250.185.195, 142.250.181.234, 142.250.185.170, 142.250.184.234, 216.58.206.74, 142.250.185.234, 142.250.186.170, 172.217.18.10, 172.217.16.202, 142.250.185.202, 142.250.186.106, 142.250.186.74, 142.250.186.42, 216.58.206.42, 172.217.16.138, 216.58.212.170, 142.250.184.202, 172.217.18.106, 216.58.212.138, 172.217.23.106, 142.250.185.74, 142.250.185.138, 142.250.186.138, 142.250.185.106, 93.184.221.240, 192.229.221.95, 172.217.16.131, 142.250.186.46
                                    • Excluded domains from analysis (whitelisted): clients1.google.com, fs.microsoft.com, accounts.google.com, content-autofill.googleapis.com, slscr.update.microsoft.com, fonts.gstatic.com, ctldl.windowsupdate.com, clientservices.googleapis.com, fe3cr.delivery.mp.microsoft.com, clients2.google.com, ocsp.digicert.com, edgedl.me.gvt1.com, update.googleapis.com, clients.l.google.com, www.gstatic.com, optimizationguide-pa.googleapis.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                    • VT rate limit hit for: file.exe
                                    No simulations
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    239.255.255.250https://newmexicogov-my.sharepoint.com/:f:/g/personal/christine_fuller_newmexicogov_onmicrosoft_com/EoaWDUrKgw5NpxyRqgYpeMMB9xM6HiHeCt0mCjuvQCuY2A?e=Aa5N0vGet hashmaliciousUnknownBrowse
                                      http://install.convertwithwave.comGet hashmaliciousUnknownBrowse
                                        https://www.dropbox.com/scl/fi/4fnryjjmfp8le01uyciyl/IASSecurity.paper?rlkey=4ezd7413h2y3rkfjifz9e7enl&st=6sa33sex&dl=0Get hashmaliciousHTMLPhisherBrowse
                                          https://johnjay.jjay.cuny.edu/phone_directory/redirect.php?profiles=https%3A%2F%2Fgoogle.com%2Famp%2Fs%2Fmmakc.com%2FblackGet hashmaliciousHtmlDropperBrowse
                                            file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                                              https://stindy.peakseniorhealth.com/?5ZUnr7=bnc0Get hashmaliciousHTMLPhisherBrowse
                                                file.exeGet hashmaliciousUnknownBrowse
                                                  https://stindy.peakseniorhealth.com/?5ZUnr7=bnc0Get hashmaliciousHTMLPhisherBrowse
                                                    report_209.pdfGet hashmaliciousUnknownBrowse
                                                      http://cdn.prod.website-files.com:80/65f02675f8a97005cc28dca1/66cf319e76a975faf0a504d6_10698624705.pdfGet hashmaliciousUnknownBrowse
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        No context
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        28a2c9bd18a11de089ef85a160da29e4https://newmexicogov-my.sharepoint.com/:f:/g/personal/christine_fuller_newmexicogov_onmicrosoft_com/EoaWDUrKgw5NpxyRqgYpeMMB9xM6HiHeCt0mCjuvQCuY2A?e=Aa5N0vGet hashmaliciousUnknownBrowse
                                                        • 184.28.90.27
                                                        • 20.12.23.50
                                                        http://install.convertwithwave.comGet hashmaliciousUnknownBrowse
                                                        • 184.28.90.27
                                                        • 20.12.23.50
                                                        https://johnjay.jjay.cuny.edu/phone_directory/redirect.php?profiles=https%3A%2F%2Fgoogle.com%2Famp%2Fs%2Fmmakc.com%2FblackGet hashmaliciousHtmlDropperBrowse
                                                        • 184.28.90.27
                                                        • 20.12.23.50
                                                        file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                                                        • 184.28.90.27
                                                        • 20.12.23.50
                                                        file.exeGet hashmaliciousUnknownBrowse
                                                        • 184.28.90.27
                                                        • 20.12.23.50
                                                        https://stindy.peakseniorhealth.com/?5ZUnr7=bnc0Get hashmaliciousHTMLPhisherBrowse
                                                        • 184.28.90.27
                                                        • 20.12.23.50
                                                        report_209.pdfGet hashmaliciousUnknownBrowse
                                                        • 184.28.90.27
                                                        • 20.12.23.50
                                                        http://vnw.23b.mywebsitetransfer.comGet hashmaliciousUnknownBrowse
                                                        • 184.28.90.27
                                                        • 20.12.23.50
                                                        file.exeGet hashmaliciousUnknownBrowse
                                                        • 184.28.90.27
                                                        • 20.12.23.50
                                                        https://henrystreet-my.sharepoint.com/:f:/g/personal/adsilveira_henrystreet_org/Ei2GiHnSxWtFuBMRg1ff6tQBKLSVFxE4XAZ9d6hVQTGjUw?e=IdIXzfGet hashmaliciousUnknownBrowse
                                                        • 184.28.90.27
                                                        • 20.12.23.50
                                                        No context
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:HTML document, ASCII text, with very long lines (681)
                                                        Category:downloaded
                                                        Size (bytes):4071
                                                        Entropy (8bit):5.363129487888587
                                                        Encrypted:false
                                                        SSDEEP:96:GUpT+TmXtdW1qsHFcn7t7CnyWYvNTcLalw:lpT+qXW1PFcn7tGnyWY1Tk
                                                        MD5:5DE1D7CDC36C4E5F382A84353107425E
                                                        SHA1:AD4BEF49EFF0A9F7EDCED3EF0F5F6B9DE229EB37
                                                        SHA-256:3496137475D197D8FC520B396AA59445D302F0A41C9377A0A3F4523C0EF29DE6
                                                        SHA-512:841D824896F4FCAF5C23BC6CA64064732EBDF392D1ED854E870124D18F3A080AE0B4F63B6FCAF9E913CB3AF70A1832EF693E1F2C25B0F288231A32164557F3C0
                                                        Malicious:false
                                                        Reputation:low
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEH86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlFSx2KuJtQynzb5elc5wFf5a1q72w/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=sOXFj,q0xTif,ZZ4WUe"
                                                        Preview:"use strict";_F_installCss(".N7rBcd{overflow-x:auto}sentinel{}");.this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.zg(_.dqa);._.k("sOXFj");.var ou=function(a){_.X.call(this,a.Fa)};_.J(ou,_.X);ou.Ba=_.X.Ba;ou.prototype.aa=function(a){return a()};_.iu(_.cqa,ou);._.l();._.k("oGtAuc");._.oya=new _.uf(_.dqa);._.l();._.k("q0xTif");.var iza=function(a){var b=function(d){_.Zn(d)&&(_.Zn(d).Gc=null,_.yu(d,null));d.XyHi9&&(d.XyHi9=null)};b(a);a=a.querySelectorAll("[c-wiz]");for(var c=0;c<a.length;c++)b(a[c])},Ku=function(a){_.et.call(this,a.Fa);this.Qa=this.dom=null;if(this.Vk()){var b=_.Jm(this.Mg(),[_.Om,_.Nm]);b=_.ri([b[_.Om],b[_.Nm]]).then(function(c){this.Qa=c[0];this.dom=c[1]},null,this);_.cu(this,b)}this.Ra=a.Xl.Hda};_.J(Ku,_.et);Ku.Ba=function(){return{Xl:{Hda:function(a){return _.Ye(a)}}}};Ku.prototype.yp=function(a){return this.Ra.yp(a)};.Ku.prototype.getData=function(a){return this.Ra.getData(a)};Ku.prototype.vp=function(){_.Ft(this.d
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                                                        Category:downloaded
                                                        Size (bytes):5430
                                                        Entropy (8bit):3.6534652184263736
                                                        Encrypted:false
                                                        SSDEEP:48:wIJct3xIAxG/7nvWDtZcdYLtX7B6QXL3aqG8Q:wIJct+A47v+rcqlBPG9B
                                                        MD5:F3418A443E7D841097C714D69EC4BCB8
                                                        SHA1:49263695F6B0CDD72F45CF1B775E660FDC36C606
                                                        SHA-256:6DA5620880159634213E197FAFCA1DDE0272153BE3E4590818533FAB8D040770
                                                        SHA-512:82D017C4B7EC8E0C46E8B75DA0CA6A52FD8BCE7FCF4E556CBDF16B49FC81BE9953FE7E25A05F63ECD41C7272E8BB0A9FD9AEDF0AC06CB6032330B096B3702563
                                                        Malicious:false
                                                        Reputation:high, very likely benign file
                                                        URL:https://www.google.com/favicon.ico
                                                        Preview:............ .h...&... .... .........(....... ..... ............................................0...................................................................................................................................v.].X.:.X.:.r.Y........................................q.X.S.4.S.4.S.4.S.4.S.4.S.4...X....................0........q.W.S.4.X.:.................J...A...g.........................K.H.V.8..........................F..B.....................,.......................................B..............................................B..B..B..B..B...u..........................................B..B..B..B..B...{.................5.......k...........................................................7R..8F.................................................2........Vb..5C..;I..................R^.....................0................Xc..5C..5C..5C..5C..5C..5C..lv..........................................]i..<J..:G..Zf....................................................
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (5693)
                                                        Category:downloaded
                                                        Size (bytes):697906
                                                        Entropy (8bit):5.5934290978859496
                                                        Encrypted:false
                                                        SSDEEP:6144:TYNlxfbDTYDhzCTNoygVWyJb5em3bL2Mp15gI8seqfh53p+rrvV7i:T25bDTYB+qemD+Nu
                                                        MD5:61632AEF1EA70545E53C29AAECC3E178
                                                        SHA1:C57350B6801E079DBE60E33C76A5FEC186C2E639
                                                        SHA-256:D4E7EE7A1B43DA6177504AF736D09AD589F8278A814C6E95FB5C54ABA2B8A3EE
                                                        SHA-512:EB5BFEEB5AF44D4B9BAE4611D363BED07601F0871E4B53B4FE4EA8995DA6A43D21E30782010EC3C3A0DC7289557B942CC32850C7068BE818453339279328E08E
                                                        Malicious:false
                                                        Reputation:low
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEH86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=LEikZe,_b,_tp,byfTOb,lsjVmc/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlFSx2KuJtQynzb5elc5wFf5a1q72w/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=n73qwf,SCuOPb,IZT63,vfuNJf,UUJqVe,ws9Tlc,siKnQd,XVq9Qb,STuCOe,njlZCf,m9oV,vjKJJ,y5vRwf,iyZMqd,NTMZac,mzzZzc,rCcCxc,vvMGie,K1ZKnb,ziZ8Mc,b3kMqb,mvkUhe,CMcBD,Fndnac,t2srLd,EN3i8d,z0u0L,xiZRqc,NOeYWe,O6y8ed,L9OGUe,PrPYRd,MpJwZc,qPfo0c,cYShmd,hc6Ubd,Rkm0ef,KUM7Z,oLggrd,inNHtf,L1AAkb,WpP9Yc,lwddkf,gJzDyc,SpsfSb,aC1iue,tUnxGc,aW3pY,ZakeSe,EFQ78c,xQtZb,I6YDgd,zbML3c,zr1jrb,vHEMJe,YHI3We,YTxL4,bSspM,Uas9Hd,zy0vNb,K0PMbc,AvtSve,qmdT9,MY7mZe,xBaz7b,GwYlN,eVCnO,EIOG1e,LDQI"
                                                        Preview:"use strict";_F_installCss(".r4WGQb{position:relative}.Dl08I>:first-child{margin-top:0}.Dl08I>:last-child{margin-bottom:0}.IzwVE{color:#1f1f1f;color:var(--gm3-sys-color-on-surface,#1f1f1f);font-family:\"Google Sans\",roboto,\"Noto Sans Myanmar UI\",arial,sans-serif;font-size:1.25rem;font-weight:400;letter-spacing:0rem;line-height:1.2}.l5PPKe{color:#1f1f1f;color:var(--gm3-sys-color-on-surface,#1f1f1f);font-size:1rem}.l5PPKe .dMNVAe{margin:0;padding:0}.l5PPKe>:first-child{margin-top:0;padding-top:0}.l5PPKe>:last-child{margin-bottom:0;padding-bottom:0}.Dl08I{margin:0;padding:0;position:relative}.Dl08I>.SmR8:only-child{padding-top:1px}.Dl08I>.SmR8:only-child::before{top:0}.Dl08I>.SmR8:not(first-child){padding-bottom:1px}.Dl08I>.SmR8::after{bottom:0}.Dl08I>.SmR8:only-child::before,.Dl08I>.SmR8::after{border-bottom:1px solid #c4c7c5;border-bottom:1px solid var(--gm3-sys-color-outline-variant,#c4c7c5);content:\"\";height:0;left:0;position:absolute;width:100%}.aZvCDf{margin-top:8px;margin-left
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:Web Open Font Format (Version 2), TrueType, length 52280, version 1.0
                                                        Category:downloaded
                                                        Size (bytes):52280
                                                        Entropy (8bit):7.995413196679271
                                                        Encrypted:true
                                                        SSDEEP:1536:1rvqtK8DZilXxwJ8mMwAZy7phqsFLdG3B4d:xytBZits8bw4wzbFxG3B4d
                                                        MD5:F61F0D4D0F968D5BBA39A84C76277E1A
                                                        SHA1:AA3693EA140ECA418B4B2A30F6A68F6F43B4BEB2
                                                        SHA-256:57147F08949ABABE7DEEF611435AE418475A693E3823769A25C2A39B6EAD9CCC
                                                        SHA-512:6C3BD90F709BCF9151C9ED9FFEA55C4F6883E7FDA2A4E26BF018C83FE1CFBE4F4AA0DB080D6D024070D53B2257472C399C8AC44EEFD38B9445640EFA85D5C487
                                                        Malicious:false
                                                        Reputation:high, very likely benign file
                                                        URL:https://fonts.gstatic.com/s/googlesans/v58/4UaRrENHsxJlGDuGo1OIlJfC6l_24rlCK1Yo_Iq2vgCI.woff2
                                                        Preview:wOF2.......8.....................................^...$..4?HVAR..?MVAR9.`?STAT.*',..J/.......`..(..Z.0..R.6.$.... .....K..[..q..c..T.....>.P.j.`.w..#...%......N.".....$..3.0.6......... .L.rX/r[j.y.|*(.4.%#.....2.v.m..-..%.....;-.Y.{..&..O=#l@...k..7g..ZI...#.Z./+T..r7...M..3).Z%.x....s..sL..[A!.5*1w'/.8V..2Z..%.X.h.o.).]..9..Q`.$.....7..kZ.~O........d..g.n.d.Rw+&....Cz..uy#..fz,(.J....v.%..`..9.....h...?O..:...c%.....6s....xl..#...5..._......1.>.)"U.4 W....?%......6//!$...!.n9C@n...........!""^.....W..Z<.7.x.."UT.T....E.."R>.R..t.....H d..e_.K../.+8.Q.P.ZQ....;...U....]......._.e*......71.?.7.ORv.?...l...G|.P...|:...I.X..2.,.L........d.g.]}W#uW]QnuP-s.;.-Y.....].......C..j_.M0...y.......J..........NY..@A...,....-.F......'..w./j5g.vUS...U..0.&...y7.LP.....%.....Y......Y..D. e.A..G.?.$.......6...eaK.n5.m...N...,...+BCl..L> .E9~.b[.w.x....6<...}.e...%V....O.......*.?...a..#[eE.4..p..$...].....%......o._......N.._~..El....b..A.0.r8.....|..D.d..
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (522)
                                                        Category:downloaded
                                                        Size (bytes):5049
                                                        Entropy (8bit):5.317800104741948
                                                        Encrypted:false
                                                        SSDEEP:96:oHX9gPiPrfnHhsB0TR6kg1oDPJzLmM18Vh1z2fEZ54TZtnqj6w:EtEAr6BmPZtOeEvW/ncP
                                                        MD5:CE53EF566B68CCF2D62FA044CFB0D138
                                                        SHA1:F48EC60289F2B55E8B388601206888F8295B1EB1
                                                        SHA-256:E6CC5114D92811D5DE0663266D4B63F367834AFA0FC3BAFA54F707038C59D010
                                                        SHA-512:20B434881DE971E263669E6096C01665D4D35B0FBFF47D312A4A442645EE962A8CE6AD7E68246D4EE9691BD30D9B1DDCF7059226492E1B58CD3191B63B001E4D
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEH86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,iAskyc,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziXSP,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlFSx2KuJtQynzb5elc5wFf5a1q72w/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=wg1P6b"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.$Ma=_.y("wg1P6b",[_.OA,_.Fn,_.Rn]);._.k("wg1P6b");.var M5a;M5a=_.oh(["aria-"]);._.mJ=function(a){_.Y.call(this,a.Fa);this.Ja=this.ta=this.aa=this.viewportElement=this.La=null;this.Tc=a.Ea.qf;this.ab=a.Ea.focus;this.Lc=a.Ea.Lc;this.ea=this.Ei();a=-1*parseInt(_.Fo(this.Ei().el(),"marginTop")||"0",10);var b=parseInt(_.Fo(this.Ei().el(),"marginBottom")||"0",10);this.Ta={top:a,right:0,bottom:b,left:0};a=_.gf(this.getData("isMenuDynamic"),!1);b=_.gf(this.getData("isMenuHoisted"),!1);this.Ga=a?1:b?2:0;this.ka=!1;this.Ca=1;this.Ga!==1&&(this.aa=this.Sa("U0exHf").children().Sc(0),_.fu(this,.N5a(this,this.aa.el())));_.mF(this.oa())&&(a=this.oa().el(),b=this.De.bind(this),a.__soy_skip_handler=b)};_.J(_.mJ,_.Y);_.mJ.Ba=function(){return{Ea:{qf:_.SE,focus:_.BE,Lc:_.mu}}};_.mJ.prototype.pF=function(a){var b=a.source;this.La=b;var c;((c=a.data)==null?0:c.Jy)?(a=a.data.Jy,this.Ca=a==="MOUS
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (569)
                                                        Category:downloaded
                                                        Size (bytes):3471
                                                        Entropy (8bit):5.5174491302699495
                                                        Encrypted:false
                                                        SSDEEP:96:ojAmjTJ/fJgpIcB7Fd2tilGBEMO/A6VxV08w:vUTJpgDJXM0ApJ
                                                        MD5:2D999C87DD54C7FE6400D267C33FBB23
                                                        SHA1:414C3A329C2760325EDBACBD7A221D7F8DBFEEE8
                                                        SHA-256:76D55A1AFC1D39CB04D60EB04E45A538A0E75EE2871561C84CC89B1C13596BCC
                                                        SHA-512:72D923BB71DD147139962FF8E2BD0E336E0F6409C212AC2F25387D0F3B4FC9365F5A6D40E2980BB1065534888362C97D6B7663E362D29166B5915D2A9DA7D238
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEH86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,iAskyc,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,wg1P6b,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziXSP,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlFSx2KuJtQynzb5elc5wFf5a1q72w/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=Wt6vjf,hhhU8,FCpbqb,WhJNk"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("Wt6vjf");.var Txa=function(){var a=_.Ke();return _.L(a,1)},Tt=function(a){this.Da=_.t(a,0,Tt.messageId)};_.J(Tt,_.w);Tt.prototype.Ha=function(){return _.Hj(this,1)};Tt.prototype.Va=function(a){return _.Yj(this,1,a)};Tt.messageId="f.bo";var Ut=function(){_.km.call(this)};_.J(Ut,_.km);Ut.prototype.ud=function(){this.jT=!1;Uxa(this);_.km.prototype.ud.call(this)};Ut.prototype.aa=function(){Vxa(this);if(this.hC)return Wxa(this),!1;if(!this.sV)return Vt(this),!0;this.dispatchEvent("p");if(!this.fP)return Vt(this),!0;this.jM?(this.dispatchEvent("r"),Vt(this)):Wxa(this);return!1};.var Xxa=function(a){var b=new _.gp(a.z4);a.WP!=null&&_.Mn(b,"authuser",a.WP);return b},Wxa=function(a){a.hC=!0;var b=Xxa(a),c="rt=r&f_uid="+_.sk(a.fP);_.fn(b,(0,_.eg)(a.ea,a),"POST",c)};.Ut.prototype.ea=function(a){a=a.target;Vxa(this);if(_.jn(a)){this.RJ=0;if(this.jM)this.hC=!1,this.dispatchEvent("r")
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (3346)
                                                        Category:downloaded
                                                        Size (bytes):22827
                                                        Entropy (8bit):5.420322672717721
                                                        Encrypted:false
                                                        SSDEEP:384:/jqdWXWfyA20UUjDE8BSUxDJs16KHvSN34kaHaN+587SaXD2mLR0H:/jqdWXAUUjDE84Wi6KPSKjHaN+58+0J2
                                                        MD5:2B29741A316862EE788996DD29116DD5
                                                        SHA1:9D5551916D4452E977C39B8D69CF88DF2AAA462B
                                                        SHA-256:62955C853976B722EFBB4C116A10DB3FF54580EDD7495D280177550B8F4289AB
                                                        SHA-512:6E37C3258F07F29909763728DADE0CD40A3602D55D9099F78B37756926FCF2A50008B82876B518FEAF3E56617F0F7D1D37A73C346A99A58E6AD8BCD6689E9B15
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEH86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,Rkm0ef,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlFSx2KuJtQynzb5elc5wFf5a1q72w/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=RqjULd"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.pu.prototype.da=_.ca(38,function(){return _.vj(this,3)});_.Vy=function(a,b){this.key=a;this.defaultValue=!1;this.flagName=b};_.Vy.prototype.ctor=function(a){return typeof a==="boolean"?a:this.defaultValue};_.Wy=function(){this.ka=!0;var a=_.Bj(_.jk(_.Fe("TSDtV",window),_.pya),_.pu,1,_.uj())[0];if(a){var b={};for(var c=_.n(_.Bj(a,_.qya,2,_.uj())),d=c.next();!d.done;d=c.next()){d=d.value;var e=_.Nj(d,1).toString();switch(_.xj(d,_.qu)){case 3:b[e]=_.Lj(d,_.pj(d,_.qu,3));break;case 2:b[e]=_.Nj(d,_.pj(d,_.qu,2));break;case 4:b[e]=_.Oj(d,_.pj(d,_.qu,4));break;case 5:b[e]=_.L(d,_.pj(d,_.qu,5));break;case 6:b[e]=_.Sj(d,_.kf,6,_.qu);break;default:throw Error("id`"+_.xj(d,_.qu));}}}else b={};this.ea=b;this.token=.a?a.da():null};_.Wy.prototype.aa=function(a){if(!this.ka||a.key in this.ea)a=a.ctor(this.ea[a.key]);else if(_.Fe("nQyAE",window)){var b=_.sya(a.flagName);if(b===null)a=a.def
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (468)
                                                        Category:downloaded
                                                        Size (bytes):1858
                                                        Entropy (8bit):5.253939888205379
                                                        Encrypted:false
                                                        SSDEEP:48:o7BNJfeFb8L3A6FHqIy5Z+d70OCzSfvi/3fM/r8ZQzRrw:oFuILhFHrVCz0vLZz9w
                                                        MD5:10FF6F99E3228E96AFD6E2C30EF97C0A
                                                        SHA1:4AE3DCB8D1F5A0C302D5BAD9DFF5050A7A5E8130
                                                        SHA-256:95E5546E1C7F311D07BB5050CC456A973E43BCC4777BA6014757376016537679
                                                        SHA-512:116C0B1CAC98A27044100005545AB66BE5F4801D75DC259093A9F145B3A4ACD8DC1C360AF525F6DC8421CD54B675A78023D2ED8B57F5946A3969543758C673C9
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEH86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlFSx2KuJtQynzb5elc5wFf5a1q72w/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=iAskyc,ziXSP"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("iAskyc");._.$Z=function(a){_.X.call(this,a.Fa);this.window=a.Ea.window.get();this.Mc=a.Ea.Mc};_.J(_.$Z,_.X);_.$Z.Ba=function(){return{Ea:{window:_.lu,Mc:_.vE}}};_.$Z.prototype.Mo=function(){};_.$Z.prototype.addEncryptionRecoveryMethod=function(){};_.a_=function(a){return(a==null?void 0:a.Go)||function(){}};_.b_=function(a){return(a==null?void 0:a.N2)||function(){}};_.OOb=function(a){return(a==null?void 0:a.Mp)||function(){}};._.POb=function(a){return new Map(Array.from(a,function(b){var c=_.n(b);b=c.next().value;c=c.next().value;return[b,c.map(function(d){return{epoch:d.epoch,key:new Uint8Array(d.key)}})]}))};_.QOb=function(a){setTimeout(function(){throw a;},0)};_.$Z.prototype.WN=function(){return!0};_.iu(_.Dn,_.$Z);._.l();._.k("ziXSP");.var t_=function(a){_.$Z.call(this,a.Fa)};_.J(t_,_.$Z);t_.Ba=_.$Z.Ba;t_.prototype.Mo=function(a,b,c){var d;if((d=this.window.chrome)==nu
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (395)
                                                        Category:downloaded
                                                        Size (bytes):1608
                                                        Entropy (8bit):5.280977407061266
                                                        Encrypted:false
                                                        SSDEEP:48:o7YNJvl3WlENrpB3stYCIgMxILNH/wf7DVTBpdQrw:oApB8iDwYlGw
                                                        MD5:4FB66582D37D04933F00E49C2FBA34D4
                                                        SHA1:3DB09C53BBEB1EEB045A001356E498D8EF30915D
                                                        SHA-256:A97DAC01ABFE3EB75C7C97D504E21BDDDADDB6EBE0B56B6A9A10CD3700CAB41B
                                                        SHA-512:2AEB3A6CFFBF6EFA626EBDC9E11ACBAC04BFE986F98FBC050B2501898B289C67D392ED195D16ACC9565EF8784401ADA1E88188CDE3A7AB12D98BB5ED7D8A5711
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEH86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlFSx2KuJtQynzb5elc5wFf5a1q72w/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=w9hDv,ZDZcre,A7fCU"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("w9hDv");._.zg(_.Kla);_.$z=function(a){_.X.call(this,a.Fa);this.aa=a.Wa.cache};_.J(_.$z,_.X);_.$z.Ba=function(){return{Wa:{cache:_.Zs}}};_.$z.prototype.execute=function(a){_.Gb(a,function(b){var c;_.df(b)&&(c=b.eb.jc(b.jb));c&&this.aa.oG(c)},this);return{}};_.iu(_.Qla,_.$z);._.l();._.k("ZDZcre");.var ZG=function(a){_.X.call(this,a.Fa);this.Nl=a.Ea.Nl;this.G3=a.Ea.metadata;this.aa=a.Ea.Ws};_.J(ZG,_.X);ZG.Ba=function(){return{Ea:{Nl:_.DG,metadata:_.HZa,Ws:_.AG}}};ZG.prototype.execute=function(a){var b=this;a=this.aa.create(a);return _.Gb(a,function(c){var d=b.G3.getType(c.Md())===2?b.Nl.Pb(c):b.Nl.fetch(c);return _.Jl(c,_.EG)?d.then(function(e){return _.Jd(e)}):d},this)};_.iu(_.Vla,ZG);._.l();._.k("K5nYTd");._.GZa=new _.uf(_.Rla);._.l();._.k("sP4Vbe");.._.l();._.k("kMFpHd");.._.l();._.k("A7fCU");.var GG=function(a){_.X.call(this,a.Fa);this.aa=a.Ea.ZP};_.J(GG,_.X);GG.Ba=func
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (553)
                                                        Category:downloaded
                                                        Size (bytes):604377
                                                        Entropy (8bit):5.790228291888412
                                                        Encrypted:false
                                                        SSDEEP:3072:l0pApkygA62bwwdnO2YflNYhFGOizdGj008PpVVM96C5bMEPQUhts6FV8eKqtVAQ:llgNmwwdnOsF98oNGuQRAYqXsI1x
                                                        MD5:286F2996F0ABEBBEBF95F7F14685F8CF
                                                        SHA1:8F1D6ECFE1669D6503BA2D78352EB914AF58571A
                                                        SHA-256:70E7837B2A17751C0A61DD21B49975DC08D0939A33201D313D0BDF64E6851F9B
                                                        SHA-512:8B51E9CB3B075E0203140CD567BB282719CDF10A929482C3804D9873CD5A81E29C3D9546CA0FB93D7B61FCD88C128903CFBDD79DFF34941C177EB4A9B1C4995D
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/am=xIFgKBi2EQjEH86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/excm=_b,_tp,identifierview/ed=1/dg=0/wt=2/ujg=1/rs=AOaEmlGJ4o321hY8zfkESxEyT6FjvlBr8A/m=_b,_tp"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._._F_toggles_initialize=function(a){(typeof globalThis!=="undefined"?globalThis:typeof self!=="undefined"?self:this)._F_toggles=a||[]};(0,_._F_toggles_initialize)([0x286081c4, 0x2046d860, 0x1ce1fc40, 0x51407a0, 0x1908, 0x0, 0x1b400000, 0x19a00000, 0x0, ]);./*.. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright Google LLC. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright 2024 Google, Inc. SPDX-License-Identifier: MIT.*/./*. SPDX-License-Identifier: Apache-2.0.*/./*. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/.var baa,daa,Na,Ua,gaa,iaa,lb,qaa,xaa,Daa,Iaa,Laa,Mb,Maa,Rb,Vb,Wb,Naa,Oaa,Xb,Paa,Qaa,Raa,ac,Waa,Yaa,ic,jc,kc,cba,dba,hba,kba,mba,nba,rba,uba,oba,tba,sba,qba,pba,vba,zba,Dba,Eba,Bba,Kc,Lc,Hba,Jba,Nba,Oba,Pba,Qba,Mba,Rba,Tba,gd,Vba,Wba,Yba,$ba,Zba,bca,cca,dca,eca,gca,fca,ica,jca,kca,lca,oca,r
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (683)
                                                        Category:downloaded
                                                        Size (bytes):3131
                                                        Entropy (8bit):5.3750044852869046
                                                        Encrypted:false
                                                        SSDEEP:48:o7zfN/cD498xdg+Y5jNQ8js6npwk0OmNAEZbpMzR4EQBcW5QcHj9KWfGAeFKRrw:oCD9dA5jOEGh+EFqR4rhqUhzff9w
                                                        MD5:39693D34EE3D1829DBB1627C4FC6687B
                                                        SHA1:A03303C2F027F3749B48D5134D1F8FB3E495C6E9
                                                        SHA-256:03B0C1B4E402E0BCF75D530DD9085B25357EEFD09E238453DE1F3A042542C076
                                                        SHA-512:AC0749EDC33DA0EC0E40470388DD797B6528AD08B8FAC1C2AC42F85198131052BA1B533E90409D35DA237607E8B07D591FA6BA580B6A90B0D0AB2282A01F7585
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEH86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlFSx2KuJtQynzb5elc5wFf5a1q72w/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=ZwDk9d,RMhBfe"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("ZwDk9d");.var bA=function(a){_.X.call(this,a.Fa)};_.J(bA,_.X);bA.Ba=_.X.Ba;bA.prototype.wR=function(a){return _.af(this,{Wa:{HS:_.ol}}).then(function(b){var c=window._wjdd,d=window._wjdc;return!c&&d?new _.oi(function(e){window._wjdc=function(f){d(f);e(PJa(f,b,a))}}):PJa(c,b,a)})};var PJa=function(a,b,c){return(a=a&&a[c])?a:b.Wa.HS.wR(c)};.bA.prototype.aa=function(a,b){var c=_.csa(b).Gj;if(c.startsWith("$")){var d=_.jm.get(a);_.xq[b]&&(d||(d={},_.jm.set(a,d)),d[c]=_.xq[b],delete _.xq[b],_.yq--);if(d)if(a=d[c])b=_.ef(a);else throw Error("Jb`"+b);else b=null}else b=null;return b};_.iu(_.Mfa,bA);._.l();._.k("SNUn3");._.OJa=new _.uf(_.Ag);._.l();._.k("RMhBfe");.var QJa=function(a){var b=_.wq(a);return b?new _.oi(function(c,d){var e=function(){b=_.wq(a);var f=_.Tfa(a,b);f?c(f.getAttribute("jsdata")):window.document.readyState=="complete"?(f=["Unable to find deferred jsdata wit
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:downloaded
                                                        Size (bytes):84
                                                        Entropy (8bit):4.875266466142591
                                                        Encrypted:false
                                                        SSDEEP:3:DZFJu0+WVTBCq2Bjdw2KsJJuYHSKnZ:lFJuuVTBudw29nu4SKZ
                                                        MD5:87B6333E98B7620EA1FF98D1A837A39E
                                                        SHA1:105DE6815B0885357DE1414BFC0D77FCC9E924EF
                                                        SHA-256:DCD3C133C5C40BECD4100BBE6EDAE84C9735E778E4234A5E8395C56FF8A733BA
                                                        SHA-512:867D7943D813685FAA76394E53199750C55817E836FD19C933F74D11E9657CE66719A6D6B2E39EE1DE62358BCE364E38A55F4E138DF92337DE6985DDCD5D0994
                                                        Malicious:false
                                                        URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISHgmA6QC9dWevzxIFDRkBE_oSBQ3oIX6GEgUN05ioBw==?alt=proto
                                                        Preview:Cj0KBw0ZARP6GgAKKQ3oIX6GGgQISxgCKhwIClIYCg5AIS4jJF8qLSY/Ky8lLBABGP////8PCgcN05ioBxoA
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (1694)
                                                        Category:downloaded
                                                        Size (bytes):32499
                                                        Entropy (8bit):5.361345284201954
                                                        Encrypted:false
                                                        SSDEEP:768:mLX1O+aL6fgyIiREM4RKmh90toLoTswtF3ATcbDR6kIsnJd9DPyMv/FI:U2M4oltoLoTswtFoc/tIsnXFLI
                                                        MD5:D5C3FB8EAE24AB7E40009338B5078496
                                                        SHA1:5638BF5986A6445A88CD79A9B690B744B126BEC2
                                                        SHA-256:597C14D360D690BCFDC2B8D315E6BB8879AEF33DE6C30D274743079BDB63C6B0
                                                        SHA-512:6AE434850D473BEF15AA694AB4862596982CDDA6BD3991991D3ADD8F4A5F61DFBF8756D0DA98B72EF083909D68CF7B6B148A6488E9381F92FBF15CCB20176A0E
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEH86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=_b,_tp/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlFSx2KuJtQynzb5elc5wFf5a1q72w/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=byfTOb,lsjVmc,LEikZe"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{.var qua=function(a,b){this.da=a;this.ea=b;if(!c){var c=new _.gp("//www.google.com/images/cleardot.gif");_.rp(c)}this.ka=c};_.h=qua.prototype;_.h.Vc=null;_.h.QY=1E4;_.h.Iz=!1;_.h.TP=0;_.h.qJ=null;_.h.DU=null;_.h.setTimeout=function(a){this.QY=a};_.h.start=function(){if(this.Iz)throw Error("dc");this.Iz=!0;this.TP=0;rua(this)};_.h.stop=function(){sua(this);this.Iz=!1};.var rua=function(a){a.TP++;navigator!==null&&"onLine"in navigator&&!navigator.onLine?_.om((0,_.eg)(a.JG,a,!1),0):(a.aa=new Image,a.aa.onload=(0,_.eg)(a.Xia,a),a.aa.onerror=(0,_.eg)(a.Wia,a),a.aa.onabort=(0,_.eg)(a.Via,a),a.qJ=_.om(a.Yia,a.QY,a),a.aa.src=String(a.ka))};_.h=qua.prototype;_.h.Xia=function(){this.JG(!0)};_.h.Wia=function(){this.JG(!1)};_.h.Via=function(){this.JG(!1)};_.h.Yia=function(){this.JG(!1)};._.h.JG=function(a){sua(this);a?(this.Iz=!1,this.da.call(this.ea,!0)):this.TP<=0?rua(this):(this.Iz=!1,
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (755)
                                                        Category:downloaded
                                                        Size (bytes):1460
                                                        Entropy (8bit):5.316515499943097
                                                        Encrypted:false
                                                        SSDEEP:24:kMYD7DduJqrxsNL90YIzFK/Hb5eNhz1uktdDuvKKKGbLZ99GbSSF/ZR8OkdnprGJ:o7DQJopFN+ASCKKGbF99GbSS3RY7rw
                                                        MD5:D97AB4594FC610665FF2763A650EE6A8
                                                        SHA1:5C7459CA838D27BE45745571D8D96D156F4B9F8D
                                                        SHA-256:767D778369623FD8F5FB98D3BCC3130D05D02CBE0B9B88DD226F43281B14E9AF
                                                        SHA-512:CE4941B41C3A8CC983C1BBCC87EF682823CB9DB24EA7A570E35BBF832046340D433F7D47211384B61FA38F3527CC35C195A6068CCB24B48E1F492C5B4D4192A1
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEH86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlFSx2KuJtQynzb5elc5wFf5a1q72w/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=P6sQOc"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("lOO0Vd");._.HZa=new _.uf(_.Km);._.l();._.k("P6sQOc");.var MZa=!!(_.Nh[1]&16);var OZa=function(a,b,c,d,e){this.ea=a;this.ta=b;this.ka=c;this.Ca=d;this.Ga=e;this.aa=0;this.da=NZa(this)},PZa=function(a){var b={};_.Ma(a.hS(),function(e){b[e]=!0});var c=a.WR(),d=a.cS();return new OZa(a.XO(),c.aa()*1E3,a.oR(),d.aa()*1E3,b)},NZa=function(a){return Math.random()*Math.min(a.ta*Math.pow(a.ka,a.aa),a.Ca)},HG=function(a,b){return a.aa>=a.ea?!1:b!=null?!!a.Ga[b]:!0};var IG=function(a){_.X.call(this,a.Fa);this.da=a.Ea.mV;this.ea=a.Ea.metadata;a=a.Ea.lga;this.fetch=a.fetch.bind(a)};_.J(IG,_.X);IG.Ba=function(){return{Ea:{mV:_.KZa,metadata:_.HZa,lga:_.AZa}}};IG.prototype.aa=function(a,b){if(this.ea.getType(a.Md())!==1)return _.Vm(a);var c=this.da.JU;return(c=c?PZa(c):null)&&HG(c)?_.mya(a,QZa(this,a,b,c)):_.Vm(a)};.var QZa=function(a,b,c,d){return c.then(function(e){return e},function(e)
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (533)
                                                        Category:downloaded
                                                        Size (bytes):9210
                                                        Entropy (8bit):5.3872171131917925
                                                        Encrypted:false
                                                        SSDEEP:192:FK/pAzN7GZ068Hqhqu6DQaVapzYjgKItwdiwUsYRTi1j1t9bRl9:FqI7GZ04dRYjghtgisYYbt9ll9
                                                        MD5:AB70454DE18E1CE16E61EAC290FC304D
                                                        SHA1:68532B5E8B262D7E14B8F4507AA69A61146B3C18
                                                        SHA-256:B32D746867CC4FA21FD39437502F401D952D0A3E8DC708DFB7D58B85F256C0F1
                                                        SHA-512:A123C517380BEF0B47F23A5A6E1D16650FE39D9C701F9FA5ADD79294973C118E8EA3A7BA32CB63C3DFC0CE0F843FB86BFFCAA2AAE987629E7DFF84F176DEBB98
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEH86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=AvtSve,CMcBD,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PrPYRd,Rkm0ef,SCuOPb,STuCOe,SpsfSb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,byfTOb,cYShmd,eVCnO,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,qPfo0c,qmdT9,rCcCxc,siKnQd,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlFSx2KuJtQynzb5elc5wFf5a1q72w/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=ltDFwf,SD8Jgb,rmumx,E87wgc,qPYxq,Tbb4sb,pxq3x,f8Gu1e,soHxf,YgOFye,yRXbo,bTi8wc,ywOR5c,PHUIyb"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.gNa=_.y("SD8Jgb",[]);._.QX=function(a,b){if(typeof b==="string")a.Nc(b);else if(b instanceof _.Ip&&b.ia&&b.ia===_.B)b=_.$a(b.ww()),a.empty().append(b);else if(b instanceof _.Wa)b=_.$a(b),a.empty().append(b);else if(b instanceof Node)a.empty().append(b);else throw Error("Vf");};_.RX=function(a){var b=_.Lo(a,"[jsslot]");if(b.size()>0)return b;b=new _.Jo([_.Qk("span")]);_.Mo(b,"jsslot","");a.empty().append(b);return b};_.TKb=function(a){return a===null||typeof a==="string"&&_.Ki(a)};._.k("SD8Jgb");._.WX=function(a){_.Y.call(this,a.Fa);this.Ua=a.controller.Ua;this.kd=a.controllers.kd[0]||null;this.header=a.controller.header;this.nav=a.controller.nav;var b;(b=this.oa().find("button:not([type])").el())==null||b.setAttribute("type","button")};_.J(_.WX,_.Y);_.WX.Ba=function(){return{controller:{Ua:{jsname:"n7vHCb",ctor:_.hv},header:{jsname:"tJHJj",ctor:_.hv},nav:{jsname:"DH6Rkf",ct
                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Entropy (8bit):7.0367474834889
                                                        TrID:
                                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                        • DOS Executable Generic (2002/1) 0.02%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:file.exe
                                                        File size:1'167'360 bytes
                                                        MD5:4bef7b2f09cef526ebce72fb190173ab
                                                        SHA1:4342c837573c7eb7823a5f749d2e167c9a1690d4
                                                        SHA256:e39b149e059d34e59eb76a80a65b44c952517da99ec78d2bfdefa891abc6db6c
                                                        SHA512:27da738577cfe57fba36dbbb74b627917d5a308a7103f765dd0e482654156a579d8550a9f1c89940d5f6860ce26d2454f06b136ca3a51cc9a66415cfd6701170
                                                        SSDEEP:24576:9qDEvCTbMWu7rQYlBQcBiT6rprG8arZ2+b+HdiJUK:9TvC/MTQYxsWR7arZ2+b+HoJU
                                                        TLSH:9045CF027391C022FF9B92734F5AF6115BBC69260123E61F13981DBABE701B1563E7A3
                                                        File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                        Icon Hash:aaf3e3e3938382a0
                                                        Entrypoint:0x420577
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                        DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x66F714C1 [Fri Sep 27 20:25:37 2024 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:5
                                                        OS Version Minor:1
                                                        File Version Major:5
                                                        File Version Minor:1
                                                        Subsystem Version Major:5
                                                        Subsystem Version Minor:1
                                                        Import Hash:948cc502fe9226992dce9417f952fce3
                                                        Instruction
                                                        call 00007F381CC7E653h
                                                        jmp 00007F381CC7DF5Fh
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        push dword ptr [ebp+08h]
                                                        mov esi, ecx
                                                        call 00007F381CC7E13Dh
                                                        mov dword ptr [esi], 0049FDF0h
                                                        mov eax, esi
                                                        pop esi
                                                        pop ebp
                                                        retn 0004h
                                                        and dword ptr [ecx+04h], 00000000h
                                                        mov eax, ecx
                                                        and dword ptr [ecx+08h], 00000000h
                                                        mov dword ptr [ecx+04h], 0049FDF8h
                                                        mov dword ptr [ecx], 0049FDF0h
                                                        ret
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        push dword ptr [ebp+08h]
                                                        mov esi, ecx
                                                        call 00007F381CC7E10Ah
                                                        mov dword ptr [esi], 0049FE0Ch
                                                        mov eax, esi
                                                        pop esi
                                                        pop ebp
                                                        retn 0004h
                                                        and dword ptr [ecx+04h], 00000000h
                                                        mov eax, ecx
                                                        and dword ptr [ecx+08h], 00000000h
                                                        mov dword ptr [ecx+04h], 0049FE14h
                                                        mov dword ptr [ecx], 0049FE0Ch
                                                        ret
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        mov esi, ecx
                                                        lea eax, dword ptr [esi+04h]
                                                        mov dword ptr [esi], 0049FDD0h
                                                        and dword ptr [eax], 00000000h
                                                        and dword ptr [eax+04h], 00000000h
                                                        push eax
                                                        mov eax, dword ptr [ebp+08h]
                                                        add eax, 04h
                                                        push eax
                                                        call 00007F381CC80CFDh
                                                        pop ecx
                                                        pop ecx
                                                        mov eax, esi
                                                        pop esi
                                                        pop ebp
                                                        retn 0004h
                                                        lea eax, dword ptr [ecx+04h]
                                                        mov dword ptr [ecx], 0049FDD0h
                                                        push eax
                                                        call 00007F381CC80D48h
                                                        pop ecx
                                                        ret
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        mov esi, ecx
                                                        lea eax, dword ptr [esi+04h]
                                                        mov dword ptr [esi], 0049FDD0h
                                                        push eax
                                                        call 00007F381CC80D31h
                                                        test byte ptr [ebp+08h], 00000001h
                                                        pop ecx
                                                        Programming Language:
                                                        • [ C ] VS2008 SP1 build 30729
                                                        • [IMP] VS2008 SP1 build 30729
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x46464.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x11b0000x7594.reloc
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .rsrc0xd40000x464640x46600338d803b6b1bf0eb165a2318d70be46dFalse0.9059655306394316data7.844921345624461IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .reloc0x11b0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                        RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                        RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                        RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                        RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                        RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                        RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                        RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                        RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                        RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                        RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                        RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                                        RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                                        RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                                        RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                                        RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                        RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                        RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                        RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                        RT_RCDATA0xdc7b80x3d72cdata1.0003416874592757
                                                        RT_GROUP_ICON0x119ee40x76dataEnglishGreat Britain0.6610169491525424
                                                        RT_GROUP_ICON0x119f5c0x14dataEnglishGreat Britain1.25
                                                        RT_GROUP_ICON0x119f700x14dataEnglishGreat Britain1.15
                                                        RT_GROUP_ICON0x119f840x14dataEnglishGreat Britain1.25
                                                        RT_VERSION0x119f980xdcdataEnglishGreat Britain0.6181818181818182
                                                        RT_MANIFEST0x11a0740x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                        DLLImport
                                                        WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                        VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                        WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                        COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                        MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                        WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                        PSAPI.DLLGetProcessMemoryInfo
                                                        IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                        USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                        UxTheme.dllIsThemeActive
                                                        KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                        USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                        GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                        COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                        ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                        SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                        ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                        OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                        Language of compilation systemCountry where language is spokenMap
                                                        EnglishGreat Britain
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Sep 27, 2024 23:14:00.489164114 CEST49736443192.168.2.4142.250.186.174
                                                        Sep 27, 2024 23:14:00.489188910 CEST44349736142.250.186.174192.168.2.4
                                                        Sep 27, 2024 23:14:00.489253998 CEST49736443192.168.2.4142.250.186.174
                                                        Sep 27, 2024 23:14:00.489948988 CEST49736443192.168.2.4142.250.186.174
                                                        Sep 27, 2024 23:14:00.489959955 CEST44349736142.250.186.174192.168.2.4
                                                        Sep 27, 2024 23:14:01.124627113 CEST44349736142.250.186.174192.168.2.4
                                                        Sep 27, 2024 23:14:01.125039101 CEST49736443192.168.2.4142.250.186.174
                                                        Sep 27, 2024 23:14:01.125052929 CEST44349736142.250.186.174192.168.2.4
                                                        Sep 27, 2024 23:14:01.125396013 CEST44349736142.250.186.174192.168.2.4
                                                        Sep 27, 2024 23:14:01.125456095 CEST49736443192.168.2.4142.250.186.174
                                                        Sep 27, 2024 23:14:01.125991106 CEST44349736142.250.186.174192.168.2.4
                                                        Sep 27, 2024 23:14:01.126104116 CEST49736443192.168.2.4142.250.186.174
                                                        Sep 27, 2024 23:14:01.127114058 CEST49736443192.168.2.4142.250.186.174
                                                        Sep 27, 2024 23:14:01.127166033 CEST44349736142.250.186.174192.168.2.4
                                                        Sep 27, 2024 23:14:01.127330065 CEST49736443192.168.2.4142.250.186.174
                                                        Sep 27, 2024 23:14:01.127335072 CEST44349736142.250.186.174192.168.2.4
                                                        Sep 27, 2024 23:14:01.179227114 CEST49736443192.168.2.4142.250.186.174
                                                        Sep 27, 2024 23:14:01.427561998 CEST44349736142.250.186.174192.168.2.4
                                                        Sep 27, 2024 23:14:01.427638054 CEST44349736142.250.186.174192.168.2.4
                                                        Sep 27, 2024 23:14:01.427676916 CEST49736443192.168.2.4142.250.186.174
                                                        Sep 27, 2024 23:14:01.429733992 CEST49736443192.168.2.4142.250.186.174
                                                        Sep 27, 2024 23:14:01.429733992 CEST49736443192.168.2.4142.250.186.174
                                                        Sep 27, 2024 23:14:01.661241055 CEST49675443192.168.2.4173.222.162.32
                                                        Sep 27, 2024 23:14:01.741105080 CEST49736443192.168.2.4142.250.186.174
                                                        Sep 27, 2024 23:14:01.741121054 CEST44349736142.250.186.174192.168.2.4
                                                        Sep 27, 2024 23:14:03.873248100 CEST49741443192.168.2.4142.250.186.132
                                                        Sep 27, 2024 23:14:03.873306036 CEST44349741142.250.186.132192.168.2.4
                                                        Sep 27, 2024 23:14:03.873384953 CEST49741443192.168.2.4142.250.186.132
                                                        Sep 27, 2024 23:14:03.873636961 CEST49741443192.168.2.4142.250.186.132
                                                        Sep 27, 2024 23:14:03.873661041 CEST44349741142.250.186.132192.168.2.4
                                                        Sep 27, 2024 23:14:04.016244888 CEST49742443192.168.2.4184.28.90.27
                                                        Sep 27, 2024 23:14:04.016273022 CEST44349742184.28.90.27192.168.2.4
                                                        Sep 27, 2024 23:14:04.016350031 CEST49742443192.168.2.4184.28.90.27
                                                        Sep 27, 2024 23:14:04.018095970 CEST49742443192.168.2.4184.28.90.27
                                                        Sep 27, 2024 23:14:04.018121958 CEST44349742184.28.90.27192.168.2.4
                                                        Sep 27, 2024 23:14:04.531274080 CEST44349741142.250.186.132192.168.2.4
                                                        Sep 27, 2024 23:14:04.531461954 CEST49741443192.168.2.4142.250.186.132
                                                        Sep 27, 2024 23:14:04.531477928 CEST44349741142.250.186.132192.168.2.4
                                                        Sep 27, 2024 23:14:04.532948017 CEST44349741142.250.186.132192.168.2.4
                                                        Sep 27, 2024 23:14:04.533006907 CEST49741443192.168.2.4142.250.186.132
                                                        Sep 27, 2024 23:14:04.533858061 CEST49741443192.168.2.4142.250.186.132
                                                        Sep 27, 2024 23:14:04.533955097 CEST44349741142.250.186.132192.168.2.4
                                                        Sep 27, 2024 23:14:04.583297968 CEST49741443192.168.2.4142.250.186.132
                                                        Sep 27, 2024 23:14:04.583307981 CEST44349741142.250.186.132192.168.2.4
                                                        Sep 27, 2024 23:14:04.630179882 CEST49741443192.168.2.4142.250.186.132
                                                        Sep 27, 2024 23:14:04.660387993 CEST44349742184.28.90.27192.168.2.4
                                                        Sep 27, 2024 23:14:04.660456896 CEST49742443192.168.2.4184.28.90.27
                                                        Sep 27, 2024 23:14:04.663450956 CEST49742443192.168.2.4184.28.90.27
                                                        Sep 27, 2024 23:14:04.663461924 CEST44349742184.28.90.27192.168.2.4
                                                        Sep 27, 2024 23:14:04.663990974 CEST44349742184.28.90.27192.168.2.4
                                                        Sep 27, 2024 23:14:04.701287985 CEST49742443192.168.2.4184.28.90.27
                                                        Sep 27, 2024 23:14:04.747416973 CEST44349742184.28.90.27192.168.2.4
                                                        Sep 27, 2024 23:14:04.929353952 CEST44349742184.28.90.27192.168.2.4
                                                        Sep 27, 2024 23:14:04.929425001 CEST44349742184.28.90.27192.168.2.4
                                                        Sep 27, 2024 23:14:04.929476023 CEST49742443192.168.2.4184.28.90.27
                                                        Sep 27, 2024 23:14:04.930111885 CEST49742443192.168.2.4184.28.90.27
                                                        Sep 27, 2024 23:14:04.930145025 CEST44349742184.28.90.27192.168.2.4
                                                        Sep 27, 2024 23:14:04.930170059 CEST49742443192.168.2.4184.28.90.27
                                                        Sep 27, 2024 23:14:04.930186987 CEST44349742184.28.90.27192.168.2.4
                                                        Sep 27, 2024 23:14:04.966809034 CEST49745443192.168.2.4184.28.90.27
                                                        Sep 27, 2024 23:14:04.966854095 CEST44349745184.28.90.27192.168.2.4
                                                        Sep 27, 2024 23:14:04.966942072 CEST49745443192.168.2.4184.28.90.27
                                                        Sep 27, 2024 23:14:04.967184067 CEST49745443192.168.2.4184.28.90.27
                                                        Sep 27, 2024 23:14:04.967200041 CEST44349745184.28.90.27192.168.2.4
                                                        Sep 27, 2024 23:14:05.627109051 CEST44349745184.28.90.27192.168.2.4
                                                        Sep 27, 2024 23:14:05.627192974 CEST49745443192.168.2.4184.28.90.27
                                                        Sep 27, 2024 23:14:05.628437042 CEST49745443192.168.2.4184.28.90.27
                                                        Sep 27, 2024 23:14:05.628473997 CEST44349745184.28.90.27192.168.2.4
                                                        Sep 27, 2024 23:14:05.628820896 CEST44349745184.28.90.27192.168.2.4
                                                        Sep 27, 2024 23:14:05.630172968 CEST49745443192.168.2.4184.28.90.27
                                                        Sep 27, 2024 23:14:05.675448895 CEST44349745184.28.90.27192.168.2.4
                                                        Sep 27, 2024 23:14:05.907011986 CEST44349745184.28.90.27192.168.2.4
                                                        Sep 27, 2024 23:14:05.907077074 CEST44349745184.28.90.27192.168.2.4
                                                        Sep 27, 2024 23:14:05.907306910 CEST49745443192.168.2.4184.28.90.27
                                                        Sep 27, 2024 23:14:05.908132076 CEST49745443192.168.2.4184.28.90.27
                                                        Sep 27, 2024 23:14:05.908149004 CEST44349745184.28.90.27192.168.2.4
                                                        Sep 27, 2024 23:14:08.274018049 CEST49756443192.168.2.4142.250.186.110
                                                        Sep 27, 2024 23:14:08.274086952 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:08.274166107 CEST49756443192.168.2.4142.250.186.110
                                                        Sep 27, 2024 23:14:08.274364948 CEST49756443192.168.2.4142.250.186.110
                                                        Sep 27, 2024 23:14:08.274401903 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:09.034440041 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:09.075588942 CEST49756443192.168.2.4142.250.186.110
                                                        Sep 27, 2024 23:14:09.075937033 CEST49756443192.168.2.4142.250.186.110
                                                        Sep 27, 2024 23:14:09.075973034 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:09.076662064 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:09.076736927 CEST49756443192.168.2.4142.250.186.110
                                                        Sep 27, 2024 23:14:09.077662945 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:09.077737093 CEST49756443192.168.2.4142.250.186.110
                                                        Sep 27, 2024 23:14:09.078668118 CEST49756443192.168.2.4142.250.186.110
                                                        Sep 27, 2024 23:14:09.078757048 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:09.078887939 CEST49756443192.168.2.4142.250.186.110
                                                        Sep 27, 2024 23:14:09.078907013 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:09.119378090 CEST49756443192.168.2.4142.250.186.110
                                                        Sep 27, 2024 23:14:09.354038954 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:09.354099989 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:09.354140043 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:09.354162931 CEST49756443192.168.2.4142.250.186.110
                                                        Sep 27, 2024 23:14:09.354211092 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:09.354240894 CEST49756443192.168.2.4142.250.186.110
                                                        Sep 27, 2024 23:14:09.360212088 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:09.360289097 CEST49756443192.168.2.4142.250.186.110
                                                        Sep 27, 2024 23:14:09.360313892 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:09.366569042 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:09.366605043 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:09.366642952 CEST49756443192.168.2.4142.250.186.110
                                                        Sep 27, 2024 23:14:09.366664886 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:09.366722107 CEST49756443192.168.2.4142.250.186.110
                                                        Sep 27, 2024 23:14:09.372756958 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:09.372832060 CEST49756443192.168.2.4142.250.186.110
                                                        Sep 27, 2024 23:14:09.379785061 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:09.379857063 CEST49756443192.168.2.4142.250.186.110
                                                        Sep 27, 2024 23:14:09.379875898 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:09.379934072 CEST49756443192.168.2.4142.250.186.110
                                                        Sep 27, 2024 23:14:09.426079988 CEST49760443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:09.426121950 CEST44349760216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:09.426191092 CEST49760443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:09.427037001 CEST49760443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:09.427052975 CEST44349760216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:09.440468073 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:09.440531015 CEST49756443192.168.2.4142.250.186.110
                                                        Sep 27, 2024 23:14:09.440541029 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:09.440591097 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:09.440645933 CEST49756443192.168.2.4142.250.186.110
                                                        Sep 27, 2024 23:14:09.443532944 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:09.443618059 CEST49756443192.168.2.4142.250.186.110
                                                        Sep 27, 2024 23:14:09.449671030 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:09.449747086 CEST49756443192.168.2.4142.250.186.110
                                                        Sep 27, 2024 23:14:09.449754000 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:09.449768066 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:09.449809074 CEST49756443192.168.2.4142.250.186.110
                                                        Sep 27, 2024 23:14:09.455966949 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:09.456053972 CEST49756443192.168.2.4142.250.186.110
                                                        Sep 27, 2024 23:14:09.462460995 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:09.462542057 CEST49756443192.168.2.4142.250.186.110
                                                        Sep 27, 2024 23:14:09.462557077 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:09.468800068 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:09.468868017 CEST49756443192.168.2.4142.250.186.110
                                                        Sep 27, 2024 23:14:09.468883038 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:09.473838091 CEST49762443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:09.473882914 CEST44349762216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:09.474035025 CEST49762443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:09.474529028 CEST49762443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:09.474558115 CEST44349762216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:09.474936962 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:09.474993944 CEST49756443192.168.2.4142.250.186.110
                                                        Sep 27, 2024 23:14:09.475007057 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:09.475069046 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:09.475116014 CEST49756443192.168.2.4142.250.186.110
                                                        Sep 27, 2024 23:14:09.475444078 CEST49756443192.168.2.4142.250.186.110
                                                        Sep 27, 2024 23:14:09.475466013 CEST44349756142.250.186.110192.168.2.4
                                                        Sep 27, 2024 23:14:10.082997084 CEST44349760216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:10.083168983 CEST49760443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:10.083197117 CEST44349760216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:10.083517075 CEST44349760216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:10.083580971 CEST49760443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:10.084100962 CEST44349760216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:10.084152937 CEST49760443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:10.085020065 CEST49760443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:10.085072994 CEST44349760216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:10.085299969 CEST49760443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:10.085309029 CEST44349760216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:10.102617979 CEST44349762216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:10.102829933 CEST49762443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:10.102878094 CEST44349762216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:10.103468895 CEST44349762216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:10.103540897 CEST49762443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:10.104465961 CEST44349762216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:10.104523897 CEST49762443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:10.104640007 CEST49762443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:10.104726076 CEST44349762216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:10.104765892 CEST49762443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:10.132692099 CEST49760443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:10.148046017 CEST49762443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:10.148060083 CEST44349762216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:10.194252014 CEST49762443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:10.389030933 CEST44349760216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:10.389444113 CEST44349760216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:10.389499903 CEST49760443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:10.389537096 CEST49760443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:10.389558077 CEST44349760216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:10.389570951 CEST49760443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:10.389599085 CEST49760443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:10.390296936 CEST49766443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:10.390400887 CEST44349766216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:10.390477896 CEST49766443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:10.390695095 CEST49766443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:10.390722990 CEST44349766216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:10.412508965 CEST44349762216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:10.413021088 CEST44349762216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:10.413083076 CEST49762443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:10.413083076 CEST49762443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:10.413127899 CEST44349762216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:10.413187027 CEST49762443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:10.413815975 CEST49767443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:10.413839102 CEST44349767216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:10.413903952 CEST49767443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:10.414182901 CEST49767443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:10.414196014 CEST44349767216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:11.045459032 CEST44349766216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:11.045696020 CEST49766443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:11.045743942 CEST44349766216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:11.046066046 CEST44349766216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:11.046128035 CEST49766443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:11.046649933 CEST44349766216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:11.046710968 CEST49766443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:11.046878099 CEST49766443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:11.046955109 CEST44349766216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:11.047108889 CEST49766443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:11.047132969 CEST44349766216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:11.047172070 CEST49766443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:11.064996004 CEST44349767216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:11.065232992 CEST49767443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:11.065243959 CEST44349767216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:11.065743923 CEST44349767216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:11.065798044 CEST49767443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:11.066767931 CEST44349767216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:11.066817999 CEST49767443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:11.066947937 CEST49767443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:11.067032099 CEST44349767216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:11.067063093 CEST49767443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:11.067085028 CEST49767443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:11.067092896 CEST44349767216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:11.091394901 CEST44349766216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:11.102061987 CEST49766443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:11.116367102 CEST49767443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:11.252166986 CEST49741443192.168.2.4142.250.186.132
                                                        Sep 27, 2024 23:14:11.266499043 CEST44349766216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:11.267474890 CEST44349766216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:11.267537117 CEST49766443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:11.267975092 CEST49766443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:11.268006086 CEST44349766216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:11.285413980 CEST44349767216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:11.286456108 CEST44349767216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:11.286509991 CEST49767443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:11.287245989 CEST49767443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:11.287256956 CEST44349767216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:11.295430899 CEST44349741142.250.186.132192.168.2.4
                                                        Sep 27, 2024 23:14:11.525484085 CEST44349741142.250.186.132192.168.2.4
                                                        Sep 27, 2024 23:14:11.525607109 CEST44349741142.250.186.132192.168.2.4
                                                        Sep 27, 2024 23:14:11.525665045 CEST49741443192.168.2.4142.250.186.132
                                                        Sep 27, 2024 23:14:11.525680065 CEST44349741142.250.186.132192.168.2.4
                                                        Sep 27, 2024 23:14:11.525773048 CEST44349741142.250.186.132192.168.2.4
                                                        Sep 27, 2024 23:14:11.525825977 CEST49741443192.168.2.4142.250.186.132
                                                        Sep 27, 2024 23:14:11.525834084 CEST44349741142.250.186.132192.168.2.4
                                                        Sep 27, 2024 23:14:11.526077032 CEST44349741142.250.186.132192.168.2.4
                                                        Sep 27, 2024 23:14:11.526133060 CEST49741443192.168.2.4142.250.186.132
                                                        Sep 27, 2024 23:14:11.526583910 CEST49741443192.168.2.4142.250.186.132
                                                        Sep 27, 2024 23:14:11.526593924 CEST44349741142.250.186.132192.168.2.4
                                                        Sep 27, 2024 23:14:14.487775087 CEST49772443192.168.2.420.12.23.50
                                                        Sep 27, 2024 23:14:14.487814903 CEST4434977220.12.23.50192.168.2.4
                                                        Sep 27, 2024 23:14:14.488033056 CEST49772443192.168.2.420.12.23.50
                                                        Sep 27, 2024 23:14:14.489106894 CEST49772443192.168.2.420.12.23.50
                                                        Sep 27, 2024 23:14:14.489129066 CEST4434977220.12.23.50192.168.2.4
                                                        Sep 27, 2024 23:14:15.094424009 CEST4434977220.12.23.50192.168.2.4
                                                        Sep 27, 2024 23:14:15.094495058 CEST49772443192.168.2.420.12.23.50
                                                        Sep 27, 2024 23:14:15.098383904 CEST49772443192.168.2.420.12.23.50
                                                        Sep 27, 2024 23:14:15.098398924 CEST4434977220.12.23.50192.168.2.4
                                                        Sep 27, 2024 23:14:15.098790884 CEST4434977220.12.23.50192.168.2.4
                                                        Sep 27, 2024 23:14:15.149255991 CEST49772443192.168.2.420.12.23.50
                                                        Sep 27, 2024 23:14:15.896927118 CEST49772443192.168.2.420.12.23.50
                                                        Sep 27, 2024 23:14:15.943443060 CEST4434977220.12.23.50192.168.2.4
                                                        Sep 27, 2024 23:14:16.091562033 CEST4434977220.12.23.50192.168.2.4
                                                        Sep 27, 2024 23:14:16.091583967 CEST4434977220.12.23.50192.168.2.4
                                                        Sep 27, 2024 23:14:16.091590881 CEST4434977220.12.23.50192.168.2.4
                                                        Sep 27, 2024 23:14:16.091598988 CEST4434977220.12.23.50192.168.2.4
                                                        Sep 27, 2024 23:14:16.091629028 CEST4434977220.12.23.50192.168.2.4
                                                        Sep 27, 2024 23:14:16.091641903 CEST49772443192.168.2.420.12.23.50
                                                        Sep 27, 2024 23:14:16.091660023 CEST4434977220.12.23.50192.168.2.4
                                                        Sep 27, 2024 23:14:16.091691017 CEST49772443192.168.2.420.12.23.50
                                                        Sep 27, 2024 23:14:16.091706991 CEST49772443192.168.2.420.12.23.50
                                                        Sep 27, 2024 23:14:16.094229937 CEST4434977220.12.23.50192.168.2.4
                                                        Sep 27, 2024 23:14:16.094290972 CEST49772443192.168.2.420.12.23.50
                                                        Sep 27, 2024 23:14:16.094291925 CEST4434977220.12.23.50192.168.2.4
                                                        Sep 27, 2024 23:14:16.094338894 CEST49772443192.168.2.420.12.23.50
                                                        Sep 27, 2024 23:14:16.746195078 CEST49772443192.168.2.420.12.23.50
                                                        Sep 27, 2024 23:14:16.746217012 CEST4434977220.12.23.50192.168.2.4
                                                        Sep 27, 2024 23:14:16.746248007 CEST49772443192.168.2.420.12.23.50
                                                        Sep 27, 2024 23:14:16.746257067 CEST4434977220.12.23.50192.168.2.4
                                                        Sep 27, 2024 23:14:17.383889914 CEST49778443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:17.383912086 CEST44349778216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:17.383970022 CEST49778443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:17.384243011 CEST49778443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:17.384252071 CEST44349778216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:17.956738949 CEST804972387.248.202.1192.168.2.4
                                                        Sep 27, 2024 23:14:17.956897974 CEST4972380192.168.2.487.248.202.1
                                                        Sep 27, 2024 23:14:17.956967115 CEST4972380192.168.2.487.248.202.1
                                                        Sep 27, 2024 23:14:17.961747885 CEST804972387.248.202.1192.168.2.4
                                                        Sep 27, 2024 23:14:18.023601055 CEST44349778216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:18.023793936 CEST49778443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:18.023802042 CEST44349778216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:18.024130106 CEST44349778216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:18.024404049 CEST49778443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:18.024455070 CEST44349778216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:18.024534941 CEST49778443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:18.024550915 CEST49778443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:18.024559021 CEST44349778216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:18.351284981 CEST44349778216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:18.352044106 CEST44349778216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:18.352102995 CEST49778443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:18.352832079 CEST49778443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:18.352844954 CEST44349778216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:33.768527031 CEST804972487.248.202.1192.168.2.4
                                                        Sep 27, 2024 23:14:33.768626928 CEST4972480192.168.2.487.248.202.1
                                                        Sep 27, 2024 23:14:33.768683910 CEST4972480192.168.2.487.248.202.1
                                                        Sep 27, 2024 23:14:33.777904987 CEST804972487.248.202.1192.168.2.4
                                                        Sep 27, 2024 23:14:33.777971983 CEST4972480192.168.2.487.248.202.1
                                                        Sep 27, 2024 23:14:33.782681942 CEST804972487.248.202.1192.168.2.4
                                                        Sep 27, 2024 23:14:40.352241039 CEST49780443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:40.352324009 CEST44349780216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:40.352406025 CEST49780443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:40.352725983 CEST49780443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:40.352760077 CEST44349780216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:40.885401964 CEST49781443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:40.885500908 CEST44349781216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:40.885591984 CEST49781443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:40.886178017 CEST49781443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:40.886210918 CEST44349781216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:40.976095915 CEST49782443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:40.976134062 CEST44349782216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:40.976237059 CEST49782443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:40.976547003 CEST49782443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:40.976572990 CEST44349782216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:40.984302998 CEST44349780216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:40.984626055 CEST49780443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:40.984672070 CEST44349780216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:40.985004902 CEST44349780216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:40.985413074 CEST49780443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:40.985482931 CEST44349780216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:40.985584021 CEST49780443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:40.985622883 CEST49780443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:40.985635996 CEST44349780216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:41.283173084 CEST44349780216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:41.284034967 CEST44349780216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:41.284109116 CEST49780443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:41.284246922 CEST49780443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:41.284275055 CEST44349780216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:41.520761013 CEST44349781216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:41.521049023 CEST49781443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:41.521107912 CEST44349781216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:41.522309065 CEST44349781216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:41.522908926 CEST49781443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:41.523089886 CEST49781443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:41.523098946 CEST44349781216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:41.523134947 CEST49781443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:41.523191929 CEST44349781216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:41.569952965 CEST49781443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:41.705029964 CEST44349782216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:41.705292940 CEST49782443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:41.705324888 CEST44349782216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:41.705837965 CEST44349782216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:41.705918074 CEST49782443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:41.706835032 CEST44349782216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:41.706904888 CEST49782443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:41.707082987 CEST49782443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:41.707166910 CEST44349782216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:41.707289934 CEST49782443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:41.707312107 CEST44349782216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:41.707353115 CEST49782443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:41.751449108 CEST44349782216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:41.756408930 CEST49782443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:41.820842028 CEST44349781216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:41.821314096 CEST44349781216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:41.821386099 CEST49781443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:41.821743011 CEST49781443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:41.821775913 CEST44349781216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:41.925198078 CEST44349782216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:41.926528931 CEST44349782216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:41.926623106 CEST49782443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:41.926754951 CEST49782443192.168.2.4216.58.206.78
                                                        Sep 27, 2024 23:14:41.926793098 CEST44349782216.58.206.78192.168.2.4
                                                        Sep 27, 2024 23:14:53.417201996 CEST49783443192.168.2.420.12.23.50
                                                        Sep 27, 2024 23:14:53.417243958 CEST4434978320.12.23.50192.168.2.4
                                                        Sep 27, 2024 23:14:53.417320013 CEST49783443192.168.2.420.12.23.50
                                                        Sep 27, 2024 23:14:53.417695999 CEST49783443192.168.2.420.12.23.50
                                                        Sep 27, 2024 23:14:53.417707920 CEST4434978320.12.23.50192.168.2.4
                                                        Sep 27, 2024 23:14:53.995219946 CEST4434978320.12.23.50192.168.2.4
                                                        Sep 27, 2024 23:14:53.995414972 CEST49783443192.168.2.420.12.23.50
                                                        Sep 27, 2024 23:14:53.998822927 CEST49783443192.168.2.420.12.23.50
                                                        Sep 27, 2024 23:14:53.998845100 CEST4434978320.12.23.50192.168.2.4
                                                        Sep 27, 2024 23:14:53.999072075 CEST4434978320.12.23.50192.168.2.4
                                                        Sep 27, 2024 23:14:54.008057117 CEST49783443192.168.2.420.12.23.50
                                                        Sep 27, 2024 23:14:54.055448055 CEST4434978320.12.23.50192.168.2.4
                                                        Sep 27, 2024 23:14:54.199309111 CEST4434978320.12.23.50192.168.2.4
                                                        Sep 27, 2024 23:14:54.199333906 CEST4434978320.12.23.50192.168.2.4
                                                        Sep 27, 2024 23:14:54.199417114 CEST4434978320.12.23.50192.168.2.4
                                                        Sep 27, 2024 23:14:54.199515104 CEST49783443192.168.2.420.12.23.50
                                                        Sep 27, 2024 23:14:54.199515104 CEST49783443192.168.2.420.12.23.50
                                                        Sep 27, 2024 23:14:54.199527025 CEST4434978320.12.23.50192.168.2.4
                                                        Sep 27, 2024 23:14:54.199572086 CEST49783443192.168.2.420.12.23.50
                                                        Sep 27, 2024 23:14:54.204708099 CEST4434978320.12.23.50192.168.2.4
                                                        Sep 27, 2024 23:14:54.204761028 CEST4434978320.12.23.50192.168.2.4
                                                        Sep 27, 2024 23:14:54.204782963 CEST4434978320.12.23.50192.168.2.4
                                                        Sep 27, 2024 23:14:54.204797029 CEST49783443192.168.2.420.12.23.50
                                                        Sep 27, 2024 23:14:54.204829931 CEST49783443192.168.2.420.12.23.50
                                                        Sep 27, 2024 23:14:54.204946041 CEST49783443192.168.2.420.12.23.50
                                                        Sep 27, 2024 23:14:54.204961061 CEST4434978320.12.23.50192.168.2.4
                                                        Sep 27, 2024 23:14:54.204973936 CEST49783443192.168.2.420.12.23.50
                                                        Sep 27, 2024 23:14:54.204977989 CEST4434978320.12.23.50192.168.2.4
                                                        Sep 27, 2024 23:15:03.917059898 CEST49785443192.168.2.4142.250.186.132
                                                        Sep 27, 2024 23:15:03.917165041 CEST44349785142.250.186.132192.168.2.4
                                                        Sep 27, 2024 23:15:03.917275906 CEST49785443192.168.2.4142.250.186.132
                                                        Sep 27, 2024 23:15:03.917484999 CEST49785443192.168.2.4142.250.186.132
                                                        Sep 27, 2024 23:15:03.917520046 CEST44349785142.250.186.132192.168.2.4
                                                        Sep 27, 2024 23:15:04.607796907 CEST44349785142.250.186.132192.168.2.4
                                                        Sep 27, 2024 23:15:04.608100891 CEST49785443192.168.2.4142.250.186.132
                                                        Sep 27, 2024 23:15:04.608133078 CEST44349785142.250.186.132192.168.2.4
                                                        Sep 27, 2024 23:15:04.608422995 CEST44349785142.250.186.132192.168.2.4
                                                        Sep 27, 2024 23:15:04.609074116 CEST49785443192.168.2.4142.250.186.132
                                                        Sep 27, 2024 23:15:04.609132051 CEST44349785142.250.186.132192.168.2.4
                                                        Sep 27, 2024 23:15:04.650428057 CEST49785443192.168.2.4142.250.186.132
                                                        Sep 27, 2024 23:15:11.484237909 CEST49787443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:11.484278917 CEST44349787142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:11.484344006 CEST49787443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:11.484541893 CEST49787443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:11.484556913 CEST44349787142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:11.554871082 CEST49788443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:11.554919958 CEST44349788142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:11.554996014 CEST49788443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:11.555340052 CEST49788443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:11.555354118 CEST44349788142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:12.923890114 CEST44349788142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:12.926700115 CEST44349787142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:12.938611984 CEST49787443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:12.938636065 CEST44349787142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:12.938812971 CEST49788443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:12.938847065 CEST44349788142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:12.939297915 CEST44349787142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:12.939306974 CEST44349788142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:12.939764023 CEST49788443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:12.939825058 CEST44349788142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:12.940351009 CEST49787443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:12.940443039 CEST44349787142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:12.940680027 CEST49788443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:12.940692902 CEST49788443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:12.940704107 CEST44349788142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:12.940830946 CEST49787443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:12.940871954 CEST49787443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:12.940876961 CEST44349787142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:13.229374886 CEST44349787142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:13.230142117 CEST44349787142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:13.230201960 CEST49787443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:13.230443954 CEST44349788142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:13.230566978 CEST44349788142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:13.230618954 CEST49788443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:13.236320972 CEST49787443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:13.236342907 CEST44349787142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:13.243401051 CEST49788443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:13.243419886 CEST44349788142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:14.519593000 CEST44349785142.250.186.132192.168.2.4
                                                        Sep 27, 2024 23:15:14.519654989 CEST44349785142.250.186.132192.168.2.4
                                                        Sep 27, 2024 23:15:14.519727945 CEST49785443192.168.2.4142.250.186.132
                                                        Sep 27, 2024 23:15:27.678498983 CEST49785443192.168.2.4142.250.186.132
                                                        Sep 27, 2024 23:15:27.678580046 CEST44349785142.250.186.132192.168.2.4
                                                        Sep 27, 2024 23:15:41.852802038 CEST49790443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:41.852847099 CEST44349790142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:41.853001118 CEST49790443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:41.854289055 CEST49790443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:41.854301929 CEST44349790142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:42.774885893 CEST44349790142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:42.775125027 CEST49790443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:42.775140047 CEST44349790142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:42.775460958 CEST44349790142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:42.775748014 CEST49790443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:42.775805950 CEST44349790142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:42.775903940 CEST49790443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:42.775932074 CEST49790443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:42.775938034 CEST44349790142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:43.071929932 CEST44349790142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:43.072537899 CEST44349790142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:43.072698116 CEST49790443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:43.072859049 CEST49790443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:43.072875977 CEST44349790142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:43.645112991 CEST49791443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:43.645163059 CEST44349791142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:43.645275116 CEST49791443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:43.645560980 CEST49791443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:43.645572901 CEST44349791142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:44.292947054 CEST44349791142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:44.293356895 CEST49791443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:44.293369055 CEST44349791142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:44.293680906 CEST44349791142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:44.293946028 CEST49791443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:44.293997049 CEST44349791142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:44.294087887 CEST49791443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:44.294116974 CEST49791443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:44.294152021 CEST44349791142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:44.594201088 CEST44349791142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:44.599195957 CEST44349791142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:15:44.599566936 CEST49791443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:44.600003004 CEST49791443192.168.2.4142.250.184.206
                                                        Sep 27, 2024 23:15:44.600023031 CEST44349791142.250.184.206192.168.2.4
                                                        Sep 27, 2024 23:16:03.984935999 CEST49792443192.168.2.4216.58.206.68
                                                        Sep 27, 2024 23:16:03.984977961 CEST44349792216.58.206.68192.168.2.4
                                                        Sep 27, 2024 23:16:03.985039949 CEST49792443192.168.2.4216.58.206.68
                                                        Sep 27, 2024 23:16:03.985624075 CEST49792443192.168.2.4216.58.206.68
                                                        Sep 27, 2024 23:16:03.985641003 CEST44349792216.58.206.68192.168.2.4
                                                        Sep 27, 2024 23:16:04.639833927 CEST44349792216.58.206.68192.168.2.4
                                                        Sep 27, 2024 23:16:04.643141985 CEST49792443192.168.2.4216.58.206.68
                                                        Sep 27, 2024 23:16:04.643162012 CEST44349792216.58.206.68192.168.2.4
                                                        Sep 27, 2024 23:16:04.643450022 CEST44349792216.58.206.68192.168.2.4
                                                        Sep 27, 2024 23:16:04.644051075 CEST49792443192.168.2.4216.58.206.68
                                                        Sep 27, 2024 23:16:04.644104004 CEST44349792216.58.206.68192.168.2.4
                                                        Sep 27, 2024 23:16:04.694237947 CEST49792443192.168.2.4216.58.206.68
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Sep 27, 2024 23:13:59.429455996 CEST6534353192.168.2.41.1.1.1
                                                        Sep 27, 2024 23:13:59.429687023 CEST5551453192.168.2.41.1.1.1
                                                        Sep 27, 2024 23:13:59.436168909 CEST53653431.1.1.1192.168.2.4
                                                        Sep 27, 2024 23:13:59.436184883 CEST53622441.1.1.1192.168.2.4
                                                        Sep 27, 2024 23:13:59.437110901 CEST53555141.1.1.1192.168.2.4
                                                        Sep 27, 2024 23:13:59.484704971 CEST53644451.1.1.1192.168.2.4
                                                        Sep 27, 2024 23:14:00.478316069 CEST6336053192.168.2.41.1.1.1
                                                        Sep 27, 2024 23:14:00.478442907 CEST5816553192.168.2.41.1.1.1
                                                        Sep 27, 2024 23:14:00.487086058 CEST53595161.1.1.1192.168.2.4
                                                        Sep 27, 2024 23:14:00.488405943 CEST53633601.1.1.1192.168.2.4
                                                        Sep 27, 2024 23:14:00.488821983 CEST53581651.1.1.1192.168.2.4
                                                        Sep 27, 2024 23:14:03.865358114 CEST5885453192.168.2.41.1.1.1
                                                        Sep 27, 2024 23:14:03.865483999 CEST5020453192.168.2.41.1.1.1
                                                        Sep 27, 2024 23:14:03.872442007 CEST53588541.1.1.1192.168.2.4
                                                        Sep 27, 2024 23:14:03.872462034 CEST53502041.1.1.1192.168.2.4
                                                        Sep 27, 2024 23:14:05.747524977 CEST53539601.1.1.1192.168.2.4
                                                        Sep 27, 2024 23:14:08.263012886 CEST6322053192.168.2.41.1.1.1
                                                        Sep 27, 2024 23:14:08.263165951 CEST6395153192.168.2.41.1.1.1
                                                        Sep 27, 2024 23:14:08.269917965 CEST53632201.1.1.1192.168.2.4
                                                        Sep 27, 2024 23:14:08.270093918 CEST53639511.1.1.1192.168.2.4
                                                        Sep 27, 2024 23:14:09.405797958 CEST6162553192.168.2.41.1.1.1
                                                        Sep 27, 2024 23:14:09.406982899 CEST4961953192.168.2.41.1.1.1
                                                        Sep 27, 2024 23:14:09.412734985 CEST53616251.1.1.1192.168.2.4
                                                        Sep 27, 2024 23:14:09.413552046 CEST53496191.1.1.1192.168.2.4
                                                        Sep 27, 2024 23:14:11.653940916 CEST53605281.1.1.1192.168.2.4
                                                        Sep 27, 2024 23:14:17.391635895 CEST53557061.1.1.1192.168.2.4
                                                        Sep 27, 2024 23:14:18.637214899 CEST138138192.168.2.4192.168.2.255
                                                        Sep 27, 2024 23:14:36.140760899 CEST53585491.1.1.1192.168.2.4
                                                        Sep 27, 2024 23:14:58.624062061 CEST53623501.1.1.1192.168.2.4
                                                        Sep 27, 2024 23:14:59.159743071 CEST53615701.1.1.1192.168.2.4
                                                        Sep 27, 2024 23:15:10.394746065 CEST53496871.1.1.1192.168.2.4
                                                        Sep 27, 2024 23:15:11.476869106 CEST6243153192.168.2.41.1.1.1
                                                        Sep 27, 2024 23:15:11.477006912 CEST5384753192.168.2.41.1.1.1
                                                        Sep 27, 2024 23:15:11.483800888 CEST53538471.1.1.1192.168.2.4
                                                        Sep 27, 2024 23:15:11.483865023 CEST53624311.1.1.1192.168.2.4
                                                        Sep 27, 2024 23:15:27.687520027 CEST53559351.1.1.1192.168.2.4
                                                        Sep 27, 2024 23:16:03.975461960 CEST4993053192.168.2.41.1.1.1
                                                        Sep 27, 2024 23:16:03.975601912 CEST5293853192.168.2.41.1.1.1
                                                        Sep 27, 2024 23:16:03.982264042 CEST53499301.1.1.1192.168.2.4
                                                        Sep 27, 2024 23:16:03.982295990 CEST53529381.1.1.1192.168.2.4
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Sep 27, 2024 23:13:59.429455996 CEST192.168.2.41.1.1.10x6028Standard query (0)youtube.comA (IP address)IN (0x0001)false
                                                        Sep 27, 2024 23:13:59.429687023 CEST192.168.2.41.1.1.10x2546Standard query (0)youtube.com65IN (0x0001)false
                                                        Sep 27, 2024 23:14:00.478316069 CEST192.168.2.41.1.1.10x35ffStandard query (0)www.youtube.comA (IP address)IN (0x0001)false
                                                        Sep 27, 2024 23:14:00.478442907 CEST192.168.2.41.1.1.10x6707Standard query (0)www.youtube.com65IN (0x0001)false
                                                        Sep 27, 2024 23:14:03.865358114 CEST192.168.2.41.1.1.10x691Standard query (0)www.google.comA (IP address)IN (0x0001)false
                                                        Sep 27, 2024 23:14:03.865483999 CEST192.168.2.41.1.1.10x953bStandard query (0)www.google.com65IN (0x0001)false
                                                        Sep 27, 2024 23:14:08.263012886 CEST192.168.2.41.1.1.10x5a6eStandard query (0)accounts.youtube.comA (IP address)IN (0x0001)false
                                                        Sep 27, 2024 23:14:08.263165951 CEST192.168.2.41.1.1.10x3e6eStandard query (0)accounts.youtube.com65IN (0x0001)false
                                                        Sep 27, 2024 23:14:09.405797958 CEST192.168.2.41.1.1.10x62b3Standard query (0)play.google.comA (IP address)IN (0x0001)false
                                                        Sep 27, 2024 23:14:09.406982899 CEST192.168.2.41.1.1.10xa002Standard query (0)play.google.com65IN (0x0001)false
                                                        Sep 27, 2024 23:15:11.476869106 CEST192.168.2.41.1.1.10x3d89Standard query (0)play.google.comA (IP address)IN (0x0001)false
                                                        Sep 27, 2024 23:15:11.477006912 CEST192.168.2.41.1.1.10xf52cStandard query (0)play.google.com65IN (0x0001)false
                                                        Sep 27, 2024 23:16:03.975461960 CEST192.168.2.41.1.1.10xf577Standard query (0)www.google.comA (IP address)IN (0x0001)false
                                                        Sep 27, 2024 23:16:03.975601912 CEST192.168.2.41.1.1.10x1fe5Standard query (0)www.google.com65IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Sep 27, 2024 23:13:59.436168909 CEST1.1.1.1192.168.2.40x6028No error (0)youtube.com142.250.186.46A (IP address)IN (0x0001)false
                                                        Sep 27, 2024 23:13:59.437110901 CEST1.1.1.1192.168.2.40x2546No error (0)youtube.com65IN (0x0001)false
                                                        Sep 27, 2024 23:14:00.488405943 CEST1.1.1.1192.168.2.40x35ffNo error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                        Sep 27, 2024 23:14:00.488405943 CEST1.1.1.1192.168.2.40x35ffNo error (0)youtube-ui.l.google.com142.250.186.174A (IP address)IN (0x0001)false
                                                        Sep 27, 2024 23:14:00.488405943 CEST1.1.1.1192.168.2.40x35ffNo error (0)youtube-ui.l.google.com142.250.181.238A (IP address)IN (0x0001)false
                                                        Sep 27, 2024 23:14:00.488405943 CEST1.1.1.1192.168.2.40x35ffNo error (0)youtube-ui.l.google.com142.250.185.142A (IP address)IN (0x0001)false
                                                        Sep 27, 2024 23:14:00.488405943 CEST1.1.1.1192.168.2.40x35ffNo error (0)youtube-ui.l.google.com142.250.185.238A (IP address)IN (0x0001)false
                                                        Sep 27, 2024 23:14:00.488405943 CEST1.1.1.1192.168.2.40x35ffNo error (0)youtube-ui.l.google.com172.217.18.14A (IP address)IN (0x0001)false
                                                        Sep 27, 2024 23:14:00.488405943 CEST1.1.1.1192.168.2.40x35ffNo error (0)youtube-ui.l.google.com142.250.185.174A (IP address)IN (0x0001)false
                                                        Sep 27, 2024 23:14:00.488405943 CEST1.1.1.1192.168.2.40x35ffNo error (0)youtube-ui.l.google.com216.58.206.46A (IP address)IN (0x0001)false
                                                        Sep 27, 2024 23:14:00.488405943 CEST1.1.1.1192.168.2.40x35ffNo error (0)youtube-ui.l.google.com142.250.185.110A (IP address)IN (0x0001)false
                                                        Sep 27, 2024 23:14:00.488405943 CEST1.1.1.1192.168.2.40x35ffNo error (0)youtube-ui.l.google.com142.250.185.206A (IP address)IN (0x0001)false
                                                        Sep 27, 2024 23:14:00.488405943 CEST1.1.1.1192.168.2.40x35ffNo error (0)youtube-ui.l.google.com172.217.16.206A (IP address)IN (0x0001)false
                                                        Sep 27, 2024 23:14:00.488405943 CEST1.1.1.1192.168.2.40x35ffNo error (0)youtube-ui.l.google.com216.58.206.78A (IP address)IN (0x0001)false
                                                        Sep 27, 2024 23:14:00.488405943 CEST1.1.1.1192.168.2.40x35ffNo error (0)youtube-ui.l.google.com142.250.184.238A (IP address)IN (0x0001)false
                                                        Sep 27, 2024 23:14:00.488405943 CEST1.1.1.1192.168.2.40x35ffNo error (0)youtube-ui.l.google.com142.250.184.206A (IP address)IN (0x0001)false
                                                        Sep 27, 2024 23:14:00.488405943 CEST1.1.1.1192.168.2.40x35ffNo error (0)youtube-ui.l.google.com142.250.186.110A (IP address)IN (0x0001)false
                                                        Sep 27, 2024 23:14:00.488405943 CEST1.1.1.1192.168.2.40x35ffNo error (0)youtube-ui.l.google.com172.217.16.142A (IP address)IN (0x0001)false
                                                        Sep 27, 2024 23:14:00.488405943 CEST1.1.1.1192.168.2.40x35ffNo error (0)youtube-ui.l.google.com142.250.186.46A (IP address)IN (0x0001)false
                                                        Sep 27, 2024 23:14:00.488821983 CEST1.1.1.1192.168.2.40x6707No error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                        Sep 27, 2024 23:14:00.488821983 CEST1.1.1.1192.168.2.40x6707No error (0)youtube-ui.l.google.com65IN (0x0001)false
                                                        Sep 27, 2024 23:14:03.872442007 CEST1.1.1.1192.168.2.40x691No error (0)www.google.com142.250.186.132A (IP address)IN (0x0001)false
                                                        Sep 27, 2024 23:14:03.872462034 CEST1.1.1.1192.168.2.40x953bNo error (0)www.google.com65IN (0x0001)false
                                                        Sep 27, 2024 23:14:08.269917965 CEST1.1.1.1192.168.2.40x5a6eNo error (0)accounts.youtube.comwww3.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                        Sep 27, 2024 23:14:08.269917965 CEST1.1.1.1192.168.2.40x5a6eNo error (0)www3.l.google.com142.250.186.110A (IP address)IN (0x0001)false
                                                        Sep 27, 2024 23:14:08.270093918 CEST1.1.1.1192.168.2.40x3e6eNo error (0)accounts.youtube.comwww3.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                        Sep 27, 2024 23:14:09.412734985 CEST1.1.1.1192.168.2.40x62b3No error (0)play.google.com216.58.206.78A (IP address)IN (0x0001)false
                                                        Sep 27, 2024 23:15:11.483865023 CEST1.1.1.1192.168.2.40x3d89No error (0)play.google.com142.250.184.206A (IP address)IN (0x0001)false
                                                        Sep 27, 2024 23:16:03.982264042 CEST1.1.1.1192.168.2.40xf577No error (0)www.google.com216.58.206.68A (IP address)IN (0x0001)false
                                                        Sep 27, 2024 23:16:03.982295990 CEST1.1.1.1192.168.2.40x1fe5No error (0)www.google.com65IN (0x0001)false
                                                        • www.youtube.com
                                                        • fs.microsoft.com
                                                        • https:
                                                          • accounts.youtube.com
                                                          • play.google.com
                                                          • www.google.com
                                                        • slscr.update.microsoft.com
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.449736142.250.186.1744437644C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-27 21:14:01 UTC894OUTGET /account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd HTTP/1.1
                                                        Host: www.youtube.com
                                                        Connection: keep-alive
                                                        Upgrade-Insecure-Requests: 1
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiUocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: none
                                                        Sec-Fetch-Mode: navigate
                                                        Sec-Fetch-User: ?1
                                                        Sec-Fetch-Dest: document
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: YSC=lMkSnMHs0aI
                                                        2024-09-27 21:14:01 UTC2530INHTTP/1.1 303 See Other
                                                        Content-Type: application/binary
                                                        X-Content-Type-Options: nosniff
                                                        Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                        Pragma: no-cache
                                                        Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                        Date: Fri, 27 Sep 2024 21:14:01 GMT
                                                        Location: https://accounts.google.com/ServiceLogin?service=youtube&uilel=3&passive=true&continue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%253F%253Dhttps%25253A%25252F%25252Faccounts.google.com%25252Fv3%25252Fsignin%25252Fchallenge%25252Fpwd%26feature%3Dredirect_login&hl=en
                                                        Strict-Transport-Security: max-age=31536000
                                                        X-Frame-Options: SAMEORIGIN
                                                        Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="youtube_main"
                                                        Origin-Trial: AmhMBR6zCLzDDxpW+HfpP67BqwIknWnyMOXOQGfzYswFmJe+fgaI6XZgAzcxOrzNtP7hEDsOo1jdjFnVr2IdxQ4AAAB4eyJvcmlnaW4iOiJodHRwczovL3lvdXR1YmUuY29tOjQ0MyIsImZlYXR1cmUiOiJXZWJWaWV3WFJlcXVlc3RlZFdpdGhEZXByZWNhdGlvbiIsImV4cGlyeSI6MTc1ODA2NzE5OSwiaXNTdWJkb21haW4iOnRydWV9
                                                        Report-To: {"group":"youtube_main","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/youtube_main"}]}
                                                        Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                        Vary: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                        Content-Security-Policy: require-trusted-types-for 'script'
                                                        Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                        P3P: CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657?hl=en for more info."
                                                        Server: ESF
                                                        Content-Length: 0
                                                        X-XSS-Protection: 0
                                                        Set-Cookie: GPS=1; Domain=.youtube.com; Expires=Fri, 27-Sep-2024 21:44:01 GMT; Path=/; Secure; HttpOnly
                                                        Set-Cookie: VISITOR_INFO1_LIVE=_bSps8o1rMU; Domain=.youtube.com; Expires=Wed, 26-Mar-2025 21:14:01 GMT; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                                                        Set-Cookie: VISITOR_PRIVACY_METADATA=CgJVUxIEGgAgZQ%3D%3D; Domain=.youtube.com; Expires=Wed, 26-Mar-2025 21:14:01 GMT; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Connection: close


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        1192.168.2.449742184.28.90.27443
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-27 21:14:04 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Accept: */*
                                                        Accept-Encoding: identity
                                                        User-Agent: Microsoft BITS/7.8
                                                        Host: fs.microsoft.com
                                                        2024-09-27 21:14:04 UTC467INHTTP/1.1 200 OK
                                                        Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                                                        Content-Type: application/octet-stream
                                                        ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                                                        Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                                                        Server: ECAcc (lpl/EF67)
                                                        X-CID: 11
                                                        X-Ms-ApiVersion: Distribute 1.2
                                                        X-Ms-Region: prod-neu-z1
                                                        Cache-Control: public, max-age=243058
                                                        Date: Fri, 27 Sep 2024 21:14:04 GMT
                                                        Connection: close
                                                        X-CID: 2


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        2192.168.2.449745184.28.90.27443
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-27 21:14:05 UTC239OUTGET /fs/windows/config.json HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Accept: */*
                                                        Accept-Encoding: identity
                                                        If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
                                                        Range: bytes=0-2147483646
                                                        User-Agent: Microsoft BITS/7.8
                                                        Host: fs.microsoft.com
                                                        2024-09-27 21:14:05 UTC515INHTTP/1.1 200 OK
                                                        ApiVersion: Distribute 1.1
                                                        Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                                                        Content-Type: application/octet-stream
                                                        ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                                                        Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                                                        Server: ECAcc (lpl/EF06)
                                                        X-CID: 11
                                                        X-Ms-ApiVersion: Distribute 1.2
                                                        X-Ms-Region: prod-weu-z1
                                                        Cache-Control: public, max-age=243087
                                                        Date: Fri, 27 Sep 2024 21:14:05 GMT
                                                        Content-Length: 55
                                                        Connection: close
                                                        X-CID: 2
                                                        2024-09-27 21:14:05 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
                                                        Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        3192.168.2.449756142.250.186.1104437644C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-27 21:14:09 UTC1237OUTGET /accounts/CheckConnection?pmpo=https%3A%2F%2Faccounts.google.com&v=-1282646132&timestamp=1727471647140 HTTP/1.1
                                                        Host: accounts.youtube.com
                                                        Connection: keep-alive
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-arch: "x86"
                                                        sec-ch-ua-platform: "Windows"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        Upgrade-Insecure-Requests: 1
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiUocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: cross-site
                                                        Sec-Fetch-Mode: navigate
                                                        Sec-Fetch-User: ?1
                                                        Sec-Fetch-Dest: iframe
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-09-27 21:14:09 UTC1970INHTTP/1.1 200 OK
                                                        Content-Type: text/html; charset=utf-8
                                                        X-Frame-Options: ALLOW-FROM https://accounts.google.com
                                                        Content-Security-Policy: frame-ancestors https://accounts.google.com
                                                        Content-Security-Policy: script-src 'report-sample' 'nonce-AKPlehACgfvRkBq-SIHpWg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport;worker-src 'self'
                                                        Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport/allowlist
                                                        Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport
                                                        Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                        Pragma: no-cache
                                                        Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                        Date: Fri, 27 Sep 2024 21:14:09 GMT
                                                        Cross-Origin-Opener-Policy: same-origin
                                                        Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                        reporting-endpoints: default="/_/AccountsDomainCookiesCheckConnectionHttp/web-reports?context=eJzjstDikmLw15BikPj6kkkLiJ3SZ7CGAHHSv_OsJUC8JOIi65HEi6yXuy-xXgfiIokrrC1ALMTNsfDAne1sAh375xQq6SXlF8ZnpqTmlWSWVKbk5yZm5iXn52dnphYXpxaVpRbFGxkYmRhYGhnpGVjEFxgAANq1LbI"
                                                        Server: ESF
                                                        X-XSS-Protection: 0
                                                        X-Content-Type-Options: nosniff
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-09-27 21:14:09 UTC1970INData Raw: 37 36 32 30 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 20 6e 6f 6e 63 65 3d 22 41 4b 50 6c 65 68 41 43 67 66 76 52 6b 42 71 2d 53 49 48 70 57 67 22 3e 22 75 73 65 20 73 74 72 69 63 74 22 3b 74 68 69 73 2e 64 65 66 61 75 6c 74 5f 41 63 63 6f 75 6e 74 73 44 6f 6d 61 69 6e 63 6f 6f 6b 69 65 73 43 68 65 63 6b 63 6f 6e 6e 65 63 74 69 6f 6e 4a 73 3d 74 68 69 73 2e 64 65 66 61 75 6c 74 5f 41 63 63 6f 75 6e 74 73 44 6f 6d 61 69 6e 63 6f 6f 6b 69 65 73 43 68 65 63 6b 63 6f 6e 6e 65 63 74 69 6f 6e 4a 73 7c 7c 7b 7d 3b 28 66 75 6e 63 74 69 6f 6e 28 5f 29 7b 76 61 72 20 77 69 6e 64 6f 77 3d 74 68 69 73 3b 0a 74 72 79 7b 0a 5f 2e 5f 46 5f 74 6f 67 67 6c 65 73 5f 69 6e 69 74 69 61 6c 69 7a 65 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 28 74 79 70 65 6f
                                                        Data Ascii: 7620<html><head><script nonce="AKPlehACgfvRkBq-SIHpWg">"use strict";this.default_AccountsDomaincookiesCheckconnectionJs=this.default_AccountsDomaincookiesCheckconnectionJs||{};(function(_){var window=this;try{_._F_toggles_initialize=function(a){(typeo
                                                        2024-09-27 21:14:09 UTC1970INData Raw: 72 69 64 65 6e 74 5c 2f 28 5c 64 2e 5c 64 29 2f 2e 65 78 65 63 28 62 29 2c 0a 63 5b 31 5d 3d 3d 22 37 2e 30 22 29 69 66 28 62 26 26 62 5b 31 5d 29 73 77 69 74 63 68 28 62 5b 31 5d 29 7b 63 61 73 65 20 22 34 2e 30 22 3a 61 3d 22 38 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 35 2e 30 22 3a 61 3d 22 39 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 36 2e 30 22 3a 61 3d 22 31 30 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 37 2e 30 22 3a 61 3d 22 31 31 2e 30 22 7d 65 6c 73 65 20 61 3d 22 37 2e 30 22 3b 65 6c 73 65 20 61 3d 63 5b 31 5d 3b 62 3d 61 7d 65 6c 73 65 20 62 3d 22 22 3b 72 65 74 75 72 6e 20 62 7d 76 61 72 20 64 3d 52 65 67 45 78 70 28 22 28 5b 41 2d 5a 5d 5b 5c 5c 77 20 5d 2b 29 2f 28 5b 5e 5c 5c 73 5d 2b 29 5c 5c 73 2a 28 3f 3a 5c 5c 28 28
                                                        Data Ascii: rident\/(\d.\d)/.exec(b),c[1]=="7.0")if(b&&b[1])switch(b[1]){case "4.0":a="8.0";break;case "5.0":a="9.0";break;case "6.0":a="10.0";break;case "7.0":a="11.0"}else a="7.0";else a=c[1];b=a}else b="";return b}var d=RegExp("([A-Z][\\w ]+)/([^\\s]+)\\s*(?:\\((
                                                        2024-09-27 21:14:09 UTC1970INData Raw: 68 28 74 79 70 65 6f 66 20 61 29 7b 63 61 73 65 20 22 6e 75 6d 62 65 72 22 3a 72 65 74 75 72 6e 20 69 73 46 69 6e 69 74 65 28 61 29 3f 61 3a 53 74 72 69 6e 67 28 61 29 3b 63 61 73 65 20 22 62 69 67 69 6e 74 22 3a 72 65 74 75 72 6e 28 41 61 3f 0a 61 3e 3d 42 61 26 26 61 3c 3d 43 61 3a 61 5b 30 5d 3d 3d 3d 22 2d 22 3f 75 61 28 61 2c 44 61 29 3a 75 61 28 61 2c 45 61 29 29 3f 4e 75 6d 62 65 72 28 61 29 3a 53 74 72 69 6e 67 28 61 29 3b 63 61 73 65 20 22 62 6f 6f 6c 65 61 6e 22 3a 72 65 74 75 72 6e 20 61 3f 31 3a 30 3b 63 61 73 65 20 22 6f 62 6a 65 63 74 22 3a 69 66 28 61 29 69 66 28 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 61 29 29 7b 69 66 28 43 28 61 29 29 72 65 74 75 72 6e 7d 65 6c 73 65 20 69 66 28 46 61 26 26 61 21 3d 6e 75 6c 6c 26 26 61 20 69 6e 73 74
                                                        Data Ascii: h(typeof a){case "number":return isFinite(a)?a:String(a);case "bigint":return(Aa?a>=Ba&&a<=Ca:a[0]==="-"?ua(a,Da):ua(a,Ea))?Number(a):String(a);case "boolean":return a?1:0;case "object":if(a)if(Array.isArray(a)){if(C(a))return}else if(Fa&&a!=null&&a inst
                                                        2024-09-27 21:14:09 UTC1970INData Raw: 72 20 62 3b 69 66 28 61 26 26 28 62 3d 51 61 29 21 3d 6e 75 6c 6c 26 26 62 2e 68 61 73 28 61 29 26 26 28 62 3d 61 2e 43 29 29 66 6f 72 28 76 61 72 20 63 3d 30 3b 63 3c 62 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 7b 76 61 72 20 64 3d 62 5b 63 5d 3b 69 66 28 63 3d 3d 3d 62 2e 6c 65 6e 67 74 68 2d 31 26 26 41 28 64 29 29 66 6f 72 28 76 61 72 20 65 20 69 6e 20 64 29 7b 76 61 72 20 66 3d 64 5b 65 5d 3b 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 66 29 26 26 0a 52 61 28 66 2c 61 29 7d 65 6c 73 65 20 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 64 29 26 26 52 61 28 64 2c 61 29 7d 61 3d 45 3f 61 2e 43 3a 4d 61 28 61 2e 43 2c 50 61 2c 76 6f 69 64 20 30 2c 76 6f 69 64 20 30 2c 21 31 29 3b 65 3d 21 45 3b 69 66 28 62 3d 61 2e 6c 65 6e 67 74 68 29 7b 64 3d 61 5b 62 2d 31 5d 3b
                                                        Data Ascii: r b;if(a&&(b=Qa)!=null&&b.has(a)&&(b=a.C))for(var c=0;c<b.length;c++){var d=b[c];if(c===b.length-1&&A(d))for(var e in d){var f=d[e];Array.isArray(f)&&Ra(f,a)}else Array.isArray(d)&&Ra(d,a)}a=E?a.C:Ma(a.C,Pa,void 0,void 0,!1);e=!E;if(b=a.length){d=a[b-1];
                                                        2024-09-27 21:14:09 UTC1970INData Raw: 74 65 72 61 74 6f 72 22 2c 66 75 6e 63 74 69 6f 6e 28 61 29 7b 69 66 28 61 29 72 65 74 75 72 6e 20 61 3b 61 3d 53 79 6d 62 6f 6c 28 22 63 22 29 3b 66 6f 72 28 76 61 72 20 62 3d 22 41 72 72 61 79 20 49 6e 74 38 41 72 72 61 79 20 55 69 6e 74 38 41 72 72 61 79 20 55 69 6e 74 38 43 6c 61 6d 70 65 64 41 72 72 61 79 20 49 6e 74 31 36 41 72 72 61 79 20 55 69 6e 74 31 36 41 72 72 61 79 20 49 6e 74 33 32 41 72 72 61 79 20 55 69 6e 74 33 32 41 72 72 61 79 20 46 6c 6f 61 74 33 32 41 72 72 61 79 20 46 6c 6f 61 74 36 34 41 72 72 61 79 22 2e 73 70 6c 69 74 28 22 20 22 29 2c 63 3d 30 3b 63 3c 62 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 7b 76 61 72 20 64 3d 57 61 5b 62 5b 63 5d 5d 3b 74 79 70 65 6f 66 20 64 3d 3d 3d 22 66 75 6e 63 74 69 6f 6e 22 26 26 74 79 70 65 6f 66 20 64
                                                        Data Ascii: terator",function(a){if(a)return a;a=Symbol("c");for(var b="Array Int8Array Uint8Array Uint8ClampedArray Int16Array Uint16Array Int32Array Uint32Array Float32Array Float64Array".split(" "),c=0;c<b.length;c++){var d=Wa[b[c]];typeof d==="function"&&typeof d
                                                        2024-09-27 21:14:09 UTC1970INData Raw: 66 72 65 65 7a 65 22 29 3b 65 28 22 70 72 65 76 65 6e 74 45 78 74 65 6e 73 69 6f 6e 73 22 29 3b 65 28 22 73 65 61 6c 22 29 3b 76 61 72 20 68 3d 30 2c 67 3d 66 75 6e 63 74 69 6f 6e 28 6b 29 7b 74 68 69 73 2e 67 3d 28 68 2b 3d 4d 61 74 68 2e 72 61 6e 64 6f 6d 28 29 2b 31 29 2e 74 6f 53 74 72 69 6e 67 28 29 3b 69 66 28 6b 29 7b 6b 3d 48 28 6b 29 3b 66 6f 72 28 76 61 72 20 6c 3b 21 28 6c 3d 6b 2e 6e 65 78 74 28 29 29 2e 64 6f 6e 65 3b 29 6c 3d 6c 2e 76 61 6c 75 65 2c 74 68 69 73 2e 73 65 74 28 6c 5b 30 5d 2c 6c 5b 31 5d 29 7d 7d 3b 67 2e 70 72 6f 74 6f 74 79 70 65 2e 73 65 74 3d 66 75 6e 63 74 69 6f 6e 28 6b 2c 6c 29 7b 69 66 28 21 63 28 6b 29 29 74 68 72 6f 77 20 45 72 72 6f 72 28 22 69 22 29 3b 64 28 6b 29 3b 69 66 28 21 49 28 6b 2c 66 29 29 74 68 72 6f 77
                                                        Data Ascii: freeze");e("preventExtensions");e("seal");var h=0,g=function(k){this.g=(h+=Math.random()+1).toString();if(k){k=H(k);for(var l;!(l=k.next()).done;)l=l.value,this.set(l[0],l[1])}};g.prototype.set=function(k,l){if(!c(k))throw Error("i");d(k);if(!I(k,f))throw
                                                        2024-09-27 21:14:09 UTC1970INData Raw: 76 61 6c 75 65 7d 29 7d 3b 63 2e 70 72 6f 74 6f 74 79 70 65 2e 66 6f 72 45 61 63 68 3d 66 75 6e 63 74 69 6f 6e 28 67 2c 6b 29 7b 66 6f 72 28 76 61 72 20 6c 3d 74 68 69 73 2e 65 6e 74 72 69 65 73 28 29 2c 6d 3b 21 28 6d 3d 6c 2e 6e 65 78 74 28 29 29 2e 64 6f 6e 65 3b 29 6d 3d 0a 6d 2e 76 61 6c 75 65 2c 67 2e 63 61 6c 6c 28 6b 2c 6d 5b 31 5d 2c 6d 5b 30 5d 2c 74 68 69 73 29 7d 3b 63 2e 70 72 6f 74 6f 74 79 70 65 5b 53 79 6d 62 6f 6c 2e 69 74 65 72 61 74 6f 72 5d 3d 63 2e 70 72 6f 74 6f 74 79 70 65 2e 65 6e 74 72 69 65 73 3b 76 61 72 20 64 3d 66 75 6e 63 74 69 6f 6e 28 67 2c 6b 29 7b 76 61 72 20 6c 3d 6b 26 26 74 79 70 65 6f 66 20 6b 3b 6c 3d 3d 22 6f 62 6a 65 63 74 22 7c 7c 6c 3d 3d 22 66 75 6e 63 74 69 6f 6e 22 3f 62 2e 68 61 73 28 6b 29 3f 6c 3d 62 2e 67
                                                        Data Ascii: value})};c.prototype.forEach=function(g,k){for(var l=this.entries(),m;!(m=l.next()).done;)m=m.value,g.call(k,m[1],m[0],this)};c.prototype[Symbol.iterator]=c.prototype.entries;var d=function(g,k){var l=k&&typeof k;l=="object"||l=="function"?b.has(k)?l=b.g
                                                        2024-09-27 21:14:09 UTC1970INData Raw: 65 74 75 72 6e 20 61 3f 61 3a 66 75 6e 63 74 69 6f 6e 28 62 29 7b 72 65 74 75 72 6e 20 74 79 70 65 6f 66 20 62 3d 3d 3d 22 6e 75 6d 62 65 72 22 26 26 69 73 4e 61 4e 28 62 29 7d 7d 29 3b 76 61 72 20 66 62 3d 66 62 7c 7c 7b 7d 2c 71 3d 74 68 69 73 7c 7c 73 65 6c 66 2c 67 62 3d 71 2e 5f 46 5f 74 6f 67 67 6c 65 73 7c 7c 5b 5d 2c 68 62 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 61 3d 61 2e 73 70 6c 69 74 28 22 2e 22 29 3b 66 6f 72 28 76 61 72 20 62 3d 71 2c 63 3d 30 3b 63 3c 61 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 69 66 28 62 3d 62 5b 61 5b 63 5d 5d 2c 62 3d 3d 6e 75 6c 6c 29 72 65 74 75 72 6e 20 6e 75 6c 6c 3b 72 65 74 75 72 6e 20 62 7d 2c 69 62 3d 22 63 6c 6f 73 75 72 65 5f 75 69 64 5f 22 2b 28 4d 61 74 68 2e 72 61 6e 64 6f 6d 28 29 2a 31 45 39 3e 3e 3e 30 29 2c
                                                        Data Ascii: eturn a?a:function(b){return typeof b==="number"&&isNaN(b)}});var fb=fb||{},q=this||self,gb=q._F_toggles||[],hb=function(a){a=a.split(".");for(var b=q,c=0;c<a.length;c++)if(b=b[a[c]],b==null)return null;return b},ib="closure_uid_"+(Math.random()*1E9>>>0),
                                                        2024-09-27 21:14:09 UTC1970INData Raw: 34 33 38 32 3d 7b 7d 29 3b 61 2e 5f 5f 63 6c 6f 73 75 72 65 5f 5f 65 72 72 6f 72 5f 5f 63 6f 6e 74 65 78 74 5f 5f 39 38 34 33 38 32 2e 73 65 76 65 72 69 74 79 3d 62 7d 3b 76 61 72 20 71 62 3d 66 75 6e 63 74 69 6f 6e 28 61 2c 62 2c 63 29 7b 63 3d 63 7c 7c 71 3b 76 61 72 20 64 3d 63 2e 6f 6e 65 72 72 6f 72 2c 65 3d 21 21 62 3b 63 2e 6f 6e 65 72 72 6f 72 3d 66 75 6e 63 74 69 6f 6e 28 66 2c 68 2c 67 2c 6b 2c 6c 29 7b 64 26 26 64 28 66 2c 68 2c 67 2c 6b 2c 6c 29 3b 61 28 7b 6d 65 73 73 61 67 65 3a 66 2c 66 69 6c 65 4e 61 6d 65 3a 68 2c 6c 69 6e 65 3a 67 2c 6c 69 6e 65 4e 75 6d 62 65 72 3a 67 2c 63 61 3a 6b 2c 65 72 72 6f 72 3a 6c 7d 29 3b 72 65 74 75 72 6e 20 65 7d 7d 2c 74 62 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 76 61 72 20 62 3d 68 62 28 22 77 69 6e 64 6f
                                                        Data Ascii: 4382={});a.__closure__error__context__984382.severity=b};var qb=function(a,b,c){c=c||q;var d=c.onerror,e=!!b;c.onerror=function(f,h,g,k,l){d&&d(f,h,g,k,l);a({message:f,fileName:h,line:g,lineNumber:g,ca:k,error:l});return e}},tb=function(a){var b=hb("windo
                                                        2024-09-27 21:14:09 UTC1970INData Raw: 66 3d 53 74 72 69 6e 67 28 66 29 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 62 6f 6f 6c 65 61 6e 22 3a 66 3d 66 3f 22 74 72 75 65 22 3a 22 66 61 6c 73 65 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 66 75 6e 63 74 69 6f 6e 22 3a 66 3d 28 66 3d 73 62 28 66 29 29 3f 66 3a 22 5b 66 6e 5d 22 3b 62 72 65 61 6b 3b 64 65 66 61 75 6c 74 3a 66 3d 0a 74 79 70 65 6f 66 20 66 7d 66 2e 6c 65 6e 67 74 68 3e 34 30 26 26 28 66 3d 66 2e 73 6c 69 63 65 28 30 2c 34 30 29 2b 22 2e 2e 2e 22 29 3b 63 2e 70 75 73 68 28 66 29 7d 62 2e 70 75 73 68 28 61 29 3b 63 2e 70 75 73 68 28 22 29 5c 6e 22 29 3b 74 72 79 7b 63 2e 70 75 73 68 28 77 62 28 61 2e 63 61 6c 6c 65 72 2c 62 29 29 7d 63 61 74 63 68 28 68 29 7b 63 2e 70 75 73 68 28 22 5b 65 78 63 65 70 74 69 6f 6e 20 74 72 79 69 6e 67 20 74
                                                        Data Ascii: f=String(f);break;case "boolean":f=f?"true":"false";break;case "function":f=(f=sb(f))?f:"[fn]";break;default:f=typeof f}f.length>40&&(f=f.slice(0,40)+"...");c.push(f)}b.push(a);c.push(")\n");try{c.push(wb(a.caller,b))}catch(h){c.push("[exception trying t


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        4192.168.2.449760216.58.206.784437644C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-27 21:14:10 UTC549OUTOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Accept: */*
                                                        Access-Control-Request-Method: POST
                                                        Access-Control-Request-Headers: x-goog-authuser
                                                        Origin: https://accounts.google.com
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-09-27 21:14:10 UTC520INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                        Access-Control-Max-Age: 86400
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web,authorization,origin,x-goog-authuser
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Fri, 27 Sep 2024 21:14:10 GMT
                                                        Server: Playlog
                                                        Content-Length: 0
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Connection: close


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        5192.168.2.449762216.58.206.784437644C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-27 21:14:10 UTC549OUTOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Accept: */*
                                                        Access-Control-Request-Method: POST
                                                        Access-Control-Request-Headers: x-goog-authuser
                                                        Origin: https://accounts.google.com
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-09-27 21:14:10 UTC520INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                        Access-Control-Max-Age: 86400
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web,authorization,origin,x-goog-authuser
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Fri, 27 Sep 2024 21:14:10 GMT
                                                        Server: Playlog
                                                        Content-Length: 0
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Connection: close


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        6192.168.2.449766216.58.206.784437644C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-27 21:14:11 UTC1124OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 519
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiUocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-09-27 21:14:11 UTC519OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 34 37 31 36 34 38 32 38 39 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727471648289",null,null,null
                                                        2024-09-27 21:14:11 UTC933INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Set-Cookie: NID=518=sRoEPdqDdppl2XO5hujKuvzuoAby2H0JyJaOkb76HG4WPUaUVTsjG4i0L3ref_qlrI6fqZaXHeqiTihkYqkqhQ-X2ut4PxoOEZn36LbOTa_0cEjvJYLizKzmDEF-S7Ga2Nibk4hUnbSrybqNhU3BOjn-XAvEpdJ1ya4CW5Z2h-AS8TbMZa4; expires=Sat, 29-Mar-2025 21:14:11 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                        P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Fri, 27 Sep 2024 21:14:11 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Expires: Fri, 27 Sep 2024 21:14:11 GMT
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-09-27 21:14:11 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-09-27 21:14:11 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        7192.168.2.449767216.58.206.784437644C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-27 21:14:11 UTC1124OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 519
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiUocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-09-27 21:14:11 UTC519OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 34 37 31 36 34 38 33 36 39 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727471648369",null,null,null
                                                        2024-09-27 21:14:11 UTC932INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Set-Cookie: NID=518=zM4rnqpQxpDCCWhEArFmgM3jVV5pJ6eRwvqEh61Ue1Bx6uPdX-ArFYfjTrVJ3Bz-I9uo6fpK-Hs9l9qAj_oZ-ycvpuW8RtCga3KpBFq7JpL7CLQhNNRV0AgI6jIFRH8wO6FukAbNNdhFq5IzAY0yqffnUba6oVWrJY84L8GtJzvUNkHCrA; expires=Sat, 29-Mar-2025 21:14:11 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                        P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Fri, 27 Sep 2024 21:14:11 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Expires: Fri, 27 Sep 2024 21:14:11 GMT
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-09-27 21:14:11 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-09-27 21:14:11 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        8192.168.2.449741142.250.186.1324437644C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-27 21:14:11 UTC1017OUTGET /favicon.ico HTTP/1.1
                                                        Host: www.google.com
                                                        Connection: keep-alive
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiUocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: no-cors
                                                        Sec-Fetch-Dest: image
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-09-27 21:14:11 UTC705INHTTP/1.1 200 OK
                                                        Accept-Ranges: bytes
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Cross-Origin-Opener-Policy-Report-Only: same-origin; report-to="static-on-bigtable"
                                                        Report-To: {"group":"static-on-bigtable","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/static-on-bigtable"}]}
                                                        Content-Length: 5430
                                                        X-Content-Type-Options: nosniff
                                                        Server: sffe
                                                        X-XSS-Protection: 0
                                                        Date: Fri, 27 Sep 2024 20:43:38 GMT
                                                        Expires: Sat, 05 Oct 2024 20:43:38 GMT
                                                        Cache-Control: public, max-age=691200
                                                        Last-Modified: Tue, 22 Oct 2019 18:30:00 GMT
                                                        Content-Type: image/x-icon
                                                        Vary: Accept-Encoding
                                                        Age: 1833
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Connection: close
                                                        2024-09-27 21:14:11 UTC685INData Raw: 00 00 01 00 02 00 10 10 00 00 01 00 20 00 68 04 00 00 26 00 00 00 20 20 00 00 01 00 20 00 a8 10 00 00 8e 04 00 00 28 00 00 00 10 00 00 00 20 00 00 00 01 00 20 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 30 fd fd fd 96 fd fd fd d8 fd fd fd f9 fd fd fd f9 fd fd fd d7 fd fd fd 94 fe fe fe 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd 99 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 95 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd c1 ff ff ff ff fa fd f9 ff b4 d9 a7 ff 76 ba 5d ff 58 ab 3a ff 58 aa 3a ff 72 b8 59 ff ac d5 9d ff f8 fb f6 ff ff
                                                        Data Ascii: h& ( 0.v]X:X:rY
                                                        2024-09-27 21:14:11 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d8 fd fd fd 99 ff ff ff ff 92 cf fb ff 37 52 ec ff 38 46 ea ff d0 d4 fa ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 96 fe fe fe 32 ff ff ff ff f9 f9 fe ff 56 62 ed ff 35 43 ea ff 3b 49 eb ff 95 9c f4 ff cf d2 fa ff d1 d4 fa ff 96 9d f4 ff 52 5e ed ff e1 e3 fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 30 00 00 00 00 fd fd fd 9d ff ff ff ff e8 ea fd ff 58 63 ee ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 6c 76 f0 ff ff ff ff ff ff ff ff ff fd fd fd 98 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd c3 ff ff ff ff f9 f9 fe ff a5 ac f6 ff 5d 69 ee ff 3c 4a
                                                        Data Ascii: 7R8F2Vb5C;IR^0Xc5C5C5C5C5C5Clv]i<J
                                                        2024-09-27 21:14:11 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff ff fd fd fd d0 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fd fd fd 8b ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff b1 d8 a3 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 60 a5 35 ff ca 8e 3e ff f9 c1 9f ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 87 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 25 fd fd fd fb ff ff ff ff ff ff ff ff ff ff ff ff c2 e0 b7 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 6e b6 54 ff 9f ce 8d ff b7 da aa ff b8 db ab ff a5 d2 95 ff 7b bc 64 ff 54 a8 35 ff 53 a8 34 ff 77 a0 37 ff e3 89 41 ff f4 85 42 ff f4 85 42 ff
                                                        Data Ascii: S4S4S4S4S4S4S4S4S4S4S4S4S4S4`5>%S4S4S4S4S4S4nT{dT5S4w7ABB
                                                        2024-09-27 21:14:11 UTC1390INData Raw: ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff fb d5 bf ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd ea fd fd fd cb ff ff ff ff ff ff ff ff ff ff ff ff 46 cd fc ff 05 bc fb ff 05 bc fb ff 05 bc fb ff 21 ae f9 ff fb fb ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd c8 fd fd fd 9c ff ff ff ff ff ff ff ff ff ff ff ff 86 df fd ff 05 bc fb ff 05 bc fb ff 15 93 f5 ff 34 49 eb ff b3 b8 f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                        Data Ascii: BBBBBBF!4I
                                                        2024-09-27 21:14:11 UTC575INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d2 fe fe fe 24 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd 8d fd fd fd fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd fb fd fd fd 8b fe fe fe 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 27 fd fd fd 9f fd fd fd f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                        Data Ascii: $'


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        9192.168.2.44977220.12.23.50443
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-27 21:14:15 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=cY1Wm65weN86A1n&MD=YKCvLHU+ HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Accept: */*
                                                        User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                                        Host: slscr.update.microsoft.com
                                                        2024-09-27 21:14:16 UTC560INHTTP/1.1 200 OK
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        Content-Type: application/octet-stream
                                                        Expires: -1
                                                        Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                                        ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
                                                        MS-CorrelationId: 538aed60-86fe-4da1-a705-1fda8a4c224a
                                                        MS-RequestId: 9e80cff6-2b88-4858-be85-9a81d7f1b570
                                                        MS-CV: JT1WAkyIjEC3Hk+2.0
                                                        X-Microsoft-SLSClientCache: 2880
                                                        Content-Disposition: attachment; filename=environment.cab
                                                        X-Content-Type-Options: nosniff
                                                        Date: Fri, 27 Sep 2024 21:14:15 GMT
                                                        Connection: close
                                                        Content-Length: 24490
                                                        2024-09-27 21:14:16 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
                                                        Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
                                                        2024-09-27 21:14:16 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
                                                        Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        10192.168.2.449778216.58.206.784437644C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-27 21:14:18 UTC1298OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1224
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: text/plain;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiUocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=zM4rnqpQxpDCCWhEArFmgM3jVV5pJ6eRwvqEh61Ue1Bx6uPdX-ArFYfjTrVJ3Bz-I9uo6fpK-Hs9l9qAj_oZ-ycvpuW8RtCga3KpBFq7JpL7CLQhNNRV0AgI6jIFRH8wO6FukAbNNdhFq5IzAY0yqffnUba6oVWrJY84L8GtJzvUNkHCrA
                                                        2024-09-27 21:14:18 UTC1224OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 34 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 35 35 38 2c 5b 5b 22 31 37 32 37 34 37 31 36 34 36 30 30 30 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,null,null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[4,0,0,0,0]]],558,[["1727471646000",null,null,null,
                                                        2024-09-27 21:14:18 UTC940INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Set-Cookie: NID=518=hpkhUngu7_IemJnbfhD71YZpkEDPHoNdkavkzotPMKY94gdU_wbuzs6UMo8NIAXKWIbWMAIsQ10vjiSmv4AzWfK3ERLCb_KlInacN7vxaufqfiJrwgG03w_OHmCr_90LeTo4po-9aB4DpUabkoe_Jk6bA5Qmvl81I8Pb8zM9P8vcmXKvABcFqIEY2Q; expires=Sat, 29-Mar-2025 21:14:18 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                        P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Fri, 27 Sep 2024 21:14:18 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Expires: Fri, 27 Sep 2024 21:14:18 GMT
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-09-27 21:14:18 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-09-27 21:14:18 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        11192.168.2.449780216.58.206.784437644C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-27 21:14:40 UTC1329OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1501
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiUocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=hpkhUngu7_IemJnbfhD71YZpkEDPHoNdkavkzotPMKY94gdU_wbuzs6UMo8NIAXKWIbWMAIsQ10vjiSmv4AzWfK3ERLCb_KlInacN7vxaufqfiJrwgG03w_OHmCr_90LeTo4po-9aB4DpUabkoe_Jk6bA5Qmvl81I8Pb8zM9P8vcmXKvABcFqIEY2Q
                                                        2024-09-27 21:14:40 UTC1501OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 34 37 31 36 37 39 37 38 30 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727471679780",null,null,null
                                                        2024-09-27 21:14:41 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Fri, 27 Sep 2024 21:14:41 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-09-27 21:14:41 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-09-27 21:14:41 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        12192.168.2.449781216.58.206.784437644C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-27 21:14:41 UTC1329OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1317
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiUocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=hpkhUngu7_IemJnbfhD71YZpkEDPHoNdkavkzotPMKY94gdU_wbuzs6UMo8NIAXKWIbWMAIsQ10vjiSmv4AzWfK3ERLCb_KlInacN7vxaufqfiJrwgG03w_OHmCr_90LeTo4po-9aB4DpUabkoe_Jk6bA5Qmvl81I8Pb8zM9P8vcmXKvABcFqIEY2Q
                                                        2024-09-27 21:14:41 UTC1317OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 34 37 31 36 37 39 38 37 31 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727471679871",null,null,null
                                                        2024-09-27 21:14:41 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Fri, 27 Sep 2024 21:14:41 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-09-27 21:14:41 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-09-27 21:14:41 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        13192.168.2.449782216.58.206.784437644C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-27 21:14:41 UTC1289OUTPOST /log?hasfast=true&authuser=0&format=json HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1036
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        Content-Type: text/plain;charset=UTF-8
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiUocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: no-cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=hpkhUngu7_IemJnbfhD71YZpkEDPHoNdkavkzotPMKY94gdU_wbuzs6UMo8NIAXKWIbWMAIsQ10vjiSmv4AzWfK3ERLCb_KlInacN7vxaufqfiJrwgG03w_OHmCr_90LeTo4po-9aB4DpUabkoe_Jk6bA5Qmvl81I8Pb8zM9P8vcmXKvABcFqIEY2Q
                                                        2024-09-27 21:14:41 UTC1036OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 62 6f 71 5f 69 64 65 6e 74 69 74 79 66 72 6f 6e 74 65 6e 64 61 75 74 68 75 69 73 65 72 76 65 72 5f 32 30 32 34 30 39 32 34 2e 30 32 5f 70 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 33 2c 30 2c 30
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"boq_identityfrontendauthuiserver_20240924.02_p0",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[3,0,0
                                                        2024-09-27 21:14:41 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Fri, 27 Sep 2024 21:14:41 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-09-27 21:14:41 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-09-27 21:14:41 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        14192.168.2.44978320.12.23.50443
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-27 21:14:54 UTC306OUTGET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=cY1Wm65weN86A1n&MD=YKCvLHU+ HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Accept: */*
                                                        User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                                        Host: slscr.update.microsoft.com
                                                        2024-09-27 21:14:54 UTC560INHTTP/1.1 200 OK
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        Content-Type: application/octet-stream
                                                        Expires: -1
                                                        Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                                        ETag: "vic+p1MiJJ+/WMnK08jaWnCBGDfvkGRzPk9f8ZadQHg=_1440"
                                                        MS-CorrelationId: 5b58def4-ac3f-4a33-acfb-8ed7623d69bf
                                                        MS-RequestId: e8ccf7b7-5ae7-407b-9a62-7ad9489f5570
                                                        MS-CV: /QWmUwBDp0+t+Gfp.0
                                                        X-Microsoft-SLSClientCache: 1440
                                                        Content-Disposition: attachment; filename=environment.cab
                                                        X-Content-Type-Options: nosniff
                                                        Date: Fri, 27 Sep 2024 21:14:53 GMT
                                                        Connection: close
                                                        Content-Length: 30005
                                                        2024-09-27 21:14:54 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 8d 2b 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 5b 49 00 00 14 00 00 00 00 00 10 00 8d 2b 00 00 a8 49 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 72 4d 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 fe f6 51 be 21 2b 72 4d 43 4b ed 7c 05 58 54 eb da f6 14 43 49 37 0a 02 d2 b9 86 0e 41 52 a4 1b 24 a5 bb 43 24 44 18 94 90 92 52 41 3a 05 09 95 ee 54 b0 00 91 2e e9 12 10 04 11 c9 6f 10 b7 a2 67 9f bd cf 3e ff b7 ff b3 bf 73 ed e1 9a 99 f5 c6 7a d7 bb de f5 3e cf fd 3c f7 dc 17 4a 1a 52 e7 41 a8 97 1e 14 f4 e5 25 7d f4 05 82 82 c1 20 30 08 06 ba c3 05 02 11 7f a9 c1 ff d2 87 5c 1e f4 ed 65 8e 7a 1f f6 0a 40 03 1d 7b f9 83 2c 1c 2f db b8 3a 39 3a 58 38 ba 73 5e
                                                        Data Ascii: MSCF+D[I+IdrMenvironment.cabQ!+rMCK|XTCI7AR$C$DRA:T.og>sz><JRA%} 0\ez@{,/:9:X8s^
                                                        2024-09-27 21:14:54 UTC14181INData Raw: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 26 30 24 06 03 55 04 03 13 1d 4d 69 63 72 6f 73 6f 66 74 20 54 69 6d 65 2d 53 74 61 6d 70 20 50 43 41 20 32 30 31 30 30 1e 17 0d 32 33 31 30 31 32 31 39 30 37 32 35 5a 17 0d 32 35 30 31 31 30 31 39 30 37 32 35 5a 30 81 d2 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 2d 30 2b 06 03 55 04 0b 13 24 4d 69 63 72 6f
                                                        Data Ascii: UUS10UWashington10URedmond10UMicrosoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100231012190725Z250110190725Z010UUS10UWashington10URedmond10UMicrosoft Corporation1-0+U$Micro


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        15192.168.2.449788142.250.184.2064437644C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-27 21:15:12 UTC1329OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1282
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiUocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=hpkhUngu7_IemJnbfhD71YZpkEDPHoNdkavkzotPMKY94gdU_wbuzs6UMo8NIAXKWIbWMAIsQ10vjiSmv4AzWfK3ERLCb_KlInacN7vxaufqfiJrwgG03w_OHmCr_90LeTo4po-9aB4DpUabkoe_Jk6bA5Qmvl81I8Pb8zM9P8vcmXKvABcFqIEY2Q
                                                        2024-09-27 21:15:12 UTC1282OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 34 37 31 37 31 30 33 38 31 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727471710381",null,null,null
                                                        2024-09-27 21:15:13 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Fri, 27 Sep 2024 21:15:13 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-09-27 21:15:13 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-09-27 21:15:13 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        16192.168.2.449787142.250.184.2064437644C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-27 21:15:12 UTC1329OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1445
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiUocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=hpkhUngu7_IemJnbfhD71YZpkEDPHoNdkavkzotPMKY94gdU_wbuzs6UMo8NIAXKWIbWMAIsQ10vjiSmv4AzWfK3ERLCb_KlInacN7vxaufqfiJrwgG03w_OHmCr_90LeTo4po-9aB4DpUabkoe_Jk6bA5Qmvl81I8Pb8zM9P8vcmXKvABcFqIEY2Q
                                                        2024-09-27 21:15:12 UTC1445OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 34 37 31 37 31 30 34 35 39 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727471710459",null,null,null
                                                        2024-09-27 21:15:13 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Fri, 27 Sep 2024 21:15:13 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-09-27 21:15:13 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-09-27 21:15:13 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        17192.168.2.449790142.250.184.2064437644C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-27 21:15:42 UTC1329OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1462
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiUocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=hpkhUngu7_IemJnbfhD71YZpkEDPHoNdkavkzotPMKY94gdU_wbuzs6UMo8NIAXKWIbWMAIsQ10vjiSmv4AzWfK3ERLCb_KlInacN7vxaufqfiJrwgG03w_OHmCr_90LeTo4po-9aB4DpUabkoe_Jk6bA5Qmvl81I8Pb8zM9P8vcmXKvABcFqIEY2Q
                                                        2024-09-27 21:15:42 UTC1462OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 34 37 31 37 34 30 37 35 36 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727471740756",null,null,null
                                                        2024-09-27 21:15:43 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Fri, 27 Sep 2024 21:15:42 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-09-27 21:15:43 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-09-27 21:15:43 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        18192.168.2.449791142.250.184.2064437644C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-27 21:15:44 UTC1329OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1523
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.132"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CKq1yQEIi7bJAQiktskBCKmdygEIoOHKAQiUocsBCJz+zAEIhaDNAQjcvc0BCLnKzQEIotHNAQiK080BCJ7WzQEIp9jNAQj5wNQVGPbJzQEYutLNARjrjaUX
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=hpkhUngu7_IemJnbfhD71YZpkEDPHoNdkavkzotPMKY94gdU_wbuzs6UMo8NIAXKWIbWMAIsQ10vjiSmv4AzWfK3ERLCb_KlInacN7vxaufqfiJrwgG03w_OHmCr_90LeTo4po-9aB4DpUabkoe_Jk6bA5Qmvl81I8Pb8zM9P8vcmXKvABcFqIEY2Q
                                                        2024-09-27 21:15:44 UTC1523OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 34 37 31 37 34 32 35 34 39 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727471742549",null,null,null
                                                        2024-09-27 21:15:44 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Fri, 27 Sep 2024 21:15:44 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-09-27 21:15:44 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-09-27 21:15:44 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:17:13:56
                                                        Start date:27/09/2024
                                                        Path:C:\Users\user\Desktop\file.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\file.exe"
                                                        Imagebase:0x9a0000
                                                        File size:1'167'360 bytes
                                                        MD5 hash:4BEF7B2F09CEF526EBCE72FB190173AB
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low
                                                        Has exited:false

                                                        Target ID:1
                                                        Start time:17:13:57
                                                        Start date:27/09/2024
                                                        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                                                        Imagebase:0x7ff76e190000
                                                        File size:3'242'272 bytes
                                                        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:3
                                                        Start time:17:13:57
                                                        Start date:27/09/2024
                                                        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=2056,i,12513433233535120327,12878368360979007082,262144 /prefetch:8
                                                        Imagebase:0x7ff76e190000
                                                        File size:3'242'272 bytes
                                                        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:4
                                                        Start time:17:14:08
                                                        Start date:27/09/2024
                                                        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5324 --field-trial-handle=2056,i,12513433233535120327,12878368360979007082,262144 /prefetch:8
                                                        Imagebase:0x7ff76e190000
                                                        File size:3'242'272 bytes
                                                        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:5
                                                        Start time:17:14:08
                                                        Start date:27/09/2024
                                                        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 --field-trial-handle=2056,i,12513433233535120327,12878368360979007082,262144 /prefetch:8
                                                        Imagebase:0x7ff76e190000
                                                        File size:3'242'272 bytes
                                                        MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:2.3%
                                                          Dynamic/Decrypted Code Coverage:0%
                                                          Signature Coverage:4.6%
                                                          Total number of Nodes:1520
                                                          Total number of Limit Nodes:59
                                                          execution_graph 95486 9a105b 95491 9a344d 95486->95491 95488 9a106a 95522 9c00a3 29 API calls __onexit 95488->95522 95490 9a1074 95492 9a345d __wsopen_s 95491->95492 95523 9aa961 95492->95523 95496 9a351c 95535 9a3357 95496->95535 95503 9aa961 22 API calls 95504 9a354d 95503->95504 95556 9aa6c3 95504->95556 95507 9e3176 RegQueryValueExW 95508 9e320c RegCloseKey 95507->95508 95509 9e3193 95507->95509 95511 9a3578 95508->95511 95521 9e321e _wcslen 95508->95521 95562 9bfe0b 95509->95562 95511->95488 95512 9e31ac 95572 9a5722 95512->95572 95513 9a4c6d 22 API calls 95513->95521 95516 9e31d4 95575 9a6b57 95516->95575 95518 9e31ee messages 95518->95508 95520 9a515f 22 API calls 95520->95521 95521->95511 95521->95513 95521->95520 95587 9a9cb3 95521->95587 95522->95490 95524 9bfe0b 22 API calls 95523->95524 95525 9aa976 95524->95525 95593 9bfddb 95525->95593 95527 9a3513 95528 9a3a5a 95527->95528 95615 9e1f50 95528->95615 95531 9a9cb3 22 API calls 95532 9a3a8d 95531->95532 95617 9a3aa2 95532->95617 95534 9a3a97 95534->95496 95536 9e1f50 __wsopen_s 95535->95536 95537 9a3364 GetFullPathNameW 95536->95537 95538 9a3386 95537->95538 95539 9a6b57 22 API calls 95538->95539 95540 9a33a4 95539->95540 95541 9a33c6 95540->95541 95542 9e30bb 95541->95542 95543 9a33dd 95541->95543 95545 9bfddb 22 API calls 95542->95545 95641 9a33ee 95543->95641 95547 9e30c5 _wcslen 95545->95547 95546 9a33e8 95550 9a515f 95546->95550 95548 9bfe0b 22 API calls 95547->95548 95549 9e30fe __fread_nolock 95548->95549 95551 9a516e 95550->95551 95555 9a518f __fread_nolock 95550->95555 95553 9bfe0b 22 API calls 95551->95553 95552 9bfddb 22 API calls 95554 9a3544 95552->95554 95553->95555 95554->95503 95555->95552 95557 9aa6dd 95556->95557 95558 9a3556 RegOpenKeyExW 95556->95558 95559 9bfddb 22 API calls 95557->95559 95558->95507 95558->95511 95560 9aa6e7 95559->95560 95561 9bfe0b 22 API calls 95560->95561 95561->95558 95566 9bfddb 95562->95566 95563 9cea0c ___std_exception_copy 21 API calls 95563->95566 95564 9bfdfa 95564->95512 95566->95563 95566->95564 95568 9bfdfc 95566->95568 95656 9c4ead 7 API calls 2 library calls 95566->95656 95567 9c066d 95658 9c32a4 RaiseException 95567->95658 95568->95567 95657 9c32a4 RaiseException 95568->95657 95570 9c068a 95570->95512 95573 9bfddb 22 API calls 95572->95573 95574 9a5734 RegQueryValueExW 95573->95574 95574->95516 95574->95518 95576 9a6b67 _wcslen 95575->95576 95577 9e4ba1 95575->95577 95580 9a6b7d 95576->95580 95581 9a6ba2 95576->95581 95578 9a93b2 22 API calls 95577->95578 95579 9e4baa 95578->95579 95579->95579 95659 9a6f34 22 API calls 95580->95659 95583 9bfddb 22 API calls 95581->95583 95584 9a6bae 95583->95584 95585 9bfe0b 22 API calls 95584->95585 95586 9a6b85 __fread_nolock 95585->95586 95586->95518 95588 9a9cc2 _wcslen 95587->95588 95589 9bfe0b 22 API calls 95588->95589 95590 9a9cea __fread_nolock 95589->95590 95591 9bfddb 22 API calls 95590->95591 95592 9a9d00 95591->95592 95592->95521 95595 9bfde0 95593->95595 95596 9bfdfa 95595->95596 95599 9bfdfc 95595->95599 95603 9cea0c 95595->95603 95610 9c4ead 7 API calls 2 library calls 95595->95610 95596->95527 95598 9c066d 95612 9c32a4 RaiseException 95598->95612 95599->95598 95611 9c32a4 RaiseException 95599->95611 95601 9c068a 95601->95527 95608 9d3820 pre_c_initialization 95603->95608 95604 9d385e 95614 9cf2d9 20 API calls _free 95604->95614 95605 9d3849 RtlAllocateHeap 95607 9d385c 95605->95607 95605->95608 95607->95595 95608->95604 95608->95605 95613 9c4ead 7 API calls 2 library calls 95608->95613 95610->95595 95611->95598 95612->95601 95613->95608 95614->95607 95616 9a3a67 GetModuleFileNameW 95615->95616 95616->95531 95618 9e1f50 __wsopen_s 95617->95618 95619 9a3aaf GetFullPathNameW 95618->95619 95620 9a3ae9 95619->95620 95621 9a3ace 95619->95621 95623 9aa6c3 22 API calls 95620->95623 95622 9a6b57 22 API calls 95621->95622 95624 9a3ada 95622->95624 95623->95624 95627 9a37a0 95624->95627 95628 9a37ae 95627->95628 95631 9a93b2 95628->95631 95630 9a37c2 95630->95534 95632 9a93c0 95631->95632 95633 9a93c9 __fread_nolock 95631->95633 95632->95633 95635 9aaec9 95632->95635 95633->95630 95633->95633 95636 9aaed9 __fread_nolock 95635->95636 95637 9aaedc 95635->95637 95636->95633 95638 9bfddb 22 API calls 95637->95638 95639 9aaee7 95638->95639 95640 9bfe0b 22 API calls 95639->95640 95640->95636 95642 9a33fe _wcslen 95641->95642 95643 9e311d 95642->95643 95644 9a3411 95642->95644 95645 9bfddb 22 API calls 95643->95645 95651 9aa587 95644->95651 95647 9e3127 95645->95647 95649 9bfe0b 22 API calls 95647->95649 95648 9a341e __fread_nolock 95648->95546 95650 9e3157 __fread_nolock 95649->95650 95652 9aa59d 95651->95652 95655 9aa598 __fread_nolock 95651->95655 95653 9ef80f 95652->95653 95654 9bfe0b 22 API calls 95652->95654 95654->95655 95655->95648 95656->95566 95657->95567 95658->95570 95659->95586 95660 9a1098 95665 9a42de 95660->95665 95664 9a10a7 95666 9aa961 22 API calls 95665->95666 95667 9a42f5 GetVersionExW 95666->95667 95668 9a6b57 22 API calls 95667->95668 95669 9a4342 95668->95669 95670 9a93b2 22 API calls 95669->95670 95672 9a4378 95669->95672 95671 9a436c 95670->95671 95674 9a37a0 22 API calls 95671->95674 95673 9a441b GetCurrentProcess IsWow64Process 95672->95673 95676 9e37df 95672->95676 95675 9a4437 95673->95675 95674->95672 95677 9a444f LoadLibraryA 95675->95677 95678 9e3824 GetSystemInfo 95675->95678 95679 9a449c GetSystemInfo 95677->95679 95680 9a4460 GetProcAddress 95677->95680 95682 9a4476 95679->95682 95680->95679 95681 9a4470 GetNativeSystemInfo 95680->95681 95681->95682 95683 9a447a FreeLibrary 95682->95683 95684 9a109d 95682->95684 95683->95684 95685 9c00a3 29 API calls __onexit 95684->95685 95685->95664 95686 9af7bf 95687 9af7d3 95686->95687 95688 9afcb6 95686->95688 95690 9afcc2 95687->95690 95691 9bfddb 22 API calls 95687->95691 95780 9aaceb 95688->95780 95692 9aaceb 23 API calls 95690->95692 95693 9af7e5 95691->95693 95695 9afd3d 95692->95695 95693->95690 95694 9af83e 95693->95694 95693->95695 95719 9aed9d messages 95694->95719 95721 9b1310 95694->95721 95790 a11155 22 API calls 95695->95790 95698 9bfddb 22 API calls 95717 9aec76 messages 95698->95717 95699 9afef7 95699->95719 95792 9aa8c7 22 API calls __fread_nolock 95699->95792 95702 9f4b0b 95794 a1359c 82 API calls __wsopen_s 95702->95794 95703 9aa8c7 22 API calls 95703->95717 95704 9f4600 95704->95719 95791 9aa8c7 22 API calls __fread_nolock 95704->95791 95710 9afbe3 95712 9f4bdc 95710->95712 95710->95719 95720 9af3ae messages 95710->95720 95711 9aa961 22 API calls 95711->95717 95795 a1359c 82 API calls __wsopen_s 95712->95795 95714 9c00a3 29 API calls pre_c_initialization 95714->95717 95715 9c0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95715->95717 95716 9f4beb 95796 a1359c 82 API calls __wsopen_s 95716->95796 95717->95698 95717->95699 95717->95702 95717->95703 95717->95704 95717->95710 95717->95711 95717->95714 95717->95715 95717->95716 95718 9c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95717->95718 95717->95719 95717->95720 95778 9b01e0 216 API calls 2 library calls 95717->95778 95779 9b06a0 41 API calls messages 95717->95779 95718->95717 95720->95719 95793 a1359c 82 API calls __wsopen_s 95720->95793 95722 9b17b0 95721->95722 95723 9b1376 95721->95723 95881 9c0242 EnterCriticalSection 95722->95881 95725 9b1390 95723->95725 95726 9f6331 95723->95726 95730 9b1940 9 API calls 95725->95730 95727 9f633d 95726->95727 95889 a2709c 216 API calls 95726->95889 95727->95717 95729 9b17ba 95732 9b17fb 95729->95732 95734 9a9cb3 22 API calls 95729->95734 95731 9b13a0 95730->95731 95733 9b1940 9 API calls 95731->95733 95736 9f6346 95732->95736 95738 9b182c 95732->95738 95735 9b13b6 95733->95735 95742 9b17d4 95734->95742 95735->95732 95737 9b13ec 95735->95737 95890 a1359c 82 API calls __wsopen_s 95736->95890 95737->95736 95762 9b1408 __fread_nolock 95737->95762 95739 9aaceb 23 API calls 95738->95739 95741 9b1839 95739->95741 95887 9bd217 216 API calls 95741->95887 95886 9c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95742->95886 95745 9f636e 95891 a1359c 82 API calls __wsopen_s 95745->95891 95746 9b152f 95748 9b153c 95746->95748 95749 9f63d1 95746->95749 95750 9b1940 9 API calls 95748->95750 95893 a25745 54 API calls _wcslen 95749->95893 95752 9b1549 95750->95752 95756 9b1940 9 API calls 95752->95756 95760 9b15c7 messages 95752->95760 95753 9bfddb 22 API calls 95753->95762 95754 9bfe0b 22 API calls 95754->95762 95755 9b1872 95888 9bfaeb 23 API calls 95755->95888 95763 9b1563 95756->95763 95757 9b171d 95757->95717 95760->95755 95764 9b167b messages 95760->95764 95797 9b1940 95760->95797 95807 a313b7 95760->95807 95818 a15c5a 95760->95818 95823 a32598 95760->95823 95832 a3149e 95760->95832 95839 a329bf 95760->95839 95843 a319bc 95760->95843 95846 9bf645 95760->95846 95853 a2ac5b 95760->95853 95895 a1359c 82 API calls __wsopen_s 95760->95895 95762->95741 95762->95745 95762->95746 95762->95753 95762->95754 95762->95760 95765 9f63b2 95762->95765 95856 9aec40 95762->95856 95763->95760 95894 9aa8c7 22 API calls __fread_nolock 95763->95894 95764->95757 95880 9bce17 22 API calls messages 95764->95880 95892 a1359c 82 API calls __wsopen_s 95765->95892 95778->95717 95779->95717 95781 9aacf9 95780->95781 95789 9aad2a messages 95780->95789 95782 9aad55 95781->95782 95784 9aad01 messages 95781->95784 95782->95789 96011 9aa8c7 22 API calls __fread_nolock 95782->96011 95785 9efa48 95784->95785 95786 9aad21 95784->95786 95784->95789 95785->95789 96012 9bce17 22 API calls messages 95785->96012 95787 9efa3a VariantClear 95786->95787 95786->95789 95787->95789 95789->95690 95790->95719 95791->95719 95792->95719 95793->95719 95794->95719 95795->95716 95796->95719 95798 9b195d 95797->95798 95799 9b1981 95797->95799 95802 9c0242 5 API calls 95798->95802 95806 9b196e 95798->95806 95800 9c0242 5 API calls 95799->95800 95801 9b198b 95800->95801 95801->95798 95896 9c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95801->95896 95803 9b8727 95802->95803 95803->95806 95897 9c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95803->95897 95806->95760 95898 a32ad8 95807->95898 95809 a313cb 95810 a31418 GetForegroundWindow 95809->95810 95815 a313da 95809->95815 95811 a31435 95810->95811 95812 a3142a 95810->95812 95918 9bf98e GetForegroundWindow 95811->95918 95908 a0e97b 95812->95908 95815->95760 95816 a31442 95817 a0e97b 5 API calls 95816->95817 95817->95815 95819 9a7510 53 API calls 95818->95819 95820 a15c6d 95819->95820 95959 a0dbbe lstrlenW 95820->95959 95822 a15c77 95822->95760 95824 a32ad8 54 API calls 95823->95824 95825 a325a9 95824->95825 95828 a325b8 95825->95828 95964 a03d03 SendMessageTimeoutW 95825->95964 95827 a32607 95827->95828 95965 9ab567 95827->95965 95828->95760 95830 a32630 SetWindowPos 95830->95828 95833 a32ad8 54 API calls 95832->95833 95834 a314ae 95833->95834 95835 a329bf GetForegroundWindow 95834->95835 95836 a314b5 95835->95836 95837 a314eb GetForegroundWindow 95836->95837 95838 a314b9 95836->95838 95837->95838 95838->95760 95840 a329cb 95839->95840 95841 a32a01 GetForegroundWindow 95840->95841 95842 a329d1 95840->95842 95841->95842 95842->95760 95844 a32ad8 54 API calls 95843->95844 95845 a319cb 95844->95845 95845->95760 95847 9ab567 39 API calls 95846->95847 95848 9bf659 95847->95848 95849 9ff2dc Sleep 95848->95849 95850 9bf661 timeGetTime 95848->95850 95851 9ab567 39 API calls 95850->95851 95852 9bf677 95851->95852 95852->95760 95971 a2ad64 95853->95971 95855 a2ac6f 95855->95760 95864 9aec76 messages 95856->95864 95857 9bfddb 22 API calls 95857->95864 95858 9c0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95858->95864 95859 9c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95859->95864 95860 9f4beb 96009 a1359c 82 API calls __wsopen_s 95860->96009 95861 9aed9d messages 95861->95762 95862 9afef7 95862->95861 96005 9aa8c7 22 API calls __fread_nolock 95862->96005 95864->95857 95864->95858 95864->95859 95864->95860 95864->95861 95864->95862 95866 9f4b0b 95864->95866 95867 9aa8c7 22 API calls 95864->95867 95868 9f4600 95864->95868 95874 9afbe3 95864->95874 95875 9aa961 22 API calls 95864->95875 95878 9c00a3 29 API calls pre_c_initialization 95864->95878 95879 9af3ae messages 95864->95879 96002 9b01e0 216 API calls 2 library calls 95864->96002 96003 9b06a0 41 API calls messages 95864->96003 96007 a1359c 82 API calls __wsopen_s 95866->96007 95867->95864 95868->95861 96004 9aa8c7 22 API calls __fread_nolock 95868->96004 95874->95861 95876 9f4bdc 95874->95876 95874->95879 95875->95864 96008 a1359c 82 API calls __wsopen_s 95876->96008 95878->95864 95879->95861 96006 a1359c 82 API calls __wsopen_s 95879->96006 95880->95764 95884 9c0256 95881->95884 95883 9c025b LeaveCriticalSection 95883->95729 95884->95883 96010 9c02d6 LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95884->96010 95886->95732 95887->95755 95888->95755 95889->95727 95890->95760 95891->95760 95892->95760 95893->95763 95894->95760 95895->95760 95896->95798 95897->95806 95899 9aaceb 23 API calls 95898->95899 95900 a32af3 95899->95900 95901 a32aff 95900->95901 95902 a32b1d 95900->95902 95931 9a7510 95901->95931 95903 9a6b57 22 API calls 95902->95903 95906 a32b1b 95903->95906 95906->95809 95909 a0e9f9 95908->95909 95910 a0e988 95908->95910 95909->95811 95912 a0e98a Sleep 95910->95912 95913 a0e993 QueryPerformanceCounter 95910->95913 95912->95909 95913->95912 95914 a0e9a1 QueryPerformanceFrequency 95913->95914 95915 a0e9ab Sleep QueryPerformanceCounter 95914->95915 95916 a0e9ec 95915->95916 95916->95915 95917 a0e9f0 95916->95917 95917->95909 95919 9bf9a8 95918->95919 95920 9ff467 95918->95920 95919->95816 95921 9ff46e FindWindowW 95920->95921 95922 9ff47c IsIconic 95920->95922 95921->95922 95923 9ff487 ShowWindow 95922->95923 95924 9ff490 SetForegroundWindow 95922->95924 95923->95924 95925 9ff56b 95924->95925 95926 9ff4a2 7 API calls 95924->95926 95927 9ff4eb 9 API calls 95926->95927 95928 9ff547 95926->95928 95929 9ff543 95927->95929 95930 9ff54f AttachThreadInput AttachThreadInput AttachThreadInput 95928->95930 95929->95928 95929->95930 95930->95925 95932 9a7525 95931->95932 95948 9a7522 95931->95948 95933 9a755b 95932->95933 95934 9a752d 95932->95934 95936 9a756d 95933->95936 95941 9e500f 95933->95941 95944 9e50f6 95933->95944 95955 9c51c6 26 API calls 95934->95955 95956 9bfb21 51 API calls 95936->95956 95939 9e510e 95939->95939 95940 9a753d 95943 9bfddb 22 API calls 95940->95943 95947 9bfe0b 22 API calls 95941->95947 95953 9e5088 95941->95953 95945 9a7547 95943->95945 95958 9c5183 26 API calls 95944->95958 95946 9a9cb3 22 API calls 95945->95946 95946->95948 95950 9e5058 95947->95950 95948->95906 95954 9aa8c7 22 API calls __fread_nolock 95948->95954 95949 9bfddb 22 API calls 95951 9e507f 95949->95951 95950->95949 95952 9a9cb3 22 API calls 95951->95952 95952->95953 95957 9bfb21 51 API calls 95953->95957 95954->95906 95955->95940 95956->95940 95957->95944 95958->95939 95960 a0dbdc GetFileAttributesW 95959->95960 95962 a0dc06 95959->95962 95961 a0dbe8 FindFirstFileW 95960->95961 95960->95962 95961->95962 95963 a0dbf9 FindClose 95961->95963 95962->95822 95963->95962 95964->95827 95966 9ab578 95965->95966 95967 9ab57f 95965->95967 95966->95967 95970 9c62d1 39 API calls 95966->95970 95967->95830 95969 9ab5c2 95969->95830 95970->95969 95972 9aa961 22 API calls 95971->95972 95973 a2ad77 ___scrt_fastfail 95972->95973 95974 9a7510 53 API calls 95973->95974 95988 a2adce 95973->95988 95975 a2adab 95974->95975 95980 9a7510 53 API calls 95975->95980 95975->95988 95976 9a7510 53 API calls 95979 a2ade4 95976->95979 95977 9a7510 53 API calls 95990 a2ae04 95977->95990 95978 a2ae3a 95981 a2ae4d ___scrt_fastfail 95978->95981 95984 9ab567 39 API calls 95978->95984 96000 9a7620 22 API calls _wcslen 95979->96000 95983 a2adc4 95980->95983 95987 9a7510 53 API calls 95981->95987 95999 9a7620 22 API calls _wcslen 95983->95999 95984->95981 95985 a2adee 95985->95977 95985->95978 95989 a2ae85 ShellExecuteExW 95987->95989 95988->95976 95988->95985 95995 a2aeb0 95989->95995 95990->95978 95991 9a7510 53 API calls 95990->95991 95992 a2ae28 95991->95992 95992->95978 96001 9aa8c7 22 API calls __fread_nolock 95992->96001 95994 a2aec8 95994->95855 95995->95994 95996 a2af35 GetProcessId 95995->95996 95997 a2af48 95996->95997 95998 a2af58 CloseHandle 95997->95998 95998->95994 95999->95988 96000->95985 96001->95978 96002->95864 96003->95864 96004->95861 96005->95861 96006->95861 96007->95861 96008->95860 96009->95861 96010->95884 96011->95789 96012->95789 96013 9adddc 96016 9ab710 96013->96016 96017 9ab72b 96016->96017 96018 9f00f8 96017->96018 96019 9f0146 96017->96019 96039 9ab750 96017->96039 96022 9f0102 96018->96022 96025 9f010f 96018->96025 96018->96039 96058 a258a2 96019->96058 96021 9c0242 5 API calls 96021->96039 96047 a25d33 96022->96047 96038 9aba20 96025->96038 96100 a261d0 216 API calls 2 library calls 96025->96100 96028 9f03d9 96028->96028 96029 9bd336 40 API calls 96029->96039 96031 9abbe0 40 API calls 96031->96039 96034 9aba4e 96035 9f0322 96103 a25c0c 82 API calls 96035->96103 96038->96034 96104 a1359c 82 API calls __wsopen_s 96038->96104 96039->96021 96039->96029 96039->96031 96039->96034 96039->96035 96039->96038 96041 9aaceb 23 API calls 96039->96041 96044 9aec40 216 API calls 96039->96044 96081 9aa81b 96039->96081 96085 9bd2f0 96039->96085 96091 9ba01b 216 API calls 96039->96091 96092 9bedcd 22 API calls 96039->96092 96093 9c00a3 29 API calls __onexit 96039->96093 96094 9c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96039->96094 96095 9bee53 96039->96095 96099 9be5ca 216 API calls 96039->96099 96101 9ff6bf 23 API calls 96039->96101 96102 9aa8c7 22 API calls __fread_nolock 96039->96102 96041->96039 96044->96039 96053 a25d81 96047->96053 96048 a25ed7 96108 a1359c 82 API calls __wsopen_s 96048->96108 96049 9aec40 216 API calls 96049->96053 96050 9bd2f0 40 API calls 96050->96053 96052 9aa81b 41 API calls 96052->96053 96053->96048 96053->96049 96053->96050 96053->96052 96054 a25f12 96053->96054 96105 9bacd5 39 API calls 96053->96105 96106 9bad26 39 API calls 96053->96106 96107 9ab270 39 API calls 96053->96107 96054->96025 96059 a258e1 96058->96059 96060 a258cb 96058->96060 96063 9c0242 5 API calls 96059->96063 96076 a25935 96059->96076 96060->96059 96061 a258d0 96060->96061 96062 a25d33 216 API calls 96061->96062 96065 a258dc 96062->96065 96064 a25906 96063->96064 96064->96076 96109 9bedcd 22 API calls 96064->96109 96065->96039 96066 9bd2f0 40 API calls 96066->96076 96069 a2591f 96110 9c00a3 29 API calls __onexit 96069->96110 96070 a25aa8 96115 a1359c 82 API calls __wsopen_s 96070->96115 96072 9aa81b 41 API calls 96072->96076 96073 a25929 96111 9c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96073->96111 96076->96065 96076->96066 96076->96070 96076->96072 96077 9bee53 82 API calls 96076->96077 96079 9aec40 216 API calls 96076->96079 96112 9ba01b 216 API calls 96076->96112 96113 a25c0c 82 API calls 96076->96113 96114 9be5ca 216 API calls 96076->96114 96077->96076 96079->96076 96082 9aa826 96081->96082 96083 9aa855 96082->96083 96116 9aa993 96082->96116 96083->96039 96086 9bd329 96085->96086 96087 9bd2fc 96085->96087 96086->96087 96146 9bd336 40 API calls 96086->96146 96089 9bd321 96087->96089 96145 9bd336 40 API calls 96087->96145 96089->96039 96091->96039 96092->96039 96093->96039 96094->96039 96096 9bee70 96095->96096 96098 9beeb8 96095->96098 96096->96098 96147 a1359c 82 API calls __wsopen_s 96096->96147 96098->96039 96099->96039 96100->96038 96101->96039 96102->96039 96103->96038 96104->96028 96105->96053 96106->96053 96107->96053 96108->96054 96109->96069 96110->96073 96111->96076 96112->96076 96113->96076 96114->96076 96115->96065 96133 9abbe0 96116->96133 96118 9aa9a3 96119 9ef8c8 96118->96119 96120 9aa9b1 96118->96120 96121 9aaceb 23 API calls 96119->96121 96122 9bfddb 22 API calls 96120->96122 96123 9ef8d3 96121->96123 96124 9aa9c2 96122->96124 96125 9aa961 22 API calls 96124->96125 96126 9aa9cc 96125->96126 96127 9aa9db 96126->96127 96141 9aa8c7 22 API calls __fread_nolock 96126->96141 96129 9bfddb 22 API calls 96127->96129 96130 9aa9e5 96129->96130 96142 9aa869 40 API calls 96130->96142 96132 9aaa09 96132->96083 96134 9abe27 96133->96134 96139 9abbf3 96133->96139 96134->96118 96135 9c0242 5 API calls 96135->96139 96136 9abc9d 96136->96118 96137 9aa961 22 API calls 96137->96139 96139->96135 96139->96136 96139->96137 96143 9c00a3 29 API calls __onexit 96139->96143 96144 9c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96139->96144 96141->96127 96142->96132 96143->96139 96144->96139 96145->96089 96146->96087 96147->96098 96148 9c03fb 96149 9c0407 ___DestructExceptionObject 96148->96149 96177 9bfeb1 96149->96177 96151 9c040e 96152 9c0561 96151->96152 96155 9c0438 96151->96155 96204 9c083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 96152->96204 96154 9c0568 96205 9c4e52 28 API calls _abort 96154->96205 96166 9c0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 96155->96166 96188 9d247d 96155->96188 96157 9c056e 96206 9c4e04 28 API calls _abort 96157->96206 96160 9c0576 96162 9c0457 96164 9c04d8 96196 9c0959 96164->96196 96166->96164 96200 9c4e1a 38 API calls 2 library calls 96166->96200 96168 9c04de 96169 9c04f3 96168->96169 96201 9c0992 GetModuleHandleW 96169->96201 96171 9c04fa 96171->96154 96172 9c04fe 96171->96172 96173 9c0507 96172->96173 96202 9c4df5 28 API calls _abort 96172->96202 96203 9c0040 13 API calls 2 library calls 96173->96203 96176 9c050f 96176->96162 96178 9bfeba 96177->96178 96207 9c0698 IsProcessorFeaturePresent 96178->96207 96180 9bfec6 96208 9c2c94 10 API calls 3 library calls 96180->96208 96182 9bfecb 96183 9bfecf 96182->96183 96209 9d2317 96182->96209 96183->96151 96186 9bfee6 96186->96151 96189 9d2494 96188->96189 96190 9c0a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 96189->96190 96191 9c0451 96190->96191 96191->96162 96192 9d2421 96191->96192 96193 9d2450 96192->96193 96194 9c0a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 96193->96194 96195 9d2479 96194->96195 96195->96166 96284 9c2340 96196->96284 96199 9c097f 96199->96168 96200->96164 96201->96171 96202->96173 96203->96176 96204->96154 96205->96157 96206->96160 96207->96180 96208->96182 96213 9dd1f6 96209->96213 96212 9c2cbd 8 API calls 3 library calls 96212->96183 96216 9dd213 96213->96216 96217 9dd20f 96213->96217 96215 9bfed8 96215->96186 96215->96212 96216->96217 96219 9d4bfb 96216->96219 96231 9c0a8c 96217->96231 96220 9d4c07 ___DestructExceptionObject 96219->96220 96238 9d2f5e EnterCriticalSection 96220->96238 96222 9d4c0e 96239 9d50af 96222->96239 96224 9d4c1d 96225 9d4c2c 96224->96225 96252 9d4a8f 29 API calls 96224->96252 96254 9d4c48 LeaveCriticalSection _abort 96225->96254 96228 9d4c27 96253 9d4b45 GetStdHandle GetFileType 96228->96253 96229 9d4c3d __wsopen_s 96229->96216 96232 9c0a95 96231->96232 96233 9c0a97 IsProcessorFeaturePresent 96231->96233 96232->96215 96235 9c0c5d 96233->96235 96283 9c0c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 96235->96283 96237 9c0d40 96237->96215 96238->96222 96240 9d50bb ___DestructExceptionObject 96239->96240 96241 9d50df 96240->96241 96242 9d50c8 96240->96242 96255 9d2f5e EnterCriticalSection 96241->96255 96263 9cf2d9 20 API calls _free 96242->96263 96245 9d50cd 96264 9d27ec 26 API calls __cftof 96245->96264 96247 9d5117 96265 9d513e LeaveCriticalSection _abort 96247->96265 96248 9d50d7 __wsopen_s 96248->96224 96249 9d50eb 96249->96247 96256 9d5000 96249->96256 96252->96228 96253->96225 96254->96229 96255->96249 96266 9d4c7d 96256->96266 96258 9d5012 96262 9d501f 96258->96262 96273 9d3405 11 API calls 2 library calls 96258->96273 96261 9d5071 96261->96249 96274 9d29c8 96262->96274 96263->96245 96264->96248 96265->96248 96271 9d4c8a pre_c_initialization 96266->96271 96267 9d4cca 96281 9cf2d9 20 API calls _free 96267->96281 96268 9d4cb5 RtlAllocateHeap 96269 9d4cc8 96268->96269 96268->96271 96269->96258 96271->96267 96271->96268 96280 9c4ead 7 API calls 2 library calls 96271->96280 96273->96258 96275 9d29d3 RtlFreeHeap 96274->96275 96279 9d29fc _free 96274->96279 96276 9d29e8 96275->96276 96275->96279 96282 9cf2d9 20 API calls _free 96276->96282 96278 9d29ee GetLastError 96278->96279 96279->96261 96280->96271 96281->96269 96282->96278 96283->96237 96285 9c096c GetStartupInfoW 96284->96285 96285->96199 96286 9a1033 96291 9a4c91 96286->96291 96290 9a1042 96292 9aa961 22 API calls 96291->96292 96293 9a4cff 96292->96293 96299 9a3af0 96293->96299 96295 9a4d9c 96296 9a1038 96295->96296 96302 9a51f7 22 API calls __fread_nolock 96295->96302 96298 9c00a3 29 API calls __onexit 96296->96298 96298->96290 96303 9a3b1c 96299->96303 96302->96295 96304 9a3b0f 96303->96304 96305 9a3b29 96303->96305 96304->96295 96305->96304 96306 9a3b30 RegOpenKeyExW 96305->96306 96306->96304 96307 9a3b4a RegQueryValueExW 96306->96307 96308 9a3b6b 96307->96308 96309 9a3b80 RegCloseKey 96307->96309 96308->96309 96309->96304 96310 9f3f75 96321 9bceb1 96310->96321 96312 9f3f8b 96320 9f4006 96312->96320 96388 9be300 23 API calls 96312->96388 96315 9f4052 96317 9f4a88 96315->96317 96390 a1359c 82 API calls __wsopen_s 96315->96390 96318 9f3fe6 96318->96315 96389 a11abf 22 API calls 96318->96389 96330 9abf40 96320->96330 96322 9bcebf 96321->96322 96323 9bced2 96321->96323 96324 9aaceb 23 API calls 96322->96324 96325 9bced7 96323->96325 96326 9bcf05 96323->96326 96329 9bcec9 96324->96329 96327 9bfddb 22 API calls 96325->96327 96328 9aaceb 23 API calls 96326->96328 96327->96329 96328->96329 96329->96312 96391 9aadf0 96330->96391 96332 9abf9d 96333 9abfa9 96332->96333 96334 9f04b6 96332->96334 96336 9f04c6 96333->96336 96337 9ac01e 96333->96337 96409 a1359c 82 API calls __wsopen_s 96334->96409 96410 a1359c 82 API calls __wsopen_s 96336->96410 96396 9aac91 96337->96396 96341 a07120 22 API calls 96385 9ac039 __fread_nolock messages 96341->96385 96342 9ac7da 96346 9bfe0b 22 API calls 96342->96346 96345 9f04f5 96350 9f055a 96345->96350 96411 9bd217 216 API calls 96345->96411 96354 9ac808 __fread_nolock 96346->96354 96372 9ac603 96350->96372 96412 a1359c 82 API calls __wsopen_s 96350->96412 96351 9aec40 216 API calls 96351->96385 96352 9bfe0b 22 API calls 96384 9ac350 __fread_nolock messages 96352->96384 96353 9aaf8a 22 API calls 96353->96385 96354->96352 96355 9f091a 96419 a13209 23 API calls 96355->96419 96358 9f08a5 96359 9aec40 216 API calls 96358->96359 96361 9f08cf 96359->96361 96365 9aa81b 41 API calls 96361->96365 96361->96372 96362 9f0591 96413 a1359c 82 API calls __wsopen_s 96362->96413 96363 9f08f6 96418 a1359c 82 API calls __wsopen_s 96363->96418 96365->96363 96366 9aa993 41 API calls 96366->96385 96368 9abbe0 40 API calls 96368->96385 96369 9aaceb 23 API calls 96369->96385 96370 9ac237 96371 9ac253 96370->96371 96420 9aa8c7 22 API calls __fread_nolock 96370->96420 96375 9f0976 96371->96375 96380 9ac297 messages 96371->96380 96372->96315 96374 9bfddb 22 API calls 96374->96385 96377 9aaceb 23 API calls 96375->96377 96378 9f09bf 96377->96378 96378->96372 96421 a1359c 82 API calls __wsopen_s 96378->96421 96379 9aaceb 23 API calls 96381 9ac335 96379->96381 96380->96378 96380->96379 96381->96378 96382 9ac342 96381->96382 96407 9aa704 22 API calls messages 96382->96407 96387 9ac3ac 96384->96387 96408 9bce17 22 API calls messages 96384->96408 96385->96341 96385->96342 96385->96345 96385->96350 96385->96351 96385->96353 96385->96354 96385->96355 96385->96358 96385->96362 96385->96363 96385->96366 96385->96368 96385->96369 96385->96370 96385->96372 96385->96374 96385->96378 96386 9bfe0b 22 API calls 96385->96386 96400 9aad81 96385->96400 96414 a07099 22 API calls __fread_nolock 96385->96414 96415 a25745 54 API calls _wcslen 96385->96415 96416 9baa42 22 API calls messages 96385->96416 96417 a0f05c 40 API calls 96385->96417 96386->96385 96387->96315 96388->96318 96389->96320 96390->96317 96392 9aae01 96391->96392 96395 9aae1c messages 96391->96395 96393 9aaec9 22 API calls 96392->96393 96394 9aae09 CharUpperBuffW 96393->96394 96394->96395 96395->96332 96397 9aacae 96396->96397 96398 9aacd1 96397->96398 96422 a1359c 82 API calls __wsopen_s 96397->96422 96398->96385 96401 9efadb 96400->96401 96402 9aad92 96400->96402 96403 9bfddb 22 API calls 96402->96403 96404 9aad99 96403->96404 96423 9aadcd 96404->96423 96407->96384 96408->96384 96409->96336 96410->96372 96411->96350 96412->96372 96413->96372 96414->96385 96415->96385 96416->96385 96417->96385 96418->96372 96419->96370 96420->96371 96421->96372 96422->96398 96426 9aaddd 96423->96426 96424 9aadb6 96424->96385 96425 9bfddb 22 API calls 96425->96426 96426->96424 96426->96425 96427 9aa961 22 API calls 96426->96427 96429 9aadcd 22 API calls 96426->96429 96430 9aa8c7 22 API calls __fread_nolock 96426->96430 96427->96426 96429->96426 96430->96426 96431 9a3156 96434 9a3170 96431->96434 96435 9a3187 96434->96435 96436 9a31eb 96435->96436 96437 9a318c 96435->96437 96473 9a31e9 96435->96473 96441 9e2dfb 96436->96441 96442 9a31f1 96436->96442 96438 9a3199 96437->96438 96439 9a3265 PostQuitMessage 96437->96439 96444 9e2e7c 96438->96444 96445 9a31a4 96438->96445 96464 9a316a 96439->96464 96440 9a31d0 DefWindowProcW 96440->96464 96490 9a18e2 10 API calls 96441->96490 96446 9a31f8 96442->96446 96447 9a321d SetTimer RegisterWindowMessageW 96442->96447 96504 a0bf30 34 API calls ___scrt_fastfail 96444->96504 96449 9a31ae 96445->96449 96450 9e2e68 96445->96450 96453 9e2d9c 96446->96453 96454 9a3201 KillTimer 96446->96454 96451 9a3246 CreatePopupMenu 96447->96451 96447->96464 96448 9e2e1c 96491 9be499 42 API calls 96448->96491 96458 9e2e4d 96449->96458 96459 9a31b9 96449->96459 96479 a0c161 96450->96479 96451->96464 96461 9e2dd7 MoveWindow 96453->96461 96462 9e2da1 96453->96462 96486 9a30f2 Shell_NotifyIconW ___scrt_fastfail 96454->96486 96458->96440 96503 a00ad7 22 API calls 96458->96503 96465 9a31c4 96459->96465 96466 9a3253 96459->96466 96460 9e2e8e 96460->96440 96460->96464 96461->96464 96467 9e2dc6 SetFocus 96462->96467 96468 9e2da7 96462->96468 96463 9a3214 96487 9a3c50 DeleteObject DestroyWindow 96463->96487 96465->96440 96492 9a30f2 Shell_NotifyIconW ___scrt_fastfail 96465->96492 96488 9a326f 44 API calls ___scrt_fastfail 96466->96488 96467->96464 96468->96465 96472 9e2db0 96468->96472 96489 9a18e2 10 API calls 96472->96489 96473->96440 96474 9a3263 96474->96464 96477 9e2e41 96493 9a3837 96477->96493 96480 a0c276 96479->96480 96481 a0c179 ___scrt_fastfail 96479->96481 96480->96464 96505 9a3923 96481->96505 96483 a0c25f KillTimer SetTimer 96483->96480 96484 a0c1a0 96484->96483 96485 a0c251 Shell_NotifyIconW 96484->96485 96485->96483 96486->96463 96487->96464 96488->96474 96489->96464 96490->96448 96491->96465 96492->96477 96494 9a3862 ___scrt_fastfail 96493->96494 96535 9a4212 96494->96535 96497 9a38e8 96499 9e3386 Shell_NotifyIconW 96497->96499 96500 9a3906 Shell_NotifyIconW 96497->96500 96501 9a3923 24 API calls 96500->96501 96502 9a391c 96501->96502 96502->96473 96503->96473 96504->96460 96506 9a393f 96505->96506 96507 9a3a13 96505->96507 96527 9a6270 96506->96527 96507->96484 96510 9a395a 96512 9a6b57 22 API calls 96510->96512 96511 9e3393 LoadStringW 96513 9e33ad 96511->96513 96514 9a396f 96512->96514 96521 9a3994 ___scrt_fastfail 96513->96521 96533 9aa8c7 22 API calls __fread_nolock 96513->96533 96515 9a397c 96514->96515 96516 9e33c9 96514->96516 96515->96513 96518 9a3986 96515->96518 96534 9a6350 22 API calls 96516->96534 96532 9a6350 22 API calls 96518->96532 96524 9a39f9 Shell_NotifyIconW 96521->96524 96522 9e33d7 96522->96521 96523 9a33c6 22 API calls 96522->96523 96525 9e33f9 96523->96525 96524->96507 96526 9a33c6 22 API calls 96525->96526 96526->96521 96528 9bfe0b 22 API calls 96527->96528 96529 9a6295 96528->96529 96530 9bfddb 22 API calls 96529->96530 96531 9a394d 96530->96531 96531->96510 96531->96511 96532->96521 96533->96521 96534->96522 96536 9e35a4 96535->96536 96537 9a38b7 96535->96537 96536->96537 96538 9e35ad DestroyIcon 96536->96538 96537->96497 96539 a0c874 42 API calls _strftime 96537->96539 96538->96537 96539->96497 96540 9a2e37 96541 9aa961 22 API calls 96540->96541 96542 9a2e4d 96541->96542 96619 9a4ae3 96542->96619 96544 9a2e6b 96545 9a3a5a 24 API calls 96544->96545 96546 9a2e7f 96545->96546 96547 9a9cb3 22 API calls 96546->96547 96548 9a2e8c 96547->96548 96633 9a4ecb 96548->96633 96551 9a2ead 96655 9aa8c7 22 API calls __fread_nolock 96551->96655 96552 9e2cb0 96671 a12cf9 96552->96671 96554 9e2cc3 96555 9e2ccf 96554->96555 96697 9a4f39 96554->96697 96561 9a4f39 68 API calls 96555->96561 96558 9a2ec3 96656 9a6f88 22 API calls 96558->96656 96560 9a2ecf 96562 9a9cb3 22 API calls 96560->96562 96563 9e2ce5 96561->96563 96564 9a2edc 96562->96564 96703 9a3084 22 API calls 96563->96703 96565 9aa81b 41 API calls 96564->96565 96566 9a2eec 96565->96566 96569 9a9cb3 22 API calls 96566->96569 96568 9e2d02 96704 9a3084 22 API calls 96568->96704 96571 9a2f12 96569->96571 96573 9aa81b 41 API calls 96571->96573 96572 9e2d1e 96574 9a3a5a 24 API calls 96572->96574 96576 9a2f21 96573->96576 96575 9e2d44 96574->96575 96705 9a3084 22 API calls 96575->96705 96579 9aa961 22 API calls 96576->96579 96578 9e2d50 96706 9aa8c7 22 API calls __fread_nolock 96578->96706 96580 9a2f3f 96579->96580 96657 9a3084 22 API calls 96580->96657 96583 9e2d5e 96707 9a3084 22 API calls 96583->96707 96584 9a2f4b 96658 9c4a28 40 API calls 3 library calls 96584->96658 96587 9e2d6d 96708 9aa8c7 22 API calls __fread_nolock 96587->96708 96588 9a2f59 96588->96563 96589 9a2f63 96588->96589 96659 9c4a28 40 API calls 3 library calls 96589->96659 96592 9e2d83 96709 9a3084 22 API calls 96592->96709 96593 9a2f6e 96593->96568 96595 9a2f78 96593->96595 96660 9c4a28 40 API calls 3 library calls 96595->96660 96596 9e2d90 96598 9a2f83 96598->96572 96599 9a2f8d 96598->96599 96661 9c4a28 40 API calls 3 library calls 96599->96661 96601 9a2f98 96602 9a2fdc 96601->96602 96662 9a3084 22 API calls 96601->96662 96602->96587 96603 9a2fe8 96602->96603 96603->96596 96665 9a63eb 22 API calls 96603->96665 96605 9a2fbf 96663 9aa8c7 22 API calls __fread_nolock 96605->96663 96608 9a2ff8 96666 9a6a50 22 API calls 96608->96666 96609 9a2fcd 96664 9a3084 22 API calls 96609->96664 96612 9a3006 96667 9a70b0 23 API calls 96612->96667 96616 9a3021 96617 9a3065 96616->96617 96668 9a6f88 22 API calls 96616->96668 96669 9a70b0 23 API calls 96616->96669 96670 9a3084 22 API calls 96616->96670 96620 9a4af0 __wsopen_s 96619->96620 96621 9a6b57 22 API calls 96620->96621 96622 9a4b22 96620->96622 96621->96622 96632 9a4b58 96622->96632 96710 9a4c6d 96622->96710 96624 9a9cb3 22 API calls 96626 9a4c52 96624->96626 96625 9a9cb3 22 API calls 96625->96632 96627 9a515f 22 API calls 96626->96627 96630 9a4c5e 96627->96630 96628 9a4c6d 22 API calls 96628->96632 96629 9a515f 22 API calls 96629->96632 96630->96544 96631 9a4c29 96631->96624 96631->96630 96632->96625 96632->96628 96632->96629 96632->96631 96713 9a4e90 LoadLibraryA 96633->96713 96638 9e3ccf 96641 9a4f39 68 API calls 96638->96641 96639 9a4ef6 LoadLibraryExW 96721 9a4e59 LoadLibraryA 96639->96721 96642 9e3cd6 96641->96642 96644 9a4e59 3 API calls 96642->96644 96646 9e3cde 96644->96646 96743 9a50f5 96646->96743 96647 9a4f20 96647->96646 96648 9a4f2c 96647->96648 96650 9a4f39 68 API calls 96648->96650 96652 9a2ea5 96650->96652 96652->96551 96652->96552 96654 9e3d05 96655->96558 96656->96560 96657->96584 96658->96588 96659->96593 96660->96598 96661->96601 96662->96605 96663->96609 96664->96602 96665->96608 96666->96612 96667->96616 96668->96616 96669->96616 96670->96616 96672 a12d15 96671->96672 96673 9a511f 64 API calls 96672->96673 96674 a12d29 96673->96674 96874 a12e66 96674->96874 96677 9a50f5 40 API calls 96678 a12d56 96677->96678 96679 9a50f5 40 API calls 96678->96679 96680 a12d66 96679->96680 96681 9a50f5 40 API calls 96680->96681 96682 a12d81 96681->96682 96683 9a50f5 40 API calls 96682->96683 96684 a12d9c 96683->96684 96685 9a511f 64 API calls 96684->96685 96686 a12db3 96685->96686 96687 9cea0c ___std_exception_copy 21 API calls 96686->96687 96688 a12dba 96687->96688 96689 9cea0c ___std_exception_copy 21 API calls 96688->96689 96690 a12dc4 96689->96690 96691 9a50f5 40 API calls 96690->96691 96692 a12dd8 96691->96692 96693 a128fe 27 API calls 96692->96693 96695 a12dee 96693->96695 96694 a12d3f 96694->96554 96695->96694 96880 a122ce 79 API calls 96695->96880 96698 9a4f4a 96697->96698 96699 9a4f43 96697->96699 96701 9a4f6a FreeLibrary 96698->96701 96702 9a4f59 96698->96702 96881 9ce678 96699->96881 96701->96702 96702->96555 96703->96568 96704->96572 96705->96578 96706->96583 96707->96587 96708->96592 96709->96596 96711 9aaec9 22 API calls 96710->96711 96712 9a4c78 96711->96712 96712->96622 96714 9a4ea8 GetProcAddress 96713->96714 96715 9a4ec6 96713->96715 96716 9a4eb8 96714->96716 96718 9ce5eb 96715->96718 96716->96715 96717 9a4ebf FreeLibrary 96716->96717 96717->96715 96751 9ce52a 96718->96751 96720 9a4eea 96720->96638 96720->96639 96722 9a4e6e GetProcAddress 96721->96722 96723 9a4e8d 96721->96723 96724 9a4e7e 96722->96724 96726 9a4f80 96723->96726 96724->96723 96725 9a4e86 FreeLibrary 96724->96725 96725->96723 96727 9bfe0b 22 API calls 96726->96727 96728 9a4f95 96727->96728 96729 9a5722 22 API calls 96728->96729 96730 9a4fa1 __fread_nolock 96729->96730 96731 9e3d1d 96730->96731 96732 9a50a5 96730->96732 96742 9a4fdc 96730->96742 96814 a1304d 74 API calls 96731->96814 96803 9a42a2 CreateStreamOnHGlobal 96732->96803 96735 9e3d22 96737 9a511f 64 API calls 96735->96737 96736 9a50f5 40 API calls 96736->96742 96738 9e3d45 96737->96738 96739 9a50f5 40 API calls 96738->96739 96740 9a506e messages 96739->96740 96740->96647 96742->96735 96742->96736 96742->96740 96809 9a511f 96742->96809 96744 9a5107 96743->96744 96747 9e3d70 96743->96747 96836 9ce8c4 96744->96836 96748 a128fe 96857 a1274e 96748->96857 96750 a12919 96750->96654 96754 9ce536 ___DestructExceptionObject 96751->96754 96752 9ce544 96776 9cf2d9 20 API calls _free 96752->96776 96754->96752 96756 9ce574 96754->96756 96755 9ce549 96777 9d27ec 26 API calls __cftof 96755->96777 96758 9ce579 96756->96758 96759 9ce586 96756->96759 96778 9cf2d9 20 API calls _free 96758->96778 96768 9d8061 96759->96768 96762 9ce58f 96763 9ce595 96762->96763 96764 9ce5a2 96762->96764 96779 9cf2d9 20 API calls _free 96763->96779 96780 9ce5d4 LeaveCriticalSection __fread_nolock 96764->96780 96766 9ce554 __wsopen_s 96766->96720 96769 9d806d ___DestructExceptionObject 96768->96769 96781 9d2f5e EnterCriticalSection 96769->96781 96771 9d807b 96782 9d80fb 96771->96782 96775 9d80ac __wsopen_s 96775->96762 96776->96755 96777->96766 96778->96766 96779->96766 96780->96766 96781->96771 96783 9d811e 96782->96783 96784 9d8177 96783->96784 96791 9d8088 96783->96791 96798 9c918d EnterCriticalSection 96783->96798 96799 9c91a1 LeaveCriticalSection 96783->96799 96785 9d4c7d pre_c_initialization 20 API calls 96784->96785 96787 9d8180 96785->96787 96788 9d29c8 _free 20 API calls 96787->96788 96789 9d8189 96788->96789 96789->96791 96800 9d3405 11 API calls 2 library calls 96789->96800 96795 9d80b7 96791->96795 96792 9d81a8 96801 9c918d EnterCriticalSection 96792->96801 96802 9d2fa6 LeaveCriticalSection 96795->96802 96797 9d80be 96797->96775 96798->96783 96799->96783 96800->96792 96801->96791 96802->96797 96804 9a42bc FindResourceExW 96803->96804 96808 9a42d9 96803->96808 96805 9e35ba LoadResource 96804->96805 96804->96808 96806 9e35cf SizeofResource 96805->96806 96805->96808 96807 9e35e3 LockResource 96806->96807 96806->96808 96807->96808 96808->96742 96810 9a512e 96809->96810 96811 9e3d90 96809->96811 96815 9cece3 96810->96815 96814->96735 96818 9ceaaa 96815->96818 96817 9a513c 96817->96742 96821 9ceab6 ___DestructExceptionObject 96818->96821 96819 9ceac2 96831 9cf2d9 20 API calls _free 96819->96831 96821->96819 96822 9ceae8 96821->96822 96833 9c918d EnterCriticalSection 96822->96833 96824 9ceac7 96832 9d27ec 26 API calls __cftof 96824->96832 96825 9ceaf4 96834 9cec0a 62 API calls 2 library calls 96825->96834 96828 9ceb08 96835 9ceb27 LeaveCriticalSection __fread_nolock 96828->96835 96830 9cead2 __wsopen_s 96830->96817 96831->96824 96832->96830 96833->96825 96834->96828 96835->96830 96839 9ce8e1 96836->96839 96838 9a5118 96838->96748 96840 9ce8ed ___DestructExceptionObject 96839->96840 96841 9ce92d 96840->96841 96842 9ce900 ___scrt_fastfail 96840->96842 96843 9ce925 __wsopen_s 96840->96843 96854 9c918d EnterCriticalSection 96841->96854 96852 9cf2d9 20 API calls _free 96842->96852 96843->96838 96846 9ce937 96855 9ce6f8 38 API calls 4 library calls 96846->96855 96848 9ce91a 96853 9d27ec 26 API calls __cftof 96848->96853 96849 9ce94e 96856 9ce96c LeaveCriticalSection __fread_nolock 96849->96856 96852->96848 96853->96843 96854->96846 96855->96849 96856->96843 96860 9ce4e8 96857->96860 96859 a1275d 96859->96750 96863 9ce469 96860->96863 96862 9ce505 96862->96859 96864 9ce48c 96863->96864 96865 9ce478 96863->96865 96869 9ce488 __alldvrm 96864->96869 96873 9d333f 11 API calls 2 library calls 96864->96873 96871 9cf2d9 20 API calls _free 96865->96871 96868 9ce47d 96872 9d27ec 26 API calls __cftof 96868->96872 96869->96862 96871->96868 96872->96869 96873->96869 96877 a12e7a 96874->96877 96875 9a50f5 40 API calls 96875->96877 96876 a128fe 27 API calls 96876->96877 96877->96875 96877->96876 96878 a12d3b 96877->96878 96879 9a511f 64 API calls 96877->96879 96878->96677 96878->96694 96879->96877 96880->96694 96882 9ce684 ___DestructExceptionObject 96881->96882 96883 9ce6aa 96882->96883 96884 9ce695 96882->96884 96893 9ce6a5 __wsopen_s 96883->96893 96894 9c918d EnterCriticalSection 96883->96894 96911 9cf2d9 20 API calls _free 96884->96911 96886 9ce69a 96912 9d27ec 26 API calls __cftof 96886->96912 96889 9ce6c6 96895 9ce602 96889->96895 96891 9ce6d1 96913 9ce6ee LeaveCriticalSection __fread_nolock 96891->96913 96893->96698 96894->96889 96896 9ce60f 96895->96896 96897 9ce624 96895->96897 96946 9cf2d9 20 API calls _free 96896->96946 96902 9ce61f 96897->96902 96914 9cdc0b 96897->96914 96899 9ce614 96947 9d27ec 26 API calls __cftof 96899->96947 96902->96891 96907 9ce646 96931 9d862f 96907->96931 96910 9d29c8 _free 20 API calls 96910->96902 96911->96886 96912->96893 96913->96893 96915 9cdc23 96914->96915 96919 9cdc1f 96914->96919 96916 9cd955 __fread_nolock 26 API calls 96915->96916 96915->96919 96917 9cdc43 96916->96917 96948 9d59be 62 API calls 5 library calls 96917->96948 96920 9d4d7a 96919->96920 96921 9ce640 96920->96921 96922 9d4d90 96920->96922 96924 9cd955 96921->96924 96922->96921 96923 9d29c8 _free 20 API calls 96922->96923 96923->96921 96925 9cd976 96924->96925 96926 9cd961 96924->96926 96925->96907 96949 9cf2d9 20 API calls _free 96926->96949 96928 9cd966 96950 9d27ec 26 API calls __cftof 96928->96950 96930 9cd971 96930->96907 96932 9d863e 96931->96932 96933 9d8653 96931->96933 96954 9cf2c6 20 API calls _free 96932->96954 96935 9d868e 96933->96935 96940 9d867a 96933->96940 96956 9cf2c6 20 API calls _free 96935->96956 96937 9d8643 96955 9cf2d9 20 API calls _free 96937->96955 96938 9d8693 96957 9cf2d9 20 API calls _free 96938->96957 96951 9d8607 96940->96951 96943 9ce64c 96943->96902 96943->96910 96944 9d869b 96958 9d27ec 26 API calls __cftof 96944->96958 96946->96899 96947->96902 96948->96919 96949->96928 96950->96930 96959 9d8585 96951->96959 96953 9d862b 96953->96943 96954->96937 96955->96943 96956->96938 96957->96944 96958->96943 96960 9d8591 ___DestructExceptionObject 96959->96960 96970 9d5147 EnterCriticalSection 96960->96970 96962 9d859f 96963 9d85c6 96962->96963 96964 9d85d1 96962->96964 96971 9d86ae 96963->96971 96986 9cf2d9 20 API calls _free 96964->96986 96967 9d85cc 96987 9d85fb LeaveCriticalSection __wsopen_s 96967->96987 96969 9d85ee __wsopen_s 96969->96953 96970->96962 96988 9d53c4 96971->96988 96973 9d86c4 97001 9d5333 21 API calls 3 library calls 96973->97001 96974 9d86be 96974->96973 96975 9d86f6 96974->96975 96977 9d53c4 __wsopen_s 26 API calls 96974->96977 96975->96973 96978 9d53c4 __wsopen_s 26 API calls 96975->96978 96980 9d86ed 96977->96980 96981 9d8702 CloseHandle 96978->96981 96979 9d871c 96982 9d873e 96979->96982 97002 9cf2a3 20 API calls 2 library calls 96979->97002 96983 9d53c4 __wsopen_s 26 API calls 96980->96983 96981->96973 96984 9d870e GetLastError 96981->96984 96982->96967 96983->96975 96984->96973 96986->96967 96987->96969 96989 9d53e6 96988->96989 96990 9d53d1 96988->96990 96995 9d540b 96989->96995 97005 9cf2c6 20 API calls _free 96989->97005 97003 9cf2c6 20 API calls _free 96990->97003 96992 9d53d6 97004 9cf2d9 20 API calls _free 96992->97004 96995->96974 96996 9d5416 97006 9cf2d9 20 API calls _free 96996->97006 96998 9d53de 96998->96974 96999 9d541e 97007 9d27ec 26 API calls __cftof 96999->97007 97001->96979 97002->96982 97003->96992 97004->96998 97005->96996 97006->96999 97007->96998 97008 a32a55 97016 a11ebc 97008->97016 97011 a32a70 97018 a039c0 22 API calls 97011->97018 97013 a32a87 97014 a32a7c 97019 a0417d 22 API calls __fread_nolock 97014->97019 97017 a11ec3 IsWindow 97016->97017 97017->97011 97017->97013 97018->97014 97019->97013 97020 9a1cad SystemParametersInfoW 97021 9a2de3 97022 9a2df0 __wsopen_s 97021->97022 97023 9a2e09 97022->97023 97024 9e2c2b ___scrt_fastfail 97022->97024 97025 9a3aa2 23 API calls 97023->97025 97027 9e2c47 GetOpenFileNameW 97024->97027 97026 9a2e12 97025->97026 97037 9a2da5 97026->97037 97029 9e2c96 97027->97029 97031 9a6b57 22 API calls 97029->97031 97033 9e2cab 97031->97033 97033->97033 97034 9a2e27 97055 9a44a8 97034->97055 97038 9e1f50 __wsopen_s 97037->97038 97039 9a2db2 GetLongPathNameW 97038->97039 97040 9a6b57 22 API calls 97039->97040 97041 9a2dda 97040->97041 97042 9a3598 97041->97042 97043 9aa961 22 API calls 97042->97043 97044 9a35aa 97043->97044 97045 9a3aa2 23 API calls 97044->97045 97046 9a35b5 97045->97046 97047 9e32eb 97046->97047 97048 9a35c0 97046->97048 97052 9e330d 97047->97052 97091 9bce60 41 API calls 97047->97091 97050 9a515f 22 API calls 97048->97050 97051 9a35cc 97050->97051 97085 9a35f3 97051->97085 97054 9a35df 97054->97034 97056 9a4ecb 94 API calls 97055->97056 97057 9a44cd 97056->97057 97058 9e3833 97057->97058 97059 9a4ecb 94 API calls 97057->97059 97060 a12cf9 80 API calls 97058->97060 97061 9a44e1 97059->97061 97062 9e3848 97060->97062 97061->97058 97063 9a44e9 97061->97063 97064 9e384c 97062->97064 97065 9e3869 97062->97065 97067 9e3854 97063->97067 97068 9a44f5 97063->97068 97069 9a4f39 68 API calls 97064->97069 97066 9bfe0b 22 API calls 97065->97066 97084 9e38ae 97066->97084 97116 a0da5a 82 API calls 97067->97116 97115 9a940c 136 API calls 2 library calls 97068->97115 97069->97067 97072 9e3862 97072->97065 97073 9a2e31 97074 9e3a5f 97079 9e3a67 97074->97079 97075 9a4f39 68 API calls 97075->97079 97079->97075 97118 a0989b 82 API calls __wsopen_s 97079->97118 97081 9a9cb3 22 API calls 97081->97084 97084->97074 97084->97079 97084->97081 97092 a0967e 97084->97092 97095 a10b5a 97084->97095 97101 9aa4a1 97084->97101 97109 9a3ff7 97084->97109 97117 a095ad 42 API calls _wcslen 97084->97117 97086 9a3605 97085->97086 97090 9a3624 __fread_nolock 97085->97090 97088 9bfe0b 22 API calls 97086->97088 97087 9bfddb 22 API calls 97089 9a363b 97087->97089 97088->97090 97089->97054 97090->97087 97091->97047 97093 9bfe0b 22 API calls 97092->97093 97094 a096ae __fread_nolock 97093->97094 97094->97084 97094->97094 97096 a10b65 97095->97096 97097 9bfddb 22 API calls 97096->97097 97098 a10b7c 97097->97098 97099 9a9cb3 22 API calls 97098->97099 97100 a10b87 97099->97100 97100->97084 97102 9aa52b 97101->97102 97107 9aa4b1 __fread_nolock 97101->97107 97104 9bfe0b 22 API calls 97102->97104 97103 9bfddb 22 API calls 97105 9aa4b8 97103->97105 97104->97107 97106 9bfddb 22 API calls 97105->97106 97108 9aa4d6 97105->97108 97106->97108 97107->97103 97108->97084 97110 9a40ae 97109->97110 97111 9a400a 97109->97111 97110->97084 97112 9a403c 97111->97112 97113 9bfe0b 22 API calls 97111->97113 97112->97110 97114 9bfddb 22 API calls 97112->97114 97113->97112 97114->97112 97115->97073 97116->97072 97117->97084 97118->97079 97119 9e2ba5 97120 9e2baf 97119->97120 97121 9a2b25 97119->97121 97123 9a3a5a 24 API calls 97120->97123 97147 9a2b83 7 API calls 97121->97147 97125 9e2bb8 97123->97125 97127 9a9cb3 22 API calls 97125->97127 97129 9e2bc6 97127->97129 97128 9a2b2f 97133 9a3837 49 API calls 97128->97133 97136 9a2b44 97128->97136 97130 9e2bce 97129->97130 97131 9e2bf5 97129->97131 97134 9a33c6 22 API calls 97130->97134 97132 9a33c6 22 API calls 97131->97132 97145 9e2bf1 GetForegroundWindow ShellExecuteW 97132->97145 97133->97136 97135 9e2bd9 97134->97135 97152 9a6350 22 API calls 97135->97152 97137 9a2b5f 97136->97137 97151 9a30f2 Shell_NotifyIconW ___scrt_fastfail 97136->97151 97143 9a2b66 SetCurrentDirectoryW 97137->97143 97141 9e2be7 97142 9a33c6 22 API calls 97141->97142 97142->97145 97146 9a2b7a 97143->97146 97144 9e2c26 97144->97137 97145->97144 97153 9a2cd4 7 API calls 97147->97153 97149 9a2b2a 97150 9a2c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 97149->97150 97150->97128 97151->97137 97152->97141 97153->97149 97154 9a1044 97159 9a10f3 97154->97159 97156 9a104a 97195 9c00a3 29 API calls __onexit 97156->97195 97158 9a1054 97196 9a1398 97159->97196 97163 9a116a 97164 9aa961 22 API calls 97163->97164 97165 9a1174 97164->97165 97166 9aa961 22 API calls 97165->97166 97167 9a117e 97166->97167 97168 9aa961 22 API calls 97167->97168 97169 9a1188 97168->97169 97170 9aa961 22 API calls 97169->97170 97171 9a11c6 97170->97171 97172 9aa961 22 API calls 97171->97172 97173 9a1292 97172->97173 97206 9a171c 97173->97206 97177 9a12c4 97178 9aa961 22 API calls 97177->97178 97179 9a12ce 97178->97179 97180 9b1940 9 API calls 97179->97180 97181 9a12f9 97180->97181 97227 9a1aab 97181->97227 97183 9a1315 97184 9a1325 GetStdHandle 97183->97184 97185 9a137a 97184->97185 97186 9e2485 97184->97186 97189 9a1387 OleInitialize 97185->97189 97186->97185 97187 9e248e 97186->97187 97188 9bfddb 22 API calls 97187->97188 97190 9e2495 97188->97190 97189->97156 97234 a1011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 97190->97234 97192 9e249e 97235 a10944 CreateThread 97192->97235 97194 9e24aa CloseHandle 97194->97185 97195->97158 97236 9a13f1 97196->97236 97199 9a13f1 22 API calls 97200 9a13d0 97199->97200 97201 9aa961 22 API calls 97200->97201 97202 9a13dc 97201->97202 97203 9a6b57 22 API calls 97202->97203 97204 9a1129 97203->97204 97205 9a1bc3 6 API calls 97204->97205 97205->97163 97207 9aa961 22 API calls 97206->97207 97208 9a172c 97207->97208 97209 9aa961 22 API calls 97208->97209 97210 9a1734 97209->97210 97211 9aa961 22 API calls 97210->97211 97212 9a174f 97211->97212 97213 9bfddb 22 API calls 97212->97213 97214 9a129c 97213->97214 97215 9a1b4a 97214->97215 97216 9a1b58 97215->97216 97217 9aa961 22 API calls 97216->97217 97218 9a1b63 97217->97218 97219 9aa961 22 API calls 97218->97219 97220 9a1b6e 97219->97220 97221 9aa961 22 API calls 97220->97221 97222 9a1b79 97221->97222 97223 9aa961 22 API calls 97222->97223 97224 9a1b84 97223->97224 97225 9bfddb 22 API calls 97224->97225 97226 9a1b96 RegisterWindowMessageW 97225->97226 97226->97177 97228 9a1abb 97227->97228 97229 9e272d 97227->97229 97231 9bfddb 22 API calls 97228->97231 97243 a13209 23 API calls 97229->97243 97233 9a1ac3 97231->97233 97232 9e2738 97233->97183 97234->97192 97235->97194 97244 a1092a 28 API calls 97235->97244 97237 9aa961 22 API calls 97236->97237 97238 9a13fc 97237->97238 97239 9aa961 22 API calls 97238->97239 97240 9a1404 97239->97240 97241 9aa961 22 API calls 97240->97241 97242 9a13c6 97241->97242 97242->97199 97243->97232 97245 9adee5 97246 9ab710 216 API calls 97245->97246 97247 9adef3 97246->97247 97248 9f2a00 97264 9ad7b0 messages 97248->97264 97249 9adb11 PeekMessageW 97249->97264 97250 9ad807 GetInputState 97250->97249 97250->97264 97252 9f1cbe TranslateAcceleratorW 97252->97264 97253 9adb8f PeekMessageW 97253->97264 97254 9ada04 timeGetTime 97254->97264 97255 9adb73 TranslateMessage DispatchMessageW 97255->97253 97256 9adbaf Sleep 97256->97264 97257 9f2b74 Sleep 97270 9f2b85 97257->97270 97260 9f1dda timeGetTime 97294 9be300 23 API calls 97260->97294 97263 9f2c0b GetExitCodeProcess 97266 9f2c37 CloseHandle 97263->97266 97267 9f2c21 WaitForSingleObject 97263->97267 97264->97249 97264->97250 97264->97252 97264->97253 97264->97254 97264->97255 97264->97256 97264->97257 97264->97260 97265 9ad9d5 97264->97265 97268 a329bf GetForegroundWindow 97264->97268 97273 a0e97b 5 API calls 97264->97273 97276 9aec40 216 API calls 97264->97276 97277 9b1310 216 API calls 97264->97277 97278 9abf40 216 API calls 97264->97278 97280 9add50 97264->97280 97287 9bedf6 97264->97287 97292 9adfd0 216 API calls 3 library calls 97264->97292 97293 9be551 timeGetTime 97264->97293 97295 a13a2a 23 API calls 97264->97295 97296 a1359c 82 API calls __wsopen_s 97264->97296 97297 a25658 23 API calls 97264->97297 97266->97270 97267->97264 97267->97266 97268->97264 97270->97263 97270->97264 97270->97265 97271 9f2ca9 Sleep 97270->97271 97298 9be551 timeGetTime 97270->97298 97299 a0d4dc 47 API calls 97270->97299 97271->97264 97273->97264 97276->97264 97277->97264 97278->97264 97281 9add6f 97280->97281 97282 9add83 97280->97282 97300 9ad260 97281->97300 97332 a1359c 82 API calls __wsopen_s 97282->97332 97284 9add7a 97284->97264 97286 9f2f75 97286->97286 97288 9bee09 97287->97288 97289 9bee12 97287->97289 97288->97264 97289->97288 97290 9bee36 IsDialogMessageW 97289->97290 97291 9fefaf GetClassLongW 97289->97291 97290->97288 97290->97289 97291->97289 97291->97290 97292->97264 97293->97264 97294->97264 97295->97264 97296->97264 97297->97264 97298->97270 97299->97270 97301 9aec40 216 API calls 97300->97301 97304 9ad29d 97301->97304 97302 9f1bc4 97341 a1359c 82 API calls __wsopen_s 97302->97341 97304->97302 97305 9ad30b messages 97304->97305 97306 9ad6d5 97304->97306 97307 9ad3c3 97304->97307 97312 9ad4b8 97304->97312 97321 9bfddb 22 API calls 97304->97321 97327 9ad429 __fread_nolock messages 97304->97327 97305->97284 97306->97305 97316 9bfe0b 22 API calls 97306->97316 97307->97306 97309 9ad3ce 97307->97309 97308 9ad5ff 97310 9f1bb5 97308->97310 97311 9ad614 97308->97311 97313 9bfddb 22 API calls 97309->97313 97340 a25705 23 API calls 97310->97340 97315 9bfddb 22 API calls 97311->97315 97317 9bfe0b 22 API calls 97312->97317 97318 9ad3d5 __fread_nolock 97313->97318 97324 9ad46a 97315->97324 97316->97318 97317->97327 97319 9bfddb 22 API calls 97318->97319 97320 9ad3f6 97318->97320 97319->97320 97320->97327 97336 9abec0 216 API calls 97320->97336 97321->97304 97323 9f1ba4 97339 a1359c 82 API calls __wsopen_s 97323->97339 97324->97284 97327->97308 97327->97323 97327->97324 97328 9f1b7f 97327->97328 97330 9f1b5d 97327->97330 97333 9a1f6f 97327->97333 97338 a1359c 82 API calls __wsopen_s 97328->97338 97337 a1359c 82 API calls __wsopen_s 97330->97337 97332->97286 97334 9aec40 216 API calls 97333->97334 97335 9a1f98 97334->97335 97335->97327 97336->97327 97337->97324 97338->97324 97339->97324 97340->97302 97341->97305 97342 9d8402 97347 9d81be 97342->97347 97345 9d842a 97353 9d81ef try_get_first_available_module 97347->97353 97348 9d8338 97352 9d8343 97348->97352 97365 9cf2d9 20 API calls _free 97348->97365 97350 9d83ee 97366 9d27ec 26 API calls __cftof 97350->97366 97352->97345 97359 9e0984 97352->97359 97353->97348 97362 9c8e0b 40 API calls 2 library calls 97353->97362 97355 9d838c 97355->97348 97363 9c8e0b 40 API calls 2 library calls 97355->97363 97357 9d83ab 97357->97348 97364 9c8e0b 40 API calls 2 library calls 97357->97364 97367 9e0081 97359->97367 97361 9e099f 97361->97345 97362->97355 97363->97357 97364->97348 97365->97350 97366->97352 97370 9e008d ___DestructExceptionObject 97367->97370 97368 9e009b 97424 9cf2d9 20 API calls _free 97368->97424 97370->97368 97372 9e00d4 97370->97372 97371 9e00a0 97425 9d27ec 26 API calls __cftof 97371->97425 97378 9e065b 97372->97378 97377 9e00aa __wsopen_s 97377->97361 97379 9e0678 97378->97379 97380 9e068d 97379->97380 97381 9e06a6 97379->97381 97441 9cf2c6 20 API calls _free 97380->97441 97427 9d5221 97381->97427 97384 9e06ab 97386 9e06cb 97384->97386 97387 9e06b4 97384->97387 97385 9e0692 97442 9cf2d9 20 API calls _free 97385->97442 97440 9e039a CreateFileW 97386->97440 97443 9cf2c6 20 API calls _free 97387->97443 97391 9e06b9 97444 9cf2d9 20 API calls _free 97391->97444 97393 9e0781 GetFileType 97394 9e078c GetLastError 97393->97394 97395 9e07d3 97393->97395 97447 9cf2a3 20 API calls 2 library calls 97394->97447 97449 9d516a 21 API calls 3 library calls 97395->97449 97396 9e0756 GetLastError 97446 9cf2a3 20 API calls 2 library calls 97396->97446 97399 9e0704 97399->97393 97399->97396 97445 9e039a CreateFileW 97399->97445 97401 9e079a CloseHandle 97401->97385 97404 9e07c3 97401->97404 97402 9e0749 97402->97393 97402->97396 97448 9cf2d9 20 API calls _free 97404->97448 97405 9e07f4 97407 9e0840 97405->97407 97450 9e05ab 72 API calls 4 library calls 97405->97450 97412 9e086d 97407->97412 97451 9e014d 72 API calls 4 library calls 97407->97451 97408 9e07c8 97408->97385 97411 9e0866 97411->97412 97414 9e087e 97411->97414 97413 9d86ae __wsopen_s 29 API calls 97412->97413 97415 9e00f8 97413->97415 97414->97415 97416 9e08fc CloseHandle 97414->97416 97426 9e0121 LeaveCriticalSection __wsopen_s 97415->97426 97452 9e039a CreateFileW 97416->97452 97418 9e0927 97419 9e095d 97418->97419 97420 9e0931 GetLastError 97418->97420 97419->97415 97453 9cf2a3 20 API calls 2 library calls 97420->97453 97422 9e093d 97454 9d5333 21 API calls 3 library calls 97422->97454 97424->97371 97425->97377 97426->97377 97428 9d522d ___DestructExceptionObject 97427->97428 97455 9d2f5e EnterCriticalSection 97428->97455 97430 9d5234 97431 9d5259 97430->97431 97435 9d52c7 EnterCriticalSection 97430->97435 97437 9d527b 97430->97437 97434 9d5000 __wsopen_s 21 API calls 97431->97434 97433 9d52a4 __wsopen_s 97433->97384 97436 9d525e 97434->97436 97435->97437 97438 9d52d4 LeaveCriticalSection 97435->97438 97436->97437 97459 9d5147 EnterCriticalSection 97436->97459 97456 9d532a 97437->97456 97438->97430 97440->97399 97441->97385 97442->97415 97443->97391 97444->97385 97445->97402 97446->97385 97447->97401 97448->97408 97449->97405 97450->97407 97451->97411 97452->97418 97453->97422 97454->97419 97455->97430 97460 9d2fa6 LeaveCriticalSection 97456->97460 97458 9d5331 97458->97433 97459->97437 97460->97458

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 235 9a42de-9a434d call 9aa961 GetVersionExW call 9a6b57 240 9e3617-9e362a 235->240 241 9a4353 235->241 243 9e362b-9e362f 240->243 242 9a4355-9a4357 241->242 246 9a435d-9a43bc call 9a93b2 call 9a37a0 242->246 247 9e3656 242->247 244 9e3632-9e363e 243->244 245 9e3631 243->245 244->243 248 9e3640-9e3642 244->248 245->244 264 9e37df-9e37e6 246->264 265 9a43c2-9a43c4 246->265 251 9e365d-9e3660 247->251 248->242 250 9e3648-9e364f 248->250 250->240 253 9e3651 250->253 254 9a441b-9a4435 GetCurrentProcess IsWow64Process 251->254 255 9e3666-9e36a8 251->255 253->247 257 9a4437 254->257 258 9a4494-9a449a 254->258 255->254 259 9e36ae-9e36b1 255->259 261 9a443d-9a4449 257->261 258->261 262 9e36db-9e36e5 259->262 263 9e36b3-9e36bd 259->263 266 9a444f-9a445e LoadLibraryA 261->266 267 9e3824-9e3828 GetSystemInfo 261->267 271 9e36f8-9e3702 262->271 272 9e36e7-9e36f3 262->272 268 9e36bf-9e36c5 263->268 269 9e36ca-9e36d6 263->269 273 9e37e8 264->273 274 9e3806-9e3809 264->274 265->251 270 9a43ca-9a43dd 265->270 280 9a449c-9a44a6 GetSystemInfo 266->280 281 9a4460-9a446e GetProcAddress 266->281 268->254 269->254 282 9e3726-9e372f 270->282 283 9a43e3-9a43e5 270->283 276 9e3704-9e3710 271->276 277 9e3715-9e3721 271->277 272->254 275 9e37ee 273->275 278 9e380b-9e381a 274->278 279 9e37f4-9e37fc 274->279 275->279 276->254 277->254 278->275 288 9e381c-9e3822 278->288 279->274 290 9a4476-9a4478 280->290 281->280 289 9a4470-9a4474 GetNativeSystemInfo 281->289 286 9e373c-9e3748 282->286 287 9e3731-9e3737 282->287 284 9a43eb-9a43ee 283->284 285 9e374d-9e3762 283->285 291 9a43f4-9a440f 284->291 292 9e3791-9e3794 284->292 293 9e376f-9e377b 285->293 294 9e3764-9e376a 285->294 286->254 287->254 288->279 289->290 295 9a447a-9a447b FreeLibrary 290->295 296 9a4481-9a4493 290->296 297 9e3780-9e378c 291->297 298 9a4415 291->298 292->254 299 9e379a-9e37c1 292->299 293->254 294->254 295->296 297->254 298->254 300 9e37ce-9e37da 299->300 301 9e37c3-9e37c9 299->301 300->254 301->254
                                                          APIs
                                                          • GetVersionExW.KERNEL32(?), ref: 009A430D
                                                            • Part of subcall function 009A6B57: _wcslen.LIBCMT ref: 009A6B6A
                                                          • GetCurrentProcess.KERNEL32(?,00A3CB64,00000000,?,?), ref: 009A4422
                                                          • IsWow64Process.KERNEL32(00000000,?,?), ref: 009A4429
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 009A4454
                                                          • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 009A4466
                                                          • GetNativeSystemInfo.KERNEL32(?,?,?), ref: 009A4474
                                                          • FreeLibrary.KERNEL32(00000000,?,?), ref: 009A447B
                                                          • GetSystemInfo.KERNEL32(?,?,?), ref: 009A44A0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                          • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                          • API String ID: 3290436268-3101561225
                                                          • Opcode ID: a70e039f3fe9a80e2a9f1021cf454ae20e10b65799d90f0176c50f57ce2a48ff
                                                          • Instruction ID: 6fe14cd036985676519626d87c82e61a5173301e29031ed5bc51102e66416e90
                                                          • Opcode Fuzzy Hash: a70e039f3fe9a80e2a9f1021cf454ae20e10b65799d90f0176c50f57ce2a48ff
                                                          • Instruction Fuzzy Hash: AAA1C67290E2C0DFC792CBFDBC851957FE86B66700B04CC99E08D9FA62D2644987DB61

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 500 9a42a2-9a42ba CreateStreamOnHGlobal 501 9a42da-9a42dd 500->501 502 9a42bc-9a42d3 FindResourceExW 500->502 503 9a42d9 502->503 504 9e35ba-9e35c9 LoadResource 502->504 503->501 504->503 505 9e35cf-9e35dd SizeofResource 504->505 505->503 506 9e35e3-9e35ee LockResource 505->506 506->503 507 9e35f4-9e3612 506->507 507->503
                                                          APIs
                                                          • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,009A50AA,?,?,00000000,00000000), ref: 009A42B2
                                                          • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,009A50AA,?,?,00000000,00000000), ref: 009A42C9
                                                          • LoadResource.KERNEL32(?,00000000,?,?,009A50AA,?,?,00000000,00000000,?,?,?,?,?,?,009A4F20), ref: 009E35BE
                                                          • SizeofResource.KERNEL32(?,00000000,?,?,009A50AA,?,?,00000000,00000000,?,?,?,?,?,?,009A4F20), ref: 009E35D3
                                                          • LockResource.KERNEL32(009A50AA,?,?,009A50AA,?,?,00000000,00000000,?,?,?,?,?,?,009A4F20,?), ref: 009E35E6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                          • String ID: SCRIPT
                                                          • API String ID: 3051347437-3967369404
                                                          • Opcode ID: 3b6999de2238bf9f316d1d0fb0c2732b0895076a52bfa9398e9a0d70000e1da1
                                                          • Instruction ID: 1c04e8255e49b9dec3e75038aca394dd842dc23bcc4eefb91278787d054abb28
                                                          • Opcode Fuzzy Hash: 3b6999de2238bf9f316d1d0fb0c2732b0895076a52bfa9398e9a0d70000e1da1
                                                          • Instruction Fuzzy Hash: 3F118E71240700BFD7219BA5DC48F677BBDEBC6B61F108569F812E6250DBB1DC018760

                                                          Control-flow Graph

                                                          APIs
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 009A2B6B
                                                            • Part of subcall function 009A3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00A71418,?,009A2E7F,?,?,?,00000000), ref: 009A3A78
                                                            • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                          • GetForegroundWindow.USER32(runas,?,?,?,?,?,00A62224), ref: 009E2C10
                                                          • ShellExecuteW.SHELL32(00000000,?,?,00A62224), ref: 009E2C17
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                          • String ID: runas
                                                          • API String ID: 448630720-4000483414
                                                          • Opcode ID: 1bb7de0c0be9d83999f656a0ac0e935327c32369a0a1577a5168d48a4e1f2211
                                                          • Instruction ID: c43120affed63491d70d012672cf604a9560890743659968a175e42728b5f9fd
                                                          • Opcode Fuzzy Hash: 1bb7de0c0be9d83999f656a0ac0e935327c32369a0a1577a5168d48a4e1f2211
                                                          • Instruction Fuzzy Hash: 0111B9715083416BC714FF78DC56BBEB7A8AFD3350F44982DF186520A2DF25894AC792

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 754 a0dbbe-a0dbda lstrlenW 755 a0dc06 754->755 756 a0dbdc-a0dbe6 GetFileAttributesW 754->756 758 a0dc09-a0dc0d 755->758 757 a0dbe8-a0dbf7 FindFirstFileW 756->757 756->758 757->755 759 a0dbf9-a0dc04 FindClose 757->759 759->758
                                                          APIs
                                                          • lstrlenW.KERNEL32(?,009E5222), ref: 00A0DBCE
                                                          • GetFileAttributesW.KERNEL32(?), ref: 00A0DBDD
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00A0DBEE
                                                          • FindClose.KERNEL32(00000000), ref: 00A0DBFA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: FileFind$AttributesCloseFirstlstrlen
                                                          • String ID:
                                                          • API String ID: 2695905019-0
                                                          • Opcode ID: 5eb8726e414bd4784d2740cbd846dd313a53dec48d7fffbd212e545c9cc5f532
                                                          • Instruction ID: 03784fa6ff5681da0f26c758b06319141b388f681fad91c083fd498012141e3d
                                                          • Opcode Fuzzy Hash: 5eb8726e414bd4784d2740cbd846dd313a53dec48d7fffbd212e545c9cc5f532
                                                          • Instruction Fuzzy Hash: 51F0A03281092867D220ABF8AC0D8AB7B6C9E01334B104702F836D20E0EBB059568A95
                                                          APIs
                                                          • GetInputState.USER32 ref: 009AD807
                                                          • timeGetTime.WINMM ref: 009ADA07
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 009ADB28
                                                          • TranslateMessage.USER32(?), ref: 009ADB7B
                                                          • DispatchMessageW.USER32(?), ref: 009ADB89
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 009ADB9F
                                                          • Sleep.KERNEL32(0000000A), ref: 009ADBB1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                          • String ID:
                                                          • API String ID: 2189390790-0
                                                          • Opcode ID: 9045cb73c12b076c358ab4d93d7baceee96ad70a63e488c3051a4130c44835a4
                                                          • Instruction ID: 3da8c48c6e9fc8fecccaad9f25ee5dd15df1355df6c69b15308b5cde3b645636
                                                          • Opcode Fuzzy Hash: 9045cb73c12b076c358ab4d93d7baceee96ad70a63e488c3051a4130c44835a4
                                                          • Instruction Fuzzy Hash: 2B42F130609345DFD728CF24C894BBAB7E8BF86314F148919F59A876A1D774E884CBD2

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 009A2D07
                                                          • RegisterClassExW.USER32(00000030), ref: 009A2D31
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 009A2D42
                                                          • InitCommonControlsEx.COMCTL32(?), ref: 009A2D5F
                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 009A2D6F
                                                          • LoadIconW.USER32(000000A9), ref: 009A2D85
                                                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 009A2D94
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                          • API String ID: 2914291525-1005189915
                                                          • Opcode ID: d0c5ebe26dde216705ad24450ea0130022c6320c04a35af3cbea48a52e3ecbe9
                                                          • Instruction ID: c90bcd59cc1de82327bb03f9d5506a048ebe26d36053a3513fd922aea0842016
                                                          • Opcode Fuzzy Hash: d0c5ebe26dde216705ad24450ea0130022c6320c04a35af3cbea48a52e3ecbe9
                                                          • Instruction Fuzzy Hash: C521D3B5911308AFDB00DFE8EC49B9DBBF4FB08714F00811AFA15B62A0D7B145828F90

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 303 9e065b-9e068b call 9e042f 306 9e068d-9e0698 call 9cf2c6 303->306 307 9e06a6-9e06b2 call 9d5221 303->307 314 9e069a-9e06a1 call 9cf2d9 306->314 312 9e06cb-9e0714 call 9e039a 307->312 313 9e06b4-9e06c9 call 9cf2c6 call 9cf2d9 307->313 323 9e0716-9e071f 312->323 324 9e0781-9e078a GetFileType 312->324 313->314 321 9e097d-9e0983 314->321 328 9e0756-9e077c GetLastError call 9cf2a3 323->328 329 9e0721-9e0725 323->329 325 9e078c-9e07bd GetLastError call 9cf2a3 CloseHandle 324->325 326 9e07d3-9e07d6 324->326 325->314 342 9e07c3-9e07ce call 9cf2d9 325->342 332 9e07df-9e07e5 326->332 333 9e07d8-9e07dd 326->333 328->314 329->328 334 9e0727-9e0754 call 9e039a 329->334 338 9e07e9-9e0837 call 9d516a 332->338 339 9e07e7 332->339 333->338 334->324 334->328 345 9e0839-9e0845 call 9e05ab 338->345 346 9e0847-9e086b call 9e014d 338->346 339->338 342->314 345->346 352 9e086f-9e0879 call 9d86ae 345->352 353 9e087e-9e08c1 346->353 354 9e086d 346->354 352->321 356 9e08e2-9e08f0 353->356 357 9e08c3-9e08c7 353->357 354->352 358 9e097b 356->358 359 9e08f6-9e08fa 356->359 357->356 361 9e08c9-9e08dd 357->361 358->321 359->358 362 9e08fc-9e092f CloseHandle call 9e039a 359->362 361->356 365 9e0963-9e0977 362->365 366 9e0931-9e095d GetLastError call 9cf2a3 call 9d5333 362->366 365->358 366->365
                                                          APIs
                                                            • Part of subcall function 009E039A: CreateFileW.KERNEL32(00000000,00000000,?,009E0704,?,?,00000000,?,009E0704,00000000,0000000C), ref: 009E03B7
                                                          • GetLastError.KERNEL32 ref: 009E076F
                                                          • __dosmaperr.LIBCMT ref: 009E0776
                                                          • GetFileType.KERNEL32(00000000), ref: 009E0782
                                                          • GetLastError.KERNEL32 ref: 009E078C
                                                          • __dosmaperr.LIBCMT ref: 009E0795
                                                          • CloseHandle.KERNEL32(00000000), ref: 009E07B5
                                                          • CloseHandle.KERNEL32(?), ref: 009E08FF
                                                          • GetLastError.KERNEL32 ref: 009E0931
                                                          • __dosmaperr.LIBCMT ref: 009E0938
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                          • String ID: H
                                                          • API String ID: 4237864984-2852464175
                                                          • Opcode ID: 7100a21517fd77b20794a314810c12340ffb762f3d0315b6d958962eb8e04491
                                                          • Instruction ID: 661907fde22a152ad8df290c1dfb32ee552f0eb87339d7a6bbc79045c1f49958
                                                          • Opcode Fuzzy Hash: 7100a21517fd77b20794a314810c12340ffb762f3d0315b6d958962eb8e04491
                                                          • Instruction Fuzzy Hash: 67A13632A001848FDF1AEFA8DC51BAE7BA4AB86320F14415DF815AF292C7719C53CB91

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 009A3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00A71418,?,009A2E7F,?,?,?,00000000), ref: 009A3A78
                                                            • Part of subcall function 009A3357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 009A3379
                                                          • RegOpenKeyExW.KERNEL32(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 009A356A
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 009E318D
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 009E31CE
                                                          • RegCloseKey.ADVAPI32(?), ref: 009E3210
                                                          • _wcslen.LIBCMT ref: 009E3277
                                                          • _wcslen.LIBCMT ref: 009E3286
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                          • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                          • API String ID: 98802146-2727554177
                                                          • Opcode ID: b364eb6b7ab4a5a62dd3dd73c6bcfb07bae80b5572ea710df060dcac29e39406
                                                          • Instruction ID: 1284d7b79aaf03ce0a79ad319cc635eb1a700e985b7d72c7a2b2cd96f4616a04
                                                          • Opcode Fuzzy Hash: b364eb6b7ab4a5a62dd3dd73c6bcfb07bae80b5572ea710df060dcac29e39406
                                                          • Instruction Fuzzy Hash: D87192715043009EC314DFA5DC85AABB7F8FFD5750F40882EF5899B1A0EB749A89CB92

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 009A2B8E
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 009A2B9D
                                                          • LoadIconW.USER32(00000063), ref: 009A2BB3
                                                          • LoadIconW.USER32(000000A4), ref: 009A2BC5
                                                          • LoadIconW.USER32(000000A2), ref: 009A2BD7
                                                          • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 009A2BEF
                                                          • RegisterClassExW.USER32(?), ref: 009A2C40
                                                            • Part of subcall function 009A2CD4: GetSysColorBrush.USER32(0000000F), ref: 009A2D07
                                                            • Part of subcall function 009A2CD4: RegisterClassExW.USER32(00000030), ref: 009A2D31
                                                            • Part of subcall function 009A2CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 009A2D42
                                                            • Part of subcall function 009A2CD4: InitCommonControlsEx.COMCTL32(?), ref: 009A2D5F
                                                            • Part of subcall function 009A2CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 009A2D6F
                                                            • Part of subcall function 009A2CD4: LoadIconW.USER32(000000A9), ref: 009A2D85
                                                            • Part of subcall function 009A2CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 009A2D94
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                          • String ID: #$0$AutoIt v3
                                                          • API String ID: 423443420-4155596026
                                                          • Opcode ID: 4b7b9eaf2cc22b5ff159dabf1909940ce03d6e3f0ee6594e1bb3ab9fb39c12f2
                                                          • Instruction ID: 0eafa2b344f4c31c29ea56e8f67127e7454aba27ccdd3127dae97b7e95122232
                                                          • Opcode Fuzzy Hash: 4b7b9eaf2cc22b5ff159dabf1909940ce03d6e3f0ee6594e1bb3ab9fb39c12f2
                                                          • Instruction Fuzzy Hash: FB210975E00314ABDB50DFE9EC59A997FF4FB48B54F00806AF508BA6A0D7B14586CF90

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 444 9a3170-9a3185 445 9a3187-9a318a 444->445 446 9a31e5-9a31e7 444->446 447 9a31eb 445->447 448 9a318c-9a3193 445->448 446->445 449 9a31e9 446->449 453 9e2dfb-9e2e23 call 9a18e2 call 9be499 447->453 454 9a31f1-9a31f6 447->454 450 9a3199-9a319e 448->450 451 9a3265-9a326d PostQuitMessage 448->451 452 9a31d0-9a31d8 DefWindowProcW 449->452 456 9e2e7c-9e2e90 call a0bf30 450->456 457 9a31a4-9a31a8 450->457 459 9a3219-9a321b 451->459 458 9a31de-9a31e4 452->458 489 9e2e28-9e2e2f 453->489 460 9a31f8-9a31fb 454->460 461 9a321d-9a3244 SetTimer RegisterWindowMessageW 454->461 456->459 482 9e2e96 456->482 463 9a31ae-9a31b3 457->463 464 9e2e68-9e2e72 call a0c161 457->464 459->458 467 9e2d9c-9e2d9f 460->467 468 9a3201-9a3214 KillTimer call 9a30f2 call 9a3c50 460->468 461->459 465 9a3246-9a3251 CreatePopupMenu 461->465 472 9e2e4d-9e2e54 463->472 473 9a31b9-9a31be 463->473 478 9e2e77 464->478 465->459 475 9e2dd7-9e2df6 MoveWindow 467->475 476 9e2da1-9e2da5 467->476 468->459 472->452 485 9e2e5a-9e2e63 call a00ad7 472->485 480 9a3253-9a3263 call 9a326f 473->480 481 9a31c4-9a31ca 473->481 475->459 483 9e2dc6-9e2dd2 SetFocus 476->483 484 9e2da7-9e2daa 476->484 478->459 480->459 481->452 481->489 482->452 483->459 484->481 490 9e2db0-9e2dc1 call 9a18e2 484->490 485->452 489->452 493 9e2e35-9e2e48 call 9a30f2 call 9a3837 489->493 490->459 493->452
                                                          APIs
                                                          • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,009A316A,?,?), ref: 009A31D8
                                                          • KillTimer.USER32(?,00000001,?,?,?,?,?,009A316A,?,?), ref: 009A3204
                                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 009A3227
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,009A316A,?,?), ref: 009A3232
                                                          • CreatePopupMenu.USER32 ref: 009A3246
                                                          • PostQuitMessage.USER32(00000000), ref: 009A3267
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                          • String ID: TaskbarCreated
                                                          • API String ID: 129472671-2362178303
                                                          • Opcode ID: ba6afa38e7f51e355e5dacf66dc49c866bfe48c10b1e7b594b45b6751cc49a3b
                                                          • Instruction ID: e4e5eb7f59b32aca661275046561acd714beaf6d5eecaee3b12a49f97a557293
                                                          • Opcode Fuzzy Hash: ba6afa38e7f51e355e5dacf66dc49c866bfe48c10b1e7b594b45b6751cc49a3b
                                                          • Instruction Fuzzy Hash: 4B417831244204ABDF159BBC9D0EB793A9DEB47350F04C125FE1A9A1E1DB748E8287E1

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 510 9a2c63-9a2cd3 CreateWindowExW * 2 ShowWindow * 2
                                                          APIs
                                                          • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 009A2C91
                                                          • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 009A2CB2
                                                          • ShowWindow.USER32(00000000,?,?,?,?,?,?,009A1CAD,?), ref: 009A2CC6
                                                          • ShowWindow.USER32(00000000,?,?,?,?,?,?,009A1CAD,?), ref: 009A2CCF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$CreateShow
                                                          • String ID: AutoIt v3$edit
                                                          • API String ID: 1584632944-3779509399
                                                          • Opcode ID: 1269cfe907b1a10e20c54e90869eacd819009d1d9680f847d790b3cbe1896d0c
                                                          • Instruction ID: 457397c8ad7a902fa2302733fe2d80db6df60af62b7ee8c253e1f89dcc60a80b
                                                          • Opcode Fuzzy Hash: 1269cfe907b1a10e20c54e90869eacd819009d1d9680f847d790b3cbe1896d0c
                                                          • Instruction Fuzzy Hash: 6FF030796403907AE770876B6C0DE773EBDD7C6F60F018059F908A6560D2610882DA70

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 625 a2ad64-a2ad9c call 9aa961 call 9c2340 630 a2add1-a2add5 625->630 631 a2ad9e-a2adb5 call 9a7510 625->631 633 a2adf1-a2adf5 630->633 634 a2add7-a2adee call 9a7510 call 9a7620 630->634 631->630 640 a2adb7-a2adce call 9a7510 call 9a7620 631->640 635 a2adf7-a2ae0e call 9a7510 633->635 636 a2ae3a 633->636 634->633 641 a2ae3c-a2ae40 635->641 649 a2ae10-a2ae21 call 9a9b47 635->649 636->641 640->630 645 a2ae42-a2ae50 call 9ab567 641->645 646 a2ae53-a2aeae call 9c2340 call 9a7510 ShellExecuteExW 641->646 645->646 662 a2aeb0-a2aeb6 call 9bfe14 646->662 663 a2aeb7-a2aeb9 646->663 649->636 661 a2ae23-a2ae2e call 9a7510 649->661 661->636 670 a2ae30-a2ae35 call 9aa8c7 661->670 662->663 667 a2aec2-a2aec6 663->667 668 a2aebb-a2aec1 call 9bfe14 663->668 672 a2af0a-a2af0e 667->672 673 a2aec8-a2aed6 667->673 668->667 670->636 674 a2af10-a2af19 672->674 675 a2af1b-a2af33 call 9acfa0 672->675 678 a2aedb-a2aeeb 673->678 679 a2aed8 673->679 682 a2af6d-a2af7b call 9a988f 674->682 675->682 689 a2af35-a2af46 GetProcessId 675->689 680 a2aef0-a2af08 call 9acfa0 678->680 681 a2aeed 678->681 679->678 680->682 681->680 690 a2af48 689->690 691 a2af4e-a2af67 call 9acfa0 CloseHandle 689->691 690->691 691->682
                                                          APIs
                                                          • ShellExecuteExW.SHELL32(0000003C), ref: 00A2AEA3
                                                            • Part of subcall function 009A7620: _wcslen.LIBCMT ref: 009A7625
                                                          • GetProcessId.KERNEL32(00000000), ref: 00A2AF38
                                                          • CloseHandle.KERNEL32(00000000), ref: 00A2AF67
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseExecuteHandleProcessShell_wcslen
                                                          • String ID: <$@
                                                          • API String ID: 146682121-1426351568
                                                          • Opcode ID: c85e1e7d77b11ddd44c36bcc7c153b97bf92e6770ea860d62e7505aeda707719
                                                          • Instruction ID: 7c9411bc5e875c4d613bfc8e247d6633340baadb46d35d1c96151f05e57ea71e
                                                          • Opcode Fuzzy Hash: c85e1e7d77b11ddd44c36bcc7c153b97bf92e6770ea860d62e7505aeda707719
                                                          • Instruction Fuzzy Hash: 7D718C71A00625DFCB14EF98D885A9EBBF0FF49310F0584A9E816AB352CB74ED45CB91

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 694 a0e97b-a0e986 695 a0e988 694->695 696 a0e9f9-a0e9fb 694->696 697 a0e98a-a0e98c 695->697 698 a0e98e-a0e991 695->698 699 a0e9f3 Sleep 697->699 700 a0e9f2 698->700 701 a0e993-a0e99f QueryPerformanceCounter 698->701 699->696 700->699 701->700 702 a0e9a1-a0e9a5 QueryPerformanceFrequency 701->702 703 a0e9ab-a0e9ee Sleep QueryPerformanceCounter call 9e20b0 702->703 706 a0e9f0 703->706 706->696
                                                          APIs
                                                          • QueryPerformanceCounter.KERNEL32(?), ref: 00A0E997
                                                          • QueryPerformanceFrequency.KERNEL32(?), ref: 00A0E9A5
                                                          • Sleep.KERNEL32(00000000), ref: 00A0E9AD
                                                          • QueryPerformanceCounter.KERNEL32(?), ref: 00A0E9B7
                                                          • Sleep.KERNEL32 ref: 00A0E9F3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: PerformanceQuery$CounterSleep$Frequency
                                                          • String ID:
                                                          • API String ID: 2833360925-0
                                                          • Opcode ID: 9e2d4fcdb051e4f7d7119933f78ddb1b3265174c22e1261f93af0956516ac8f1
                                                          • Instruction ID: b0fd0d0ccb6e2ea709ab529c9170f8f78fa62241c0e264ac7980a4524313d783
                                                          • Opcode Fuzzy Hash: 9e2d4fcdb051e4f7d7119933f78ddb1b3265174c22e1261f93af0956516ac8f1
                                                          • Instruction Fuzzy Hash: D9011731C0162DDBCF00EBE5ED59AEDFB78BB09751F000A56E502B2291CB309665ABA1

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 743 9a3b1c-9a3b27 744 9a3b99-9a3b9b 743->744 745 9a3b29-9a3b2e 743->745 747 9a3b8c-9a3b8f 744->747 745->744 746 9a3b30-9a3b48 RegOpenKeyExW 745->746 746->744 748 9a3b4a-9a3b69 RegQueryValueExW 746->748 749 9a3b6b-9a3b76 748->749 750 9a3b80-9a3b8b RegCloseKey 748->750 751 9a3b78-9a3b7a 749->751 752 9a3b90-9a3b97 749->752 750->747 753 9a3b7e 751->753 752->753 753->750
                                                          APIs
                                                          • RegOpenKeyExW.KERNEL32(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,009A3B0F,SwapMouseButtons,00000004,?), ref: 009A3B40
                                                          • RegQueryValueExW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,009A3B0F,SwapMouseButtons,00000004,?), ref: 009A3B61
                                                          • RegCloseKey.KERNEL32(00000000,?,?,?,80000001,80000001,?,009A3B0F,SwapMouseButtons,00000004,?), ref: 009A3B83
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseOpenQueryValue
                                                          • String ID: Control Panel\Mouse
                                                          • API String ID: 3677997916-824357125
                                                          • Opcode ID: 8864f51c7774e1ad371ef238bb6548389b706f097d42b0b1e2ed9b9544731a92
                                                          • Instruction ID: e9d17e9d44af956487ec9f004575fac7e2638d24004fa709819d3a3c428ac854
                                                          • Opcode Fuzzy Hash: 8864f51c7774e1ad371ef238bb6548389b706f097d42b0b1e2ed9b9544731a92
                                                          • Instruction Fuzzy Hash: BD112AB5511208FFDB20CFA5DC85ABEB7BDEF06754B108959B805E7110E3319E419BA0
                                                          APIs
                                                          • __Init_thread_footer.LIBCMT ref: 009AFE66
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Init_thread_footer
                                                          • String ID:
                                                          • API String ID: 1385522511-0
                                                          • Opcode ID: 8b15e5d3a1bdc8e74f71a4991a37859dad15cfcbcd9e3f5f0b912aa6ba96af44
                                                          • Instruction ID: d3cfad8c4de0a3f0b32958e100f4a4af3592c9a2e668348cbd25b8165835932e
                                                          • Opcode Fuzzy Hash: 8b15e5d3a1bdc8e74f71a4991a37859dad15cfcbcd9e3f5f0b912aa6ba96af44
                                                          • Instruction Fuzzy Hash: 43B26C74608341CFCB14CF58C8A0B2AB7E5BF8A314F24896DE9998B391D775ED41CB92

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1203 9a3923-9a3939 1204 9a393f-9a3954 call 9a6270 1203->1204 1205 9a3a13-9a3a17 1203->1205 1208 9a395a-9a3976 call 9a6b57 1204->1208 1209 9e3393-9e33a2 LoadStringW 1204->1209 1215 9a397c-9a3980 1208->1215 1216 9e33c9-9e33e5 call 9a6350 call 9a3fcf 1208->1216 1211 9e33ad-9e33b6 1209->1211 1213 9e33bc-9e33c4 call 9aa8c7 1211->1213 1214 9a3994-9a3a0e call 9c2340 call 9a3a18 call 9c4983 Shell_NotifyIconW call 9a988f 1211->1214 1213->1214 1214->1205 1215->1211 1218 9a3986-9a398f call 9a6350 1215->1218 1216->1214 1229 9e33eb-9e3409 call 9a33c6 call 9a3fcf call 9a33c6 1216->1229 1218->1214 1229->1214
                                                          APIs
                                                          • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 009E33A2
                                                            • Part of subcall function 009A6B57: _wcslen.LIBCMT ref: 009A6B6A
                                                          • Shell_NotifyIconW.SHELL32(00000001,?), ref: 009A3A04
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: IconLoadNotifyShell_String_wcslen
                                                          • String ID: Line:
                                                          • API String ID: 2289894680-1585850449
                                                          • Opcode ID: 57007400c728df50dc9697d4e73770bdb49ccb568e7afaaf0f7787950ebe89c0
                                                          • Instruction ID: 49e6f69a71bb4c99fcaeca7c076f9311a28fb8d4e056423dc93294c44a1521d4
                                                          • Opcode Fuzzy Hash: 57007400c728df50dc9697d4e73770bdb49ccb568e7afaaf0f7787950ebe89c0
                                                          • Instruction Fuzzy Hash: 8131CF71408300AED721EB64DC46FEBB7ECAB82710F00892AF59997191EF749A49C7D2
                                                          APIs
                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 009C0668
                                                            • Part of subcall function 009C32A4: RaiseException.KERNEL32(?,?,?,009C068A,?,00A71444,?,?,?,?,?,?,009C068A,009A1129,00A68738,009A1129), ref: 009C3304
                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 009C0685
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw$ExceptionRaise
                                                          • String ID: Unknown exception
                                                          • API String ID: 3476068407-410509341
                                                          • Opcode ID: ec436c6d703f0a9f99c19ff7c3ef23e2b370977c34bf9e93fe5241ca2135e52b
                                                          • Instruction ID: 5cc927982dbe70196bddd1dc27ae874ba6a14970a48c421ff5af7b4f7fd6a021
                                                          • Opcode Fuzzy Hash: ec436c6d703f0a9f99c19ff7c3ef23e2b370977c34bf9e93fe5241ca2135e52b
                                                          • Instruction Fuzzy Hash: 99F0C234D0020DB78F00BA64DD5AF9E7B6C6EC0350F608A39B828D65D1EF71DB25C682
                                                          APIs
                                                            • Part of subcall function 009A1BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 009A1BF4
                                                            • Part of subcall function 009A1BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 009A1BFC
                                                            • Part of subcall function 009A1BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 009A1C07
                                                            • Part of subcall function 009A1BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 009A1C12
                                                            • Part of subcall function 009A1BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 009A1C1A
                                                            • Part of subcall function 009A1BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 009A1C22
                                                            • Part of subcall function 009A1B4A: RegisterWindowMessageW.USER32(00000004,?,009A12C4), ref: 009A1BA2
                                                          • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 009A136A
                                                          • OleInitialize.OLE32 ref: 009A1388
                                                          • CloseHandle.KERNEL32(00000000,00000000), ref: 009E24AB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                          • String ID:
                                                          • API String ID: 1986988660-0
                                                          • Opcode ID: 0403078841cf0b271dd9ad6c741e9330bd12fdd4d8885a6a11256d33599a3ebd
                                                          • Instruction ID: e61fe78846aa1784e3a114684a58c9fe2989431b6e930d12d67fdc21fe656390
                                                          • Opcode Fuzzy Hash: 0403078841cf0b271dd9ad6c741e9330bd12fdd4d8885a6a11256d33599a3ebd
                                                          • Instruction Fuzzy Hash: 8F71ABB49212008FC388EFFDAD56A563BE5FB89354B54C22AE00ED7361EB304482CF95
                                                          APIs
                                                            • Part of subcall function 009A3923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 009A3A04
                                                          • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00A0C259
                                                          • KillTimer.USER32(?,00000001,?,?), ref: 00A0C261
                                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00A0C270
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_Timer$Kill
                                                          • String ID:
                                                          • API String ID: 3500052701-0
                                                          • Opcode ID: 1b5caff099197d18cb1d8c0f64c50a6ff889ece5f6ed2fd4d0f94532219ab6bf
                                                          • Instruction ID: 044bf9d10a31cb220e5be6ea4cba1d6b280e824f7f744708d4b858e90d2ae3d7
                                                          • Opcode Fuzzy Hash: 1b5caff099197d18cb1d8c0f64c50a6ff889ece5f6ed2fd4d0f94532219ab6bf
                                                          • Instruction Fuzzy Hash: E631C370904348AFEB22DFA49C95BEBBBFC9F06314F00449EE5DAA7281C7745A85CB51
                                                          APIs
                                                          • CloseHandle.KERNEL32(00000000,00000000,?,?,009D85CC,?,00A68CC8,0000000C), ref: 009D8704
                                                          • GetLastError.KERNEL32(?,009D85CC,?,00A68CC8,0000000C), ref: 009D870E
                                                          • __dosmaperr.LIBCMT ref: 009D8739
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseErrorHandleLast__dosmaperr
                                                          • String ID:
                                                          • API String ID: 2583163307-0
                                                          • Opcode ID: 37b58f49d38fe7cfe8a63b4dea2d07cd270fa3d0b4c42d066a82c802e4580587
                                                          • Instruction ID: 50664025aca0d5365537206781772e6aec9fdfc89dfba8ae559eec6b4fc7e891
                                                          • Opcode Fuzzy Hash: 37b58f49d38fe7cfe8a63b4dea2d07cd270fa3d0b4c42d066a82c802e4580587
                                                          • Instruction Fuzzy Hash: FF014E32A8566066D664A7746C49F7FAB4D8BC1774F3AC11BF8189B3D3DEA1CC818350
                                                          APIs
                                                          • TranslateMessage.USER32(?), ref: 009ADB7B
                                                          • DispatchMessageW.USER32(?), ref: 009ADB89
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 009ADB9F
                                                          • Sleep.KERNEL32(0000000A), ref: 009ADBB1
                                                          • TranslateAcceleratorW.USER32(?,?,?), ref: 009F1CC9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                                          • String ID:
                                                          • API String ID: 3288985973-0
                                                          • Opcode ID: b93fdca1a295f2f27597c07000285ada93fb2dd4b7599628e4269277bd1353e3
                                                          • Instruction ID: 106e1d49934c2e64f6fdfaefbd30ee0d05145fe6c9327dfb57ef43a0fffd602a
                                                          • Opcode Fuzzy Hash: b93fdca1a295f2f27597c07000285ada93fb2dd4b7599628e4269277bd1353e3
                                                          • Instruction Fuzzy Hash: 1DF05E306453449BE730CBA48C89FEA73ACEB85320F104918F65A930C0DB3494898B66
                                                          APIs
                                                          • __Init_thread_footer.LIBCMT ref: 009B17F6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Init_thread_footer
                                                          • String ID: CALL
                                                          • API String ID: 1385522511-4196123274
                                                          • Opcode ID: 7432a39005b98bba9fe0f53155c2061ca5af1f21e1bebc3f447498bf47d2bec5
                                                          • Instruction ID: d97956e36a478c0b61622fbaf300fbfda13fa4c043f5e2e54a1034492422e622
                                                          • Opcode Fuzzy Hash: 7432a39005b98bba9fe0f53155c2061ca5af1f21e1bebc3f447498bf47d2bec5
                                                          • Instruction Fuzzy Hash: 54229A70608301DFC714DF14C9A0BAABBF6BF85324F64892DF5968B2A1D775E841CB92
                                                          APIs
                                                          • GetOpenFileNameW.COMDLG32(?), ref: 009E2C8C
                                                            • Part of subcall function 009A3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,009A3A97,?,?,009A2E7F,?,?,?,00000000), ref: 009A3AC2
                                                            • Part of subcall function 009A2DA5: GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 009A2DC4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Name$Path$FileFullLongOpen
                                                          • String ID: X
                                                          • API String ID: 779396738-3081909835
                                                          • Opcode ID: a439dbc7ef1bb0dbc47b830c58d27480d6b76fa6b52d3d5e622b3d60b31d9bcf
                                                          • Instruction ID: 46a4da197410667ddfecc323298cc8e3256c7fe6547cf39146d03821b90bcbda
                                                          • Opcode Fuzzy Hash: a439dbc7ef1bb0dbc47b830c58d27480d6b76fa6b52d3d5e622b3d60b31d9bcf
                                                          • Instruction Fuzzy Hash: E0219371A002989BDB01DF98CC45BEE7BFCAF89314F108059E405A7241DBB89A898BA1
                                                          APIs
                                                          • Shell_NotifyIconW.SHELL32(00000000,?), ref: 009A3908
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_
                                                          • String ID:
                                                          • API String ID: 1144537725-0
                                                          • Opcode ID: 4e716f3ce5f09cab2a8a0b9f1b4a21336e71cb36402b738192e00bd8b3271233
                                                          • Instruction ID: ae10e037eadbf0266030f3974f3ff49bc29a3e192474a45551fcf3289cf9ac41
                                                          • Opcode Fuzzy Hash: 4e716f3ce5f09cab2a8a0b9f1b4a21336e71cb36402b738192e00bd8b3271233
                                                          • Instruction Fuzzy Hash: 5631D270A04300DFD760DF68D885B97BBE8FB8A708F00492EF59987240E775AA44CB92
                                                          APIs
                                                          • timeGetTime.WINMM ref: 009BF661
                                                            • Part of subcall function 009AD730: GetInputState.USER32 ref: 009AD807
                                                          • Sleep.KERNEL32(00000000), ref: 009FF2DE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: InputSleepStateTimetime
                                                          • String ID:
                                                          • API String ID: 4149333218-0
                                                          • Opcode ID: 44b85c5d1aa31fd5e950c42bb7fccfa0440114cc1d629db6949adef8afe180c0
                                                          • Instruction ID: 8b8929100f3cf3200c18b9c14aac51b0fcd60680f75cdb87533b95c0c31afd60
                                                          • Opcode Fuzzy Hash: 44b85c5d1aa31fd5e950c42bb7fccfa0440114cc1d629db6949adef8afe180c0
                                                          • Instruction Fuzzy Hash: DDF0A0312402059FD314EF79DC59BAAB7E9FF8A760F004029F85AD7362DB70A800CB90
                                                          APIs
                                                          • __Init_thread_footer.LIBCMT ref: 009ABB4E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Init_thread_footer
                                                          • String ID:
                                                          • API String ID: 1385522511-0
                                                          • Opcode ID: 7dcf7907daf228422d7aca8fe65bce677ec517fa484cdf05601bad43fa656c4f
                                                          • Instruction ID: d05fbe14985908fc867984bfb9203944517b0935c1170ac9a9f97ff32b590280
                                                          • Opcode Fuzzy Hash: 7dcf7907daf228422d7aca8fe65bce677ec517fa484cdf05601bad43fa656c4f
                                                          • Instruction Fuzzy Hash: E632BD35A00209DFDB24CF58C894BBEB7BDEF86314F148059EA15AB252D778ED81CB91
                                                          APIs
                                                          • __Init_thread_footer.LIBCMT ref: 00A25930
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Init_thread_footer
                                                          • String ID:
                                                          • API String ID: 1385522511-0
                                                          • Opcode ID: 4c61e2d82278a8a75d0b5c99394900a98e5e43a3ca4fd4cbd07936c1fb26d4be
                                                          • Instruction ID: dea8606477c579b4fce258a53820cca39490e78c68275d22a46c5f3a9f27115b
                                                          • Opcode Fuzzy Hash: 4c61e2d82278a8a75d0b5c99394900a98e5e43a3ca4fd4cbd07936c1fb26d4be
                                                          • Instruction Fuzzy Hash: E671AE30A00125AFCB14DF68C886EBAB7F6FF98350F10816DF95997281D771AD81CB90
                                                          APIs
                                                          • SetWindowPos.USER32(?,000000FE,00000000,00000000,00000000,00000000,00000013,00000001,?), ref: 00A32649
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window
                                                          • String ID:
                                                          • API String ID: 2353593579-0
                                                          • Opcode ID: 73be0b614e428bdc5d4886db3ed6a872e90c61d85c58374b96b283ca99b284e8
                                                          • Instruction ID: 3250ecbb0c0765ecfe38f635961612d2d75f4476de5d61db51b9701ac0247580
                                                          • Opcode Fuzzy Hash: 73be0b614e428bdc5d4886db3ed6a872e90c61d85c58374b96b283ca99b284e8
                                                          • Instruction Fuzzy Hash: 6021C275200615AFE710DF18C8D1A76B7A9EF45368F14806DF8568B392D771ED41CB90
                                                          APIs
                                                          • GetForegroundWindow.USER32(00000001,?), ref: 00A31420
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ForegroundWindow
                                                          • String ID:
                                                          • API String ID: 2020703349-0
                                                          • Opcode ID: 7d07646f058f73847213444cd90a4c10a1c2c89ef77024a22c4a63fd4c0f8564
                                                          • Instruction ID: 6a2582e608f526b122adbf46aff93c7590b9e758ceee31bf03744cfe22b707e6
                                                          • Opcode Fuzzy Hash: 7d07646f058f73847213444cd90a4c10a1c2c89ef77024a22c4a63fd4c0f8564
                                                          • Instruction Fuzzy Hash: E2319F70604202AFD714EF29C491B69F7A2FF85368F048168F8564F292DB31EC41CBD0
                                                          APIs
                                                            • Part of subcall function 009A4E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,009A4EDD,?,00A71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009A4E9C
                                                            • Part of subcall function 009A4E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 009A4EAE
                                                            • Part of subcall function 009A4E90: FreeLibrary.KERNEL32(00000000,?,?,009A4EDD,?,00A71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009A4EC0
                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00A71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009A4EFD
                                                            • Part of subcall function 009A4E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,009E3CDE,?,00A71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009A4E62
                                                            • Part of subcall function 009A4E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 009A4E74
                                                            • Part of subcall function 009A4E59: FreeLibrary.KERNEL32(00000000,?,?,009E3CDE,?,00A71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009A4E87
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Library$Load$AddressFreeProc
                                                          • String ID:
                                                          • API String ID: 2632591731-0
                                                          • Opcode ID: 1c353f3156541292b9c7f219d39259a6a5d36b3474ae63f9520d8074aa0dc6f5
                                                          • Instruction ID: dc09385c2e370ef592a813a18dc1c1c1bd45aabe1a6c3722852895c2bbbac6e7
                                                          • Opcode Fuzzy Hash: 1c353f3156541292b9c7f219d39259a6a5d36b3474ae63f9520d8074aa0dc6f5
                                                          • Instruction Fuzzy Hash: 4511C132610205AACF14AB60DD06FAD77A5AFC1B10F20882DF552AA1C1EEB4EE459B90
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: __wsopen_s
                                                          • String ID:
                                                          • API String ID: 3347428461-0
                                                          • Opcode ID: 7cec80610950ab4612c274eff745d396666053ce6ed878bdea975b4eeb9f85d3
                                                          • Instruction ID: fd640b5cee6d0842e00a3040d8c36ff0889cd41331c877076bf89f867c1a74f2
                                                          • Opcode Fuzzy Hash: 7cec80610950ab4612c274eff745d396666053ce6ed878bdea975b4eeb9f85d3
                                                          • Instruction Fuzzy Hash: 8911187590410AAFCB05DF58E941A9B7BF9EF48314F10805AF808AB312DB31EA11CBA5
                                                          APIs
                                                            • Part of subcall function 009D4C7D: RtlAllocateHeap.NTDLL(00000008,009A1129,00000000,?,009D2E29,00000001,00000364,?,?,?,009CF2DE,009D3863,00A71444,?,009BFDF5,?), ref: 009D4CBE
                                                          • _free.LIBCMT ref: 009D506C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap_free
                                                          • String ID:
                                                          • API String ID: 614378929-0
                                                          • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                          • Instruction ID: 3963123ee5d438b361c6a7515498297be76493cee38903b1085770ee534720a2
                                                          • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                          • Instruction Fuzzy Hash: 44014E722447046BE3318F65D841A5AFBECFBC5370F25451EE184933C0E6306805C774
                                                          APIs
                                                          • GetForegroundWindow.USER32(00000000,?,?,?,00A314B5,?), ref: 00A32A01
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ForegroundWindow
                                                          • String ID:
                                                          • API String ID: 2020703349-0
                                                          • Opcode ID: 5d88cbe445bbae41f1f81578c6ce0524a5236bd81dbfb886d983743db65ed59c
                                                          • Instruction ID: 9bafe0c9c7c0976fc58866358105f1a0147532396f60c799b3863c260483b218
                                                          • Opcode Fuzzy Hash: 5d88cbe445bbae41f1f81578c6ce0524a5236bd81dbfb886d983743db65ed59c
                                                          • Instruction Fuzzy Hash: 2B01B136B00A41AFD335CB2CD855B2277A2EB85354F298469E1478B251DB32FC42C7A0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                          • Instruction ID: b9f7b3b571f47ee13cc64a1fb72c2240b88840ce07ebc3938c8f0b162bc02dbe
                                                          • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                          • Instruction Fuzzy Hash: AAF0F432D21A1497D6313A798E05F5B339C9FE2330F104B2EF422922D2DB74E80186A7
                                                          APIs
                                                          • GetForegroundWindow.USER32(?), ref: 00A314EB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ForegroundWindow
                                                          • String ID:
                                                          • API String ID: 2020703349-0
                                                          • Opcode ID: dea81605929180688c24708edaf22aab59a3f2f7878e7f61ca54cd1a61cdd0f3
                                                          • Instruction ID: dc204d2ba20cfce012a293a46bd251e909e911334bcde1de7985110d0b9c3776
                                                          • Opcode Fuzzy Hash: dea81605929180688c24708edaf22aab59a3f2f7878e7f61ca54cd1a61cdd0f3
                                                          • Instruction Fuzzy Hash: C501F2753047419FD320CFAAD840D26BBA5FF85364B5480AEF84A8B712E632DD82CBD0
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID:
                                                          • API String ID: 176396367-0
                                                          • Opcode ID: 2a5568052486cbf4e0cd30e36d7b9dc833817de7baba896c94b7e8b926ea76a8
                                                          • Instruction ID: d2dd8a162d78591e33c4d33a448a47e0403df5319377de90d26b0c4b75c4a19e
                                                          • Opcode Fuzzy Hash: 2a5568052486cbf4e0cd30e36d7b9dc833817de7baba896c94b7e8b926ea76a8
                                                          • Instruction Fuzzy Hash: A0F0C8B36006006ED7149F28DC06FA7BB98EB84770F10852EF619CB1D1DB31E51087E0
                                                          APIs
                                                          • RtlAllocateHeap.NTDLL(00000008,009A1129,00000000,?,009D2E29,00000001,00000364,?,?,?,009CF2DE,009D3863,00A71444,?,009BFDF5,?), ref: 009D4CBE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1279760036-0
                                                          • Opcode ID: 8744907e7c8aadd338d973492e67eac9eda426170a9077ba0c8071c1423bf55f
                                                          • Instruction ID: 413836c6ee22bd61af34049d3bb8314ced8bee15a378f03d25f029ab765d4b51
                                                          • Opcode Fuzzy Hash: 8744907e7c8aadd338d973492e67eac9eda426170a9077ba0c8071c1423bf55f
                                                          • Instruction Fuzzy Hash: 1DF0E9316E222467DB215F729C05FDA378DBF917B1B15C117F899AB380CB70D80196E1
                                                          APIs
                                                          • RtlAllocateHeap.NTDLL(00000000,?,00A71444,?,009BFDF5,?,?,009AA976,00000010,00A71440,009A13FC,?,009A13C6,?,009A1129), ref: 009D3852
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1279760036-0
                                                          • Opcode ID: 0d8dcaabf08eb680af47db3b4daf8069cd2691cc10635057f915c31277bb6dcb
                                                          • Instruction ID: ad7b3b83d79f6058d01db474f6de9c0221eb61208bc2ef6b3fc020a68a6615b3
                                                          • Opcode Fuzzy Hash: 0d8dcaabf08eb680af47db3b4daf8069cd2691cc10635057f915c31277bb6dcb
                                                          • Instruction Fuzzy Hash: 76E0E53168022456E62166A69C00F9A365EAB827B2F09C126BC1597A80CB50DE01A2E3
                                                          APIs
                                                          • FreeLibrary.KERNEL32(?,?,00A71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009A4F6D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: FreeLibrary
                                                          • String ID:
                                                          • API String ID: 3664257935-0
                                                          • Opcode ID: 19eda9158299364d9864adb94743cf32087f0a1536fb6d60e9b1fe068d3315a7
                                                          • Instruction ID: 65ccf0f5d048f3e299e63c4ee60afe82d0420d19ee353f998a43304e33e3bdd1
                                                          • Opcode Fuzzy Hash: 19eda9158299364d9864adb94743cf32087f0a1536fb6d60e9b1fe068d3315a7
                                                          • Instruction Fuzzy Hash: F6F0A071005341CFCB348F60D890812B7E4AF413293209D7EE1DA82610C7B59844DF81
                                                          APIs
                                                          • IsWindow.USER32(00000000), ref: 00A32A66
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window
                                                          • String ID:
                                                          • API String ID: 2353593579-0
                                                          • Opcode ID: c63b428e61137ead3bedf4d2b478ab93f22e56fd875df10485480da56bf7debf
                                                          • Instruction ID: 31f2c599b1ed23228ac1b9c136e2c6be9ffe3be3a12dd9d4d17a47402f64ddb1
                                                          • Opcode Fuzzy Hash: c63b428e61137ead3bedf4d2b478ab93f22e56fd875df10485480da56bf7debf
                                                          • Instruction Fuzzy Hash: CDE0DF3275021AABC710EB30EC909FA736CEF103D0B000136FC16C2140DB30899183A0
                                                          APIs
                                                          • GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 009A2DC4
                                                            • Part of subcall function 009A6B57: _wcslen.LIBCMT ref: 009A6B6A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: LongNamePath_wcslen
                                                          • String ID:
                                                          • API String ID: 541455249-0
                                                          • Opcode ID: 7f60d2b9dbfaed8d0aa11ff83beee5efc8b335b79fceed6752f5df24d4339ebd
                                                          • Instruction ID: ff8879d7a8132f426e68589c7d8afdfa26e4a9de4b6c0272508cda8094e34f4c
                                                          • Opcode Fuzzy Hash: 7f60d2b9dbfaed8d0aa11ff83beee5efc8b335b79fceed6752f5df24d4339ebd
                                                          • Instruction Fuzzy Hash: 12E0CD726041245BC711E2989C05FDA77DDDFC8790F040071FD09E7248DA70ED808690
                                                          APIs
                                                            • Part of subcall function 009A3837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 009A3908
                                                            • Part of subcall function 009AD730: GetInputState.USER32 ref: 009AD807
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 009A2B6B
                                                            • Part of subcall function 009A30F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 009A314E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                          • String ID:
                                                          • API String ID: 3667716007-0
                                                          • Opcode ID: 81fdc532dc4f345a80a73af064698b3ec59959e15c608c8b15279490a69b391e
                                                          • Instruction ID: d206c2dd21c5e5454b3e9d50b4804b4c8bea97ce7df83f62ad27bd56df83bf98
                                                          • Opcode Fuzzy Hash: 81fdc532dc4f345a80a73af064698b3ec59959e15c608c8b15279490a69b391e
                                                          • Instruction Fuzzy Hash: 41E0866230425407C608BB78AC5667DA7999BD3351F40953EF14B971A2CE24454643D1
                                                          APIs
                                                          • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00A03D18
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSendTimeout
                                                          • String ID:
                                                          • API String ID: 1599653421-0
                                                          • Opcode ID: 04e6154cbc18681859fcc28dd545ceadbc3a211bcf13fc38ce72c8becf7530f2
                                                          • Instruction ID: ee15348a0648ad1b60e9655060c92249b38945496ca2bc3744b9f2dc55b2dba6
                                                          • Opcode Fuzzy Hash: 04e6154cbc18681859fcc28dd545ceadbc3a211bcf13fc38ce72c8becf7530f2
                                                          • Instruction Fuzzy Hash: F6D08CF06A03087EFB0083B18C0BEBB339CC316E81F004BA47E02E64C1DAA0DE090230
                                                          APIs
                                                          • CreateFileW.KERNEL32(00000000,00000000,?,009E0704,?,?,00000000,?,009E0704,00000000,0000000C), ref: 009E03B7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateFile
                                                          • String ID:
                                                          • API String ID: 823142352-0
                                                          • Opcode ID: 13277b419bef579934fd99ef75625dbd9b6c6b9c46a6529912f06145666f87d0
                                                          • Instruction ID: 4c1fad42060cae90e64c3d53c3b3425a7df81e9ffa8a0dff10b30d5e978b7597
                                                          • Opcode Fuzzy Hash: 13277b419bef579934fd99ef75625dbd9b6c6b9c46a6529912f06145666f87d0
                                                          • Instruction Fuzzy Hash: 3ED06C3204020DBBDF028F84DD06EDA3BAAFB48714F014100BE1866020C732E822AB90
                                                          APIs
                                                          • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 009A1CBC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: InfoParametersSystem
                                                          • String ID:
                                                          • API String ID: 3098949447-0
                                                          • Opcode ID: 2b72e56849b5a29aa318f7e66cfa572ef6375f2fde0132cd29b14e708fa159b2
                                                          • Instruction ID: 147b6c6890312247ac415dcdf29035a068e656ec72a74853099c2de092a8c5a6
                                                          • Opcode Fuzzy Hash: 2b72e56849b5a29aa318f7e66cfa572ef6375f2fde0132cd29b14e708fa159b2
                                                          • Instruction Fuzzy Hash: A2C092362C0304EFF214CBD4BC4EF1077A4A348B15F04C002F64DA95E3C3A228A2EB60
                                                          APIs
                                                            • Part of subcall function 009B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 009B9BB2
                                                          • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00A3961A
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00A3965B
                                                          • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00A3969F
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00A396C9
                                                          • SendMessageW.USER32 ref: 00A396F2
                                                          • GetKeyState.USER32(00000011), ref: 00A3978B
                                                          • GetKeyState.USER32(00000009), ref: 00A39798
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00A397AE
                                                          • GetKeyState.USER32(00000010), ref: 00A397B8
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00A397E9
                                                          • SendMessageW.USER32 ref: 00A39810
                                                          • SendMessageW.USER32(?,00001030,?,00A37E95), ref: 00A39918
                                                          • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00A3992E
                                                          • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00A39941
                                                          • SetCapture.USER32(?), ref: 00A3994A
                                                          • ClientToScreen.USER32(?,?), ref: 00A399AF
                                                          • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00A399BC
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00A399D6
                                                          • ReleaseCapture.USER32 ref: 00A399E1
                                                          • GetCursorPos.USER32(?), ref: 00A39A19
                                                          • ScreenToClient.USER32(?,?), ref: 00A39A26
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 00A39A80
                                                          • SendMessageW.USER32 ref: 00A39AAE
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00A39AEB
                                                          • SendMessageW.USER32 ref: 00A39B1A
                                                          • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00A39B3B
                                                          • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00A39B4A
                                                          • GetCursorPos.USER32(?), ref: 00A39B68
                                                          • ScreenToClient.USER32(?,?), ref: 00A39B75
                                                          • GetParent.USER32(?), ref: 00A39B93
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 00A39BFA
                                                          • SendMessageW.USER32 ref: 00A39C2B
                                                          • ClientToScreen.USER32(?,?), ref: 00A39C84
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00A39CB4
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00A39CDE
                                                          • SendMessageW.USER32 ref: 00A39D01
                                                          • ClientToScreen.USER32(?,?), ref: 00A39D4E
                                                          • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00A39D82
                                                            • Part of subcall function 009B9944: GetWindowLongW.USER32(?,000000EB), ref: 009B9952
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00A39E05
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                          • String ID: @GUI_DRAGID$F
                                                          • API String ID: 3429851547-4164748364
                                                          • Opcode ID: a72bee158cd1400f70dc5c235c322468ae795033f7dddf1a9bdb2bcfbc4f67f5
                                                          • Instruction ID: 6017aea652d371ffa779c876139ceabeecdbad322eb3509b7f202d356f0054a5
                                                          • Opcode Fuzzy Hash: a72bee158cd1400f70dc5c235c322468ae795033f7dddf1a9bdb2bcfbc4f67f5
                                                          • Instruction Fuzzy Hash: 81428A35205201AFDB24CF68CC85FABBBE5FF89320F104619F699972A1D7B1E851CB51
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 00A348F3
                                                          • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00A34908
                                                          • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00A34927
                                                          • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 00A3494B
                                                          • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 00A3495C
                                                          • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 00A3497B
                                                          • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 00A349AE
                                                          • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 00A349D4
                                                          • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00A34A0F
                                                          • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00A34A56
                                                          • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00A34A7E
                                                          • IsMenu.USER32(?), ref: 00A34A97
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00A34AF2
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00A34B20
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00A34B94
                                                          • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00A34BE3
                                                          • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00A34C82
                                                          • wsprintfW.USER32 ref: 00A34CAE
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00A34CC9
                                                          • GetWindowTextW.USER32(?,00000000,00000001), ref: 00A34CF1
                                                          • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00A34D13
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00A34D33
                                                          • GetWindowTextW.USER32(?,00000000,00000001), ref: 00A34D5A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                          • String ID: %d/%02d/%02d
                                                          • API String ID: 4054740463-328681919
                                                          • Opcode ID: 346d5cf66ec45d0793a32fb08ad3332f77f21a55f92a4c966d41a4ec4e20a118
                                                          • Instruction ID: bc6f1900b8b135f50d72b34a93ebb80a9a38d8a9e52bf8e20ff0232aa7416bf7
                                                          • Opcode Fuzzy Hash: 346d5cf66ec45d0793a32fb08ad3332f77f21a55f92a4c966d41a4ec4e20a118
                                                          • Instruction Fuzzy Hash: 5C120471600214ABEB258F68CC4AFBE7BF8EF89750F144129F515EB2E1DB78A941CB50
                                                          APIs
                                                          • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 009BF998
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 009FF474
                                                          • IsIconic.USER32(00000000), ref: 009FF47D
                                                          • ShowWindow.USER32(00000000,00000009), ref: 009FF48A
                                                          • SetForegroundWindow.USER32(00000000), ref: 009FF494
                                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 009FF4AA
                                                          • GetCurrentThreadId.KERNEL32 ref: 009FF4B1
                                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 009FF4BD
                                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 009FF4CE
                                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 009FF4D6
                                                          • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 009FF4DE
                                                          • SetForegroundWindow.USER32(00000000), ref: 009FF4E1
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 009FF4F6
                                                          • keybd_event.USER32(00000012,00000000), ref: 009FF501
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 009FF50B
                                                          • keybd_event.USER32(00000012,00000000), ref: 009FF510
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 009FF519
                                                          • keybd_event.USER32(00000012,00000000), ref: 009FF51E
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 009FF528
                                                          • keybd_event.USER32(00000012,00000000), ref: 009FF52D
                                                          • SetForegroundWindow.USER32(00000000), ref: 009FF530
                                                          • AttachThreadInput.USER32(?,000000FF,00000000), ref: 009FF557
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 4125248594-2988720461
                                                          • Opcode ID: 715f171c9f0e01bcd9159e0667e724a2b7bcd1bf5235a67e1ad92b85595f7a0f
                                                          • Instruction ID: 8e87c363ccbf2ff0b70af1e24e013bc8f2bfcc6bd38e6434733723fd5f883d8c
                                                          • Opcode Fuzzy Hash: 715f171c9f0e01bcd9159e0667e724a2b7bcd1bf5235a67e1ad92b85595f7a0f
                                                          • Instruction Fuzzy Hash: C6311071A8021CBAEB21ABF55C4AFBF7E6DEB44B60F100465FA01F61D1D6B19901AB60
                                                          APIs
                                                            • Part of subcall function 00A016C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00A0170D
                                                            • Part of subcall function 00A016C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00A0173A
                                                            • Part of subcall function 00A016C3: GetLastError.KERNEL32 ref: 00A0174A
                                                          • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00A01286
                                                          • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 00A012A8
                                                          • CloseHandle.KERNEL32(?), ref: 00A012B9
                                                          • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00A012D1
                                                          • GetProcessWindowStation.USER32 ref: 00A012EA
                                                          • SetProcessWindowStation.USER32(00000000), ref: 00A012F4
                                                          • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00A01310
                                                            • Part of subcall function 00A010BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00A011FC), ref: 00A010D4
                                                            • Part of subcall function 00A010BF: CloseHandle.KERNEL32(?,?,00A011FC), ref: 00A010E9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                          • String ID: $default$winsta0
                                                          • API String ID: 22674027-1027155976
                                                          • Opcode ID: 7bc415d6822967b73616b3accb5fb51ec075a67cf7d0e16339168c961d1e366d
                                                          • Instruction ID: 980b807f6eb624c148088fdd27ab1c17f48ec8eeddbfe629c4a5df0dc7a4a4da
                                                          • Opcode Fuzzy Hash: 7bc415d6822967b73616b3accb5fb51ec075a67cf7d0e16339168c961d1e366d
                                                          • Instruction Fuzzy Hash: 4A8199B1A0020DABDF21DFA4EC49FEE7BB9EF08714F144129F911B61A0C7328A55CB21
                                                          APIs
                                                            • Part of subcall function 00A010F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00A01114
                                                            • Part of subcall function 00A010F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00A00B9B,?,?,?), ref: 00A01120
                                                            • Part of subcall function 00A010F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00A00B9B,?,?,?), ref: 00A0112F
                                                            • Part of subcall function 00A010F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00A00B9B,?,?,?), ref: 00A01136
                                                            • Part of subcall function 00A010F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00A0114D
                                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00A00BCC
                                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00A00C00
                                                          • GetLengthSid.ADVAPI32(?), ref: 00A00C17
                                                          • GetAce.ADVAPI32(?,00000000,?), ref: 00A00C51
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00A00C6D
                                                          • GetLengthSid.ADVAPI32(?), ref: 00A00C84
                                                          • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00A00C8C
                                                          • HeapAlloc.KERNEL32(00000000), ref: 00A00C93
                                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00A00CB4
                                                          • CopySid.ADVAPI32(00000000), ref: 00A00CBB
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00A00CEA
                                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00A00D0C
                                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00A00D1E
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A00D45
                                                          • HeapFree.KERNEL32(00000000), ref: 00A00D4C
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A00D55
                                                          • HeapFree.KERNEL32(00000000), ref: 00A00D5C
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A00D65
                                                          • HeapFree.KERNEL32(00000000), ref: 00A00D6C
                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 00A00D78
                                                          • HeapFree.KERNEL32(00000000), ref: 00A00D7F
                                                            • Part of subcall function 00A01193: GetProcessHeap.KERNEL32(00000008,00A00BB1,?,00000000,?,00A00BB1,?), ref: 00A011A1
                                                            • Part of subcall function 00A01193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00A00BB1,?), ref: 00A011A8
                                                            • Part of subcall function 00A01193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00A00BB1,?), ref: 00A011B7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                          • String ID:
                                                          • API String ID: 4175595110-0
                                                          • Opcode ID: 1d925093758b9ddb5f58626f7e6ef568ad0ef45f86e6874ee0f4c69bc2960716
                                                          • Instruction ID: 33f88b2516134c74d147323dc941d0106624dd021d36967c7c983dd63f882382
                                                          • Opcode Fuzzy Hash: 1d925093758b9ddb5f58626f7e6ef568ad0ef45f86e6874ee0f4c69bc2960716
                                                          • Instruction Fuzzy Hash: 9471587290021AABDF10DFE4EC44FAEBBB8BF05310F044615F915B6291D771AA06CBB0
                                                          APIs
                                                          • OpenClipboard.USER32(00A3CC08), ref: 00A1EB29
                                                          • IsClipboardFormatAvailable.USER32(0000000D), ref: 00A1EB37
                                                          • GetClipboardData.USER32(0000000D), ref: 00A1EB43
                                                          • CloseClipboard.USER32 ref: 00A1EB4F
                                                          • GlobalLock.KERNEL32(00000000), ref: 00A1EB87
                                                          • CloseClipboard.USER32 ref: 00A1EB91
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00A1EBBC
                                                          • IsClipboardFormatAvailable.USER32(00000001), ref: 00A1EBC9
                                                          • GetClipboardData.USER32(00000001), ref: 00A1EBD1
                                                          • GlobalLock.KERNEL32(00000000), ref: 00A1EBE2
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00A1EC22
                                                          • IsClipboardFormatAvailable.USER32(0000000F), ref: 00A1EC38
                                                          • GetClipboardData.USER32(0000000F), ref: 00A1EC44
                                                          • GlobalLock.KERNEL32(00000000), ref: 00A1EC55
                                                          • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 00A1EC77
                                                          • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00A1EC94
                                                          • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00A1ECD2
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00A1ECF3
                                                          • CountClipboardFormats.USER32 ref: 00A1ED14
                                                          • CloseClipboard.USER32 ref: 00A1ED59
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                          • String ID:
                                                          • API String ID: 420908878-0
                                                          • Opcode ID: 530f67fe15ceeac999ddb0d672196be568944e08a2f0f36d2a2a739f0d03f5b2
                                                          • Instruction ID: 5f9a1f9971171e54323d2c4fb2aef9381ba82d39ff61bf8e958a143b94bc7e28
                                                          • Opcode Fuzzy Hash: 530f67fe15ceeac999ddb0d672196be568944e08a2f0f36d2a2a739f0d03f5b2
                                                          • Instruction Fuzzy Hash: B561C0352083019FD300EF64DC89FAAB7E8AF85754F18951DF856972A1CB31DD86CBA2
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00A169BE
                                                          • FindClose.KERNEL32(00000000), ref: 00A16A12
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00A16A4E
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00A16A75
                                                            • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00A16AB2
                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00A16ADF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                          • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                          • API String ID: 3830820486-3289030164
                                                          • Opcode ID: 47928784bed24cd652258fa326a02e74137bf31914d0a852415470a72f1cdccf
                                                          • Instruction ID: dcc77289195037cc2046ce782ae1840d9c2ec6a6cd02ce8c60ac0ab602a38fa7
                                                          • Opcode Fuzzy Hash: 47928784bed24cd652258fa326a02e74137bf31914d0a852415470a72f1cdccf
                                                          • Instruction Fuzzy Hash: C4D13E72508310AEC710EBA4CD96EABB7FCBF89704F04491DF589D6191EB74DA44CBA2
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00A19663
                                                          • GetFileAttributesW.KERNEL32(?), ref: 00A196A1
                                                          • SetFileAttributesW.KERNEL32(?,?), ref: 00A196BB
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00A196D3
                                                          • FindClose.KERNEL32(00000000), ref: 00A196DE
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 00A196FA
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00A1974A
                                                          • SetCurrentDirectoryW.KERNEL32(00A66B7C), ref: 00A19768
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00A19772
                                                          • FindClose.KERNEL32(00000000), ref: 00A1977F
                                                          • FindClose.KERNEL32(00000000), ref: 00A1978F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                          • String ID: *.*
                                                          • API String ID: 1409584000-438819550
                                                          • Opcode ID: 3c828353bb052e39b3620d0a40cacb75c166c3b869ad8b60833fe4c643c0c4aa
                                                          • Instruction ID: 6148ee9596e5b5f072045abd6d39df5d9415ca184d4b8c001185aa6a7abdf2fa
                                                          • Opcode Fuzzy Hash: 3c828353bb052e39b3620d0a40cacb75c166c3b869ad8b60833fe4c643c0c4aa
                                                          • Instruction Fuzzy Hash: 2931AD32940619BADB14EFF4DC59ADF77ACAF49320F104566F815E20A0EB30DA85CB24
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00A197BE
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00A19819
                                                          • FindClose.KERNEL32(00000000), ref: 00A19824
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 00A19840
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00A19890
                                                          • SetCurrentDirectoryW.KERNEL32(00A66B7C), ref: 00A198AE
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00A198B8
                                                          • FindClose.KERNEL32(00000000), ref: 00A198C5
                                                          • FindClose.KERNEL32(00000000), ref: 00A198D5
                                                            • Part of subcall function 00A0DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00A0DB00
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                          • String ID: *.*
                                                          • API String ID: 2640511053-438819550
                                                          • Opcode ID: 819c64bfe0002ba79c25277244b6ffa95d1ae394d8fce6fb28411bc8531d5902
                                                          • Instruction ID: be7672a177ebadaa7bad50d6b5aadd41fe330674a7417bcbba4e2fdc9d9c788d
                                                          • Opcode Fuzzy Hash: 819c64bfe0002ba79c25277244b6ffa95d1ae394d8fce6fb28411bc8531d5902
                                                          • Instruction Fuzzy Hash: 06319E32540619BEDB10EFE4EC59ADF77ACAF4A370F144566F814A21A0EB30DA85CB60
                                                          APIs
                                                            • Part of subcall function 00A2C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A2B6AE,?,?), ref: 00A2C9B5
                                                            • Part of subcall function 00A2C998: _wcslen.LIBCMT ref: 00A2C9F1
                                                            • Part of subcall function 00A2C998: _wcslen.LIBCMT ref: 00A2CA68
                                                            • Part of subcall function 00A2C998: _wcslen.LIBCMT ref: 00A2CA9E
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A2BF3E
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 00A2BFA9
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00A2BFCD
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00A2C02C
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00A2C0E7
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00A2C154
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00A2C1E9
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 00A2C23A
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00A2C2E3
                                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00A2C382
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00A2C38F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                                          • String ID:
                                                          • API String ID: 3102970594-0
                                                          • Opcode ID: 8d4a6c5d41dc65f666767fcc2c4d29b7904e47d1fd581872779c1fa4dfeacb5a
                                                          • Instruction ID: 7a635c9ebb6a3f2a743f7572262800c52ce46bc3aef932490e5175d509e5d1bb
                                                          • Opcode Fuzzy Hash: 8d4a6c5d41dc65f666767fcc2c4d29b7904e47d1fd581872779c1fa4dfeacb5a
                                                          • Instruction Fuzzy Hash: F7025E716042109FC714DF28D991E2AB7E5EF89314F18C8ADF84ADB2A2DB31ED45CB91
                                                          APIs
                                                          • GetLocalTime.KERNEL32(?), ref: 00A18257
                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 00A18267
                                                          • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00A18273
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00A18310
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00A18324
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00A18356
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00A1838C
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00A18395
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectoryTime$File$Local$System
                                                          • String ID: *.*
                                                          • API String ID: 1464919966-438819550
                                                          • Opcode ID: 1147deee973fe15c46ecac4ee59d427f62a08a71656a0cb09a3f34b687e78688
                                                          • Instruction ID: cea09196cea986b0a5ff0bd12e905f040213c9165b1ee5103dc31e58e686960a
                                                          • Opcode Fuzzy Hash: 1147deee973fe15c46ecac4ee59d427f62a08a71656a0cb09a3f34b687e78688
                                                          • Instruction Fuzzy Hash: 216169B25043459FCB10EF64C844AEEB3E8FF89310F04891EF99997251EB35E945CB92
                                                          APIs
                                                            • Part of subcall function 009A3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,009A3A97,?,?,009A2E7F,?,?,?,00000000), ref: 009A3AC2
                                                            • Part of subcall function 00A0E199: GetFileAttributesW.KERNEL32(?,00A0CF95), ref: 00A0E19A
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00A0D122
                                                          • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 00A0D1DD
                                                          • MoveFileW.KERNEL32(?,?), ref: 00A0D1F0
                                                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 00A0D20D
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00A0D237
                                                            • Part of subcall function 00A0D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00A0D21C,?,?), ref: 00A0D2B2
                                                          • FindClose.KERNEL32(00000000,?,?,?), ref: 00A0D253
                                                          • FindClose.KERNEL32(00000000), ref: 00A0D264
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                          • String ID: \*.*
                                                          • API String ID: 1946585618-1173974218
                                                          • Opcode ID: bf80aceec5fe59a560ad5d355d6ae488f161034fe115cbc9091ea12c24859bf7
                                                          • Instruction ID: 0b9424f6a0a987deb7323d9940a6c6453da46b34efd2bca0431ff66cb2f04431
                                                          • Opcode Fuzzy Hash: bf80aceec5fe59a560ad5d355d6ae488f161034fe115cbc9091ea12c24859bf7
                                                          • Instruction Fuzzy Hash: 77613C3280511DAFCF05EBE0EE52AEEB775AF95340F248169E40277191EB356F09DBA0
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                          • String ID:
                                                          • API String ID: 1737998785-0
                                                          • Opcode ID: 468a676c5430f54f896d110afa3d28befd1029eca9d0af34e9e5839c81cae059
                                                          • Instruction ID: 7bbde4b0aa83957e29c00f8a7c187b399fbf05783956fcee2de738ff8bcbc0d0
                                                          • Opcode Fuzzy Hash: 468a676c5430f54f896d110afa3d28befd1029eca9d0af34e9e5839c81cae059
                                                          • Instruction Fuzzy Hash: 31419D35604611AFD310DF65E889B5ABBE5EF44328F14C099F8199F6A2C735EC82CB90
                                                          APIs
                                                            • Part of subcall function 00A016C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00A0170D
                                                            • Part of subcall function 00A016C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00A0173A
                                                            • Part of subcall function 00A016C3: GetLastError.KERNEL32 ref: 00A0174A
                                                          • ExitWindowsEx.USER32(?,00000000), ref: 00A0E932
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                          • String ID: $ $@$SeShutdownPrivilege
                                                          • API String ID: 2234035333-3163812486
                                                          • Opcode ID: 55b0efea65f98e473eeeb8a6c2100d2c70d40ccc84a4e02963ee42c554ffc000
                                                          • Instruction ID: 218293ffad4449ed264fe9eff4fc3850c0e84532ff4825f64a8d7e1748040a61
                                                          • Opcode Fuzzy Hash: 55b0efea65f98e473eeeb8a6c2100d2c70d40ccc84a4e02963ee42c554ffc000
                                                          • Instruction Fuzzy Hash: 0901D673A10219ABEB54A7B4BD86BBBB26CA714790F154D21FC12F21D1D5A15C40A290
                                                          APIs
                                                          • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00A21276
                                                          • WSAGetLastError.WSOCK32 ref: 00A21283
                                                          • bind.WSOCK32(00000000,?,00000010), ref: 00A212BA
                                                          • WSAGetLastError.WSOCK32 ref: 00A212C5
                                                          • closesocket.WSOCK32(00000000), ref: 00A212F4
                                                          • listen.WSOCK32(00000000,00000005), ref: 00A21303
                                                          • WSAGetLastError.WSOCK32 ref: 00A2130D
                                                          • closesocket.WSOCK32(00000000), ref: 00A2133C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$closesocket$bindlistensocket
                                                          • String ID:
                                                          • API String ID: 540024437-0
                                                          • Opcode ID: 691a53cc25010a52e05b086015642f59c53885b6f3ff41f2bf97fed7397e8043
                                                          • Instruction ID: dc0501c2b0dc4debc13695e115316e3d7274bb943bdbe8526ee047a71de4d50f
                                                          • Opcode Fuzzy Hash: 691a53cc25010a52e05b086015642f59c53885b6f3ff41f2bf97fed7397e8043
                                                          • Instruction Fuzzy Hash: 62418631600110DFD710DF68D884B69B7E6AF96328F1881A8E8569F292C771ED82CBE1
                                                          APIs
                                                            • Part of subcall function 009A3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,009A3A97,?,?,009A2E7F,?,?,?,00000000), ref: 009A3AC2
                                                            • Part of subcall function 00A0E199: GetFileAttributesW.KERNEL32(?,00A0CF95), ref: 00A0E19A
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00A0D420
                                                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 00A0D470
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00A0D481
                                                          • FindClose.KERNEL32(00000000), ref: 00A0D498
                                                          • FindClose.KERNEL32(00000000), ref: 00A0D4A1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                          • String ID: \*.*
                                                          • API String ID: 2649000838-1173974218
                                                          • Opcode ID: dde35163375e211e742e38e5b5763674ee33e6e349b2a42a60dbebd39903ae20
                                                          • Instruction ID: 4884b9690e62470670f3044a8656624e506e52c08a262e8240d14215ea9550a6
                                                          • Opcode Fuzzy Hash: dde35163375e211e742e38e5b5763674ee33e6e349b2a42a60dbebd39903ae20
                                                          • Instruction Fuzzy Hash: 16315E72018355AFC304EFA4DC919AFB7A8BED2354F448A1DF4D193191EB35AA09C7A3
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: __floor_pentium4
                                                          • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                          • API String ID: 4168288129-2761157908
                                                          • Opcode ID: 833a46afc1a833a674fb3fe7b79744326a46552fe875c9e6ca72771b1796ec79
                                                          • Instruction ID: faeafb8d9c9db85a053159070b9f91752e1cd2f9687735d2917f2a25406f4365
                                                          • Opcode Fuzzy Hash: 833a46afc1a833a674fb3fe7b79744326a46552fe875c9e6ca72771b1796ec79
                                                          • Instruction Fuzzy Hash: 9BC24A71E446288BDB25DF28DD517EAB7B9EB84304F1485EBD44EE7240E778AE818F40
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 00A164DC
                                                          • CoInitialize.OLE32(00000000), ref: 00A16639
                                                          • CoCreateInstance.OLE32(00A3FCF8,00000000,00000001,00A3FB68,?), ref: 00A16650
                                                          • CoUninitialize.OLE32 ref: 00A168D4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                          • String ID: .lnk
                                                          • API String ID: 886957087-24824748
                                                          • Opcode ID: a24f396ab6ebb6ad37bc3e0520981cce455fcf9b5053475459712ae309c619f4
                                                          • Instruction ID: f8377a767ee706c57ffb170674d335408ca7321007b1b7cd8c18a4e5d8d7d1aa
                                                          • Opcode Fuzzy Hash: a24f396ab6ebb6ad37bc3e0520981cce455fcf9b5053475459712ae309c619f4
                                                          • Instruction Fuzzy Hash: 1CD14871508201AFC304EF24C881EABB7E9FFD9714F04896DF5958B2A1EB71E945CB92
                                                          APIs
                                                          • GetForegroundWindow.USER32(?,?,00000000), ref: 00A222E8
                                                            • Part of subcall function 00A1E4EC: GetWindowRect.USER32(?,?), ref: 00A1E504
                                                          • GetDesktopWindow.USER32 ref: 00A22312
                                                          • GetWindowRect.USER32(00000000), ref: 00A22319
                                                          • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00A22355
                                                          • GetCursorPos.USER32(?), ref: 00A22381
                                                          • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00A223DF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                          • String ID:
                                                          • API String ID: 2387181109-0
                                                          • Opcode ID: bc8827d59e1fefdd05c974e23eee27d1cff0b8f5e72ce2084359299017c95674
                                                          • Instruction ID: c1a655771fca5088e40fab2b7658492b635ac476c09d8fcf03a285595218d416
                                                          • Opcode Fuzzy Hash: bc8827d59e1fefdd05c974e23eee27d1cff0b8f5e72ce2084359299017c95674
                                                          • Instruction Fuzzy Hash: D531E372504315AFD720DF58DC45F5BB7A9FF84720F000A29F985AB191DB34E909CB92
                                                          APIs
                                                            • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                          • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00A19B78
                                                          • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00A19C8B
                                                            • Part of subcall function 00A13874: GetInputState.USER32 ref: 00A138CB
                                                            • Part of subcall function 00A13874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00A13966
                                                          • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00A19BA8
                                                          • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00A19C75
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                          • String ID: *.*
                                                          • API String ID: 1972594611-438819550
                                                          • Opcode ID: d005b2908e534d7c29bbf7f557e470a903e837e1695f6cb3d4ebcc2d79bd1526
                                                          • Instruction ID: 17c82b1d698a8c1b6babb16f9bacf057dbc5861ea4011390144b3365d298b915
                                                          • Opcode Fuzzy Hash: d005b2908e534d7c29bbf7f557e470a903e837e1695f6cb3d4ebcc2d79bd1526
                                                          • Instruction Fuzzy Hash: 94416F7190421AAFCF54DFA4CD55AEEBBB8FF45310F144155F845A2191EB309E84CFA1
                                                          APIs
                                                            • Part of subcall function 009B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 009B9BB2
                                                          • DefDlgProcW.USER32(?,?,?,?,?), ref: 009B9A4E
                                                          • GetSysColor.USER32(0000000F), ref: 009B9B23
                                                          • SetBkColor.GDI32(?,00000000), ref: 009B9B36
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Color$LongProcWindow
                                                          • String ID:
                                                          • API String ID: 3131106179-0
                                                          • Opcode ID: 83ae5dbd1ed6ec2f0c3f87bc743e2f9c5bb9c713fa99d4a049a705932cfec7cc
                                                          • Instruction ID: adbaf59fe87cb07988e268debaf3e46b9f34fa6153e8915c663ead30d1c734c5
                                                          • Opcode Fuzzy Hash: 83ae5dbd1ed6ec2f0c3f87bc743e2f9c5bb9c713fa99d4a049a705932cfec7cc
                                                          • Instruction Fuzzy Hash: E3A15E70128518BEE728EA7C8E89EFB769DDF82360F154509F302C6691CA299D42C372
                                                          APIs
                                                            • Part of subcall function 00A2304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00A2307A
                                                            • Part of subcall function 00A2304E: _wcslen.LIBCMT ref: 00A2309B
                                                          • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00A2185D
                                                          • WSAGetLastError.WSOCK32 ref: 00A21884
                                                          • bind.WSOCK32(00000000,?,00000010), ref: 00A218DB
                                                          • WSAGetLastError.WSOCK32 ref: 00A218E6
                                                          • closesocket.WSOCK32(00000000), ref: 00A21915
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 1601658205-0
                                                          • Opcode ID: ca2fbf771f1c1baded5cafbc2687f363d59fb687c94fe39303585846d5f83ca3
                                                          • Instruction ID: 1d01f4d71343a29bb4aa95fd38a7a5e0c57611fc1106baa80d2db185597ffbe9
                                                          • Opcode Fuzzy Hash: ca2fbf771f1c1baded5cafbc2687f363d59fb687c94fe39303585846d5f83ca3
                                                          • Instruction Fuzzy Hash: E251C471A00210AFDB10EF64D886F6A77E5AB85718F088458F915AF3D3D771ED418BE1
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                          • String ID:
                                                          • API String ID: 292994002-0
                                                          • Opcode ID: beec997e983ec09cdd3c9f6a40081d079dbd57c2befb68d58e3053ead22673e0
                                                          • Instruction ID: e653010dc79e75153959f81ecc6a9bb409fbded4bf4a20731a52360bdaa5198f
                                                          • Opcode Fuzzy Hash: beec997e983ec09cdd3c9f6a40081d079dbd57c2befb68d58e3053ead22673e0
                                                          • Instruction Fuzzy Hash: FB21AE317402109FD7208F2ACC94B6A7BE5EF85365F19A068F84A9B351DB71EC42CB90
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                          • API String ID: 0-1546025612
                                                          • Opcode ID: dbcc6a2a295c7cdfa71b8c08855c8e5d7ed0ebc2f5eebefc7007427ffed2ca09
                                                          • Instruction ID: c66a190d6646d906982b14b7623c9a2c97bd127dbd91a04f4d5ed317fcf90783
                                                          • Opcode Fuzzy Hash: dbcc6a2a295c7cdfa71b8c08855c8e5d7ed0ebc2f5eebefc7007427ffed2ca09
                                                          • Instruction Fuzzy Hash: EDA2CE70E0025ACBDF25CF59C8407AEB7B5FF55314F2585AAE816AB281EB349D81CF90
                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 00A2A6AC
                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 00A2A6BA
                                                            • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                          • Process32NextW.KERNEL32(00000000,?), ref: 00A2A79C
                                                          • CloseHandle.KERNEL32(00000000), ref: 00A2A7AB
                                                            • Part of subcall function 009BCE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,009E3303,?), ref: 009BCE8A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                          • String ID:
                                                          • API String ID: 1991900642-0
                                                          • Opcode ID: 5d2fcb16a51de7946feb2295064f5beb56744e83c7c5d8e260d4d4900a8cb264
                                                          • Instruction ID: 984adfd68e1207903e9b1e6ef50874ac1b64f5d51d5446f2b5d347689e0c83a6
                                                          • Opcode Fuzzy Hash: 5d2fcb16a51de7946feb2295064f5beb56744e83c7c5d8e260d4d4900a8cb264
                                                          • Instruction Fuzzy Hash: F1514EB15083109FD710EF28D886A6BBBE8FFC9754F00892DF59997251EB30D905CB92
                                                          APIs
                                                          • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 00A0AAAC
                                                          • SetKeyboardState.USER32(00000080), ref: 00A0AAC8
                                                          • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 00A0AB36
                                                          • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 00A0AB88
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: 966ce58603ba5164ff5e299ce7842ef0464d18c7e96875cb2adfc651ab9565ae
                                                          • Instruction ID: e59b39205540de2a4617ed65622e397f60c08be6b9f0d392f81928ecf1214bca
                                                          • Opcode Fuzzy Hash: 966ce58603ba5164ff5e299ce7842ef0464d18c7e96875cb2adfc651ab9565ae
                                                          • Instruction Fuzzy Hash: AD311431A4030CAEFB35CB68EC05BFA7BA6EB66320F04421AF085961D1D374CD81C762
                                                          APIs
                                                          • _free.LIBCMT ref: 009DBB7F
                                                            • Part of subcall function 009D29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,009DD7D1,00000000,00000000,00000000,00000000,?,009DD7F8,00000000,00000007,00000000,?,009DDBF5,00000000), ref: 009D29DE
                                                            • Part of subcall function 009D29C8: GetLastError.KERNEL32(00000000,?,009DD7D1,00000000,00000000,00000000,00000000,?,009DD7F8,00000000,00000007,00000000,?,009DDBF5,00000000,00000000), ref: 009D29F0
                                                          • GetTimeZoneInformation.KERNEL32 ref: 009DBB91
                                                          • WideCharToMultiByte.KERNEL32(00000000,?,00A7121C,000000FF,?,0000003F,?,?), ref: 009DBC09
                                                          • WideCharToMultiByte.KERNEL32(00000000,?,00A71270,000000FF,?,0000003F,?,?,?,00A7121C,000000FF,?,0000003F,?,?), ref: 009DBC36
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                                          • String ID:
                                                          • API String ID: 806657224-0
                                                          • Opcode ID: 50577ea9e2528bf825a864e02a0389d7466af2ce37e41e26a2755b732aeed5ed
                                                          • Instruction ID: 8584ba4eb17499a83ca3044a92f664bbc26798738beb550b9a43a7508f1e3b56
                                                          • Opcode Fuzzy Hash: 50577ea9e2528bf825a864e02a0389d7466af2ce37e41e26a2755b732aeed5ed
                                                          • Instruction Fuzzy Hash: B131AD70944205EFCB10DFAC8C819A9BBF8BF55750715C6ABE054EB3A2D7309941DB90
                                                          APIs
                                                          • InternetReadFile.WININET(?,?,00000400,?), ref: 00A1CE89
                                                          • GetLastError.KERNEL32(?,00000000), ref: 00A1CEEA
                                                          • SetEvent.KERNEL32(?,?,00000000), ref: 00A1CEFE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorEventFileInternetLastRead
                                                          • String ID:
                                                          • API String ID: 234945975-0
                                                          • Opcode ID: 31272c5cb1c98eb6244011c551417c44fff78e566152fb4bd6817927cda96e83
                                                          • Instruction ID: 6a614ed4269371a947a94d580419798845d149872f8a01e0c413ceddeb3a47c1
                                                          • Opcode Fuzzy Hash: 31272c5cb1c98eb6244011c551417c44fff78e566152fb4bd6817927cda96e83
                                                          • Instruction Fuzzy Hash: 2121BAB1940305ABEB20DFA5CD48BA7B7F8EB40364F10442EE546A2191E774EE858BA4
                                                          APIs
                                                          • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00A082AA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: lstrlen
                                                          • String ID: ($|
                                                          • API String ID: 1659193697-1631851259
                                                          • Opcode ID: c2b37f730c2cf3c2c8474dd22e0447df0651615e6477f3d92a204b91166f619c
                                                          • Instruction ID: 3e381d33d1fa40295c340a064c8a7fa32d4c469cdcf6ca318a6b6d8f9a4d97e1
                                                          • Opcode Fuzzy Hash: c2b37f730c2cf3c2c8474dd22e0447df0651615e6477f3d92a204b91166f619c
                                                          • Instruction Fuzzy Hash: B1323675A007059FCB28CF29D481AAAB7F0FF48710B15C56EE49ADB3A1EB74E941CB44
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00A15CC1
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00A15D17
                                                          • FindClose.KERNEL32(?), ref: 00A15D5F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Find$File$CloseFirstNext
                                                          • String ID:
                                                          • API String ID: 3541575487-0
                                                          • Opcode ID: 0617fb6e00ddf780f626c1e86828d0ffbc41b8c872ae2f46c43be4e902795a98
                                                          • Instruction ID: d97af6cbbe38e2781ceb2a02ec6bf43ab031b6436c275ea4d8ceb75f3215ec98
                                                          • Opcode Fuzzy Hash: 0617fb6e00ddf780f626c1e86828d0ffbc41b8c872ae2f46c43be4e902795a98
                                                          • Instruction Fuzzy Hash: CB51AA74A04A01DFC714DF28D894E96B7E4FF8A324F14855DE95A8B3A1DB30EC44CB91
                                                          APIs
                                                          • IsDebuggerPresent.KERNEL32 ref: 009D271A
                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 009D2724
                                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 009D2731
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                          • String ID:
                                                          • API String ID: 3906539128-0
                                                          • Opcode ID: 7c4022414215571501e1be5ed9dfc06021201108777eb1a101290d18135197a2
                                                          • Instruction ID: 053b98b6c3f70eb9fde3ceabf805967b5cd1dede840f8d070476b0886706e2ef
                                                          • Opcode Fuzzy Hash: 7c4022414215571501e1be5ed9dfc06021201108777eb1a101290d18135197a2
                                                          • Instruction Fuzzy Hash: 5131F57094121CABCB21DF64DC88BDCBBB8AF48310F5041EAE81CA7261E7349F818F45
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 00A151DA
                                                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00A15238
                                                          • SetErrorMode.KERNEL32(00000000), ref: 00A152A1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DiskFreeSpace
                                                          • String ID:
                                                          • API String ID: 1682464887-0
                                                          • Opcode ID: 784c40b96facff827d5ae398d4ba9394c753600ee79c8fb0b3d3626f4bab7b0d
                                                          • Instruction ID: efa15d4c4194ad83e83e8cc00757dacb923848c9174bbdeee11a1d41ca0c33dd
                                                          • Opcode Fuzzy Hash: 784c40b96facff827d5ae398d4ba9394c753600ee79c8fb0b3d3626f4bab7b0d
                                                          • Instruction Fuzzy Hash: AE312975A00518DFDB00DFA4D884EEDBBB5FF49314F088099E805AB3A2DB35E856CB90
                                                          APIs
                                                            • Part of subcall function 009BFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 009C0668
                                                            • Part of subcall function 009BFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 009C0685
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00A0170D
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00A0173A
                                                          • GetLastError.KERNEL32 ref: 00A0174A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                          • String ID:
                                                          • API String ID: 577356006-0
                                                          • Opcode ID: de91af480ba8ca9686e263cacf9752b2d2ff379fdec39f50fcc4711943460a3c
                                                          • Instruction ID: 990d4f4beb90e4dcacf52938e545757f1495fb88ce175dbfcca614e3f64ed1dd
                                                          • Opcode Fuzzy Hash: de91af480ba8ca9686e263cacf9752b2d2ff379fdec39f50fcc4711943460a3c
                                                          • Instruction Fuzzy Hash: 471191B2504308AFD718DF54ED86EAAB7B9EB44724B20852EF05657681EB70FC418B60
                                                          APIs
                                                          • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00A0D608
                                                          • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00A0D645
                                                          • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00A0D650
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseControlCreateDeviceFileHandle
                                                          • String ID:
                                                          • API String ID: 33631002-0
                                                          • Opcode ID: 1aba454cb4b8a5bb6b898a03a20a452fc2e5264069d1ac5abf16dedede7f283b
                                                          • Instruction ID: 0ad8b11741520c3af70d218f9b26003ba8276a8d2536c799b3e51333396f6d3b
                                                          • Opcode Fuzzy Hash: 1aba454cb4b8a5bb6b898a03a20a452fc2e5264069d1ac5abf16dedede7f283b
                                                          • Instruction Fuzzy Hash: 8E113C76E05228BBDB108FD5AC45FAFBBBCEB45B60F108115F904E7290D6704A058BA1
                                                          APIs
                                                          • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00A0168C
                                                          • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00A016A1
                                                          • FreeSid.ADVAPI32(?), ref: 00A016B1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: AllocateCheckFreeInitializeMembershipToken
                                                          • String ID:
                                                          • API String ID: 3429775523-0
                                                          • Opcode ID: 68b9d3083409c0f96ad7e02c7af9bd78994d7fd9aed22485748d66640c5499c4
                                                          • Instruction ID: 3b8a1a6e53f1950157a4a730411488f7b80b1ac89f9f9263c7891368192bc28d
                                                          • Opcode Fuzzy Hash: 68b9d3083409c0f96ad7e02c7af9bd78994d7fd9aed22485748d66640c5499c4
                                                          • Instruction Fuzzy Hash: CEF0F47195030DFBDB00DFE49D89AAEBBBCEB08714F504565E501E2181E774AA448B50
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(009D28E9,?,009C4CBE,009D28E9,00A688B8,0000000C,009C4E15,009D28E9,00000002,00000000,?,009D28E9), ref: 009C4D09
                                                          • TerminateProcess.KERNEL32(00000000,?,009C4CBE,009D28E9,00A688B8,0000000C,009C4E15,009D28E9,00000002,00000000,?,009D28E9), ref: 009C4D10
                                                          • ExitProcess.KERNEL32 ref: 009C4D22
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$CurrentExitTerminate
                                                          • String ID:
                                                          • API String ID: 1703294689-0
                                                          • Opcode ID: f6563768f49ea9d41b7744f1edd115b52c05a6bb726b38d86f8699a3fc148c61
                                                          • Instruction ID: d7571cdfb447ad270d7a7c2855d904c8b2de453bb3480310984f80a65afa4c59
                                                          • Opcode Fuzzy Hash: f6563768f49ea9d41b7744f1edd115b52c05a6bb726b38d86f8699a3fc148c61
                                                          • Instruction Fuzzy Hash: CDE0B631500148ABCF11BFA4DE1AF987B69EB817A1B108418FC0A9A262CB35ED52DB81
                                                          APIs
                                                          • GetUserNameW.ADVAPI32(?,?), ref: 009FD28C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: NameUser
                                                          • String ID: X64
                                                          • API String ID: 2645101109-893830106
                                                          • Opcode ID: f5f988d883b73c5ec084b926cb5cb27cdcfaffbe87b366c894d1ef029e257814
                                                          • Instruction ID: 302d3e8bce339a8cbda9b54a651f02c781d17a174ee9a53e26a104e0c8bfea9e
                                                          • Opcode Fuzzy Hash: f5f988d883b73c5ec084b926cb5cb27cdcfaffbe87b366c894d1ef029e257814
                                                          • Instruction Fuzzy Hash: C6D0C9B480212DEACB94DB90DC88DD9B37CBB04325F100551F106B2000D73495498F10
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                          • Instruction ID: b5c6f6186e097b494e0b00dd9ad242803e1a173a276c891d0f0e06b5d3461562
                                                          • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                          • Instruction Fuzzy Hash: 66021CB1E002199BDF14CFA9C880BADBBF5EF88314F25456DD819E7380D731AE418B95
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00A16918
                                                          • FindClose.KERNEL32(00000000), ref: 00A16961
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Find$CloseFileFirst
                                                          • String ID:
                                                          • API String ID: 2295610775-0
                                                          • Opcode ID: 50708f3753a27822670c245836b646e6ce359edf63f810050cc36c8c22c54e22
                                                          • Instruction ID: d08acd712b0336f343776fc7c97d800d7a300b234da2eda47431e3c5db0e02f5
                                                          • Opcode Fuzzy Hash: 50708f3753a27822670c245836b646e6ce359edf63f810050cc36c8c22c54e22
                                                          • Instruction Fuzzy Hash: 88118E716042109FC710DF69D885A56BBE5EF85328F14C699F8698F2A2C730EC45CBD1
                                                          APIs
                                                          • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00A24891,?,?,00000035,?), ref: 00A137E4
                                                          • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00A24891,?,?,00000035,?), ref: 00A137F4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorFormatLastMessage
                                                          • String ID:
                                                          • API String ID: 3479602957-0
                                                          • Opcode ID: c50c0a5a651b0475dbf00d099ee1610aaf5bf5c1540fd199f7d486dbb8a2b72e
                                                          • Instruction ID: d079a6a7022c7dd074ca72070626d4aa4ccb84960dbe4a5e99a9529657562cf3
                                                          • Opcode Fuzzy Hash: c50c0a5a651b0475dbf00d099ee1610aaf5bf5c1540fd199f7d486dbb8a2b72e
                                                          • Instruction Fuzzy Hash: D1F0E5B16043282AEB20A7A68C4DFEB7AAEEFC5771F000175F509E22C1DA609D44C7F0
                                                          APIs
                                                          • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00A0B25D
                                                          • keybd_event.USER32(?,75C0C0D0,?,00000000), ref: 00A0B270
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: InputSendkeybd_event
                                                          • String ID:
                                                          • API String ID: 3536248340-0
                                                          • Opcode ID: 4e114266e5ad10ae8a5ba954ad567174babcefd9822eef2c1d6255754a07fd50
                                                          • Instruction ID: df3761734c60ba6a9177c7de0c5a948f39ad9a08912d71d35d39ea1f1bf57f95
                                                          • Opcode Fuzzy Hash: 4e114266e5ad10ae8a5ba954ad567174babcefd9822eef2c1d6255754a07fd50
                                                          • Instruction Fuzzy Hash: A9F01D7185424DABDB05DFA0DC05BEE7BB4FF08315F00800AF955A5191C37986119FA4
                                                          APIs
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00A011FC), ref: 00A010D4
                                                          • CloseHandle.KERNEL32(?,?,00A011FC), ref: 00A010E9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: AdjustCloseHandlePrivilegesToken
                                                          • String ID:
                                                          • API String ID: 81990902-0
                                                          • Opcode ID: af3f608a9bffa3e4464c0ef9e0f4ca62fea9832f95ac349a44e60cb525951639
                                                          • Instruction ID: ea48c13a0ea0cdbcbf3034c2e552d876c05c41d21e412abcd878948f3e59e133
                                                          • Opcode Fuzzy Hash: af3f608a9bffa3e4464c0ef9e0f4ca62fea9832f95ac349a44e60cb525951639
                                                          • Instruction Fuzzy Hash: C1E04F32004600AEE7252B51FD05FB377E9EB04320F10882DF4A5804B1DB62ACA0DB10
                                                          Strings
                                                          • Variable is not of type 'Object'., xrefs: 009F0C40
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Variable is not of type 'Object'.
                                                          • API String ID: 0-1840281001
                                                          • Opcode ID: bc2c4d8a1a50fc4509af68071292035a88d853687c75f8fbd1eb4123a0efad33
                                                          • Instruction ID: 50066d96f364867249af2f58549999d90e64b78a6b44d6c3c8ac1f6ac4ca3f7b
                                                          • Opcode Fuzzy Hash: bc2c4d8a1a50fc4509af68071292035a88d853687c75f8fbd1eb4123a0efad33
                                                          • Instruction Fuzzy Hash: A5326AB0900218DFCF14DF94C985BEDB7B9BF86318F248459E906AF292D735AD45CBA0
                                                          APIs
                                                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,009D6766,?,?,00000008,?,?,009DFEFE,00000000), ref: 009D6998
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ExceptionRaise
                                                          • String ID:
                                                          • API String ID: 3997070919-0
                                                          • Opcode ID: e5445e6277fa9926067ba9598e2558cc684087368c27a30f23054de9b2757719
                                                          • Instruction ID: 19a6281461b583783f89cca6cfd6e9e614dc6137faff2b5e1ec5dcc6188b4346
                                                          • Opcode Fuzzy Hash: e5445e6277fa9926067ba9598e2558cc684087368c27a30f23054de9b2757719
                                                          • Instruction Fuzzy Hash: 9AB128316506099FD719CF28C48AB657BA0FF45364F29C65AE8D9CF3A2C339E991CB40
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID: 0-3916222277
                                                          • Opcode ID: 85120841eb21ba4af2b407a7766e7849edf8de168080a56a1a651014bb78b655
                                                          • Instruction ID: f639fa57e503205eb3f6082718789a415e5b059e15c30c53b09c195b43b5c66f
                                                          • Opcode Fuzzy Hash: 85120841eb21ba4af2b407a7766e7849edf8de168080a56a1a651014bb78b655
                                                          • Instruction Fuzzy Hash: 8A126E759002299FCB64CF58C9807FEB7F5FF48710F14819AE949EB291EB749A81CB90
                                                          APIs
                                                          • BlockInput.USER32(00000001), ref: 00A1EABD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: BlockInput
                                                          • String ID:
                                                          • API String ID: 3456056419-0
                                                          • Opcode ID: 516212c2b8d43f0c25ebc0f829ab12d123075fa1e0d3fff7d02cdd3a54a55984
                                                          • Instruction ID: 5c437e36eefc2f86cb3df6c74432c8b7469d39deb408dabf4af411dfbbda3c0d
                                                          • Opcode Fuzzy Hash: 516212c2b8d43f0c25ebc0f829ab12d123075fa1e0d3fff7d02cdd3a54a55984
                                                          • Instruction Fuzzy Hash: AFE04F322002049FC710EF69D905E9AF7E9AF997B0F008416FC4ADB351DB70E8818BD1
                                                          APIs
                                                          • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,009C03EE), ref: 009C09DA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled
                                                          • String ID:
                                                          • API String ID: 3192549508-0
                                                          • Opcode ID: bb209b28b143d14d7cde1bb5549ae2e85604e5a83c9e587f6e65e1438f51c890
                                                          • Instruction ID: 76c551e81fa9f2946658618857f992fae52031b1fa563635d05775ffdc163e0e
                                                          • Opcode Fuzzy Hash: bb209b28b143d14d7cde1bb5549ae2e85604e5a83c9e587f6e65e1438f51c890
                                                          • Instruction Fuzzy Hash:
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 0
                                                          • API String ID: 0-4108050209
                                                          • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                          • Instruction ID: 71780cd517b49e42927a0beda88b27cbd10a7fad76c105791b463e5ab0de6505
                                                          • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                          • Instruction Fuzzy Hash: 09516961E0C6056BDF3885E888D9FBFE79D9B52340F18090DEA82D7282C625DE01DF53
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d5bb2cb182f96c97a41577abe011bd9185a3a19a917dbad224dfef993e7c58bb
                                                          • Instruction ID: 9d701cf5c12ac8b0ef5c90c330841461b294e9ad47d03d2e039e0077d393924d
                                                          • Opcode Fuzzy Hash: d5bb2cb182f96c97a41577abe011bd9185a3a19a917dbad224dfef993e7c58bb
                                                          • Instruction Fuzzy Hash: FF32322AD68F014DD7239674D822335A64DAFF73C5F55C737F81AB5AA6EB2AC4834200
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e45d454b110f159f15a8681d732f2593279d7d7856c9492de00f5643939e4491
                                                          • Instruction ID: bac3c325f770df3fa4ed1a75ddded7cd2b7d21eb5a63ea1925ccc78ebdc2d466
                                                          • Opcode Fuzzy Hash: e45d454b110f159f15a8681d732f2593279d7d7856c9492de00f5643939e4491
                                                          • Instruction Fuzzy Hash: 8D3239F2A0410D8BDF28CF28C6906BD7BA5EB45311F28C96AD69ADB295D334DD81DB40
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 3d2f45e8c9a3cc39d55d00b30bbe12ba0b685d34c8117551bcf0441b4518984b
                                                          • Instruction ID: 3fd18455c3f28f5d7faac266b6a4d89bc577e1a186a74ed1d1e802d9fc23bd6c
                                                          • Opcode Fuzzy Hash: 3d2f45e8c9a3cc39d55d00b30bbe12ba0b685d34c8117551bcf0441b4518984b
                                                          • Instruction Fuzzy Hash: CC22A0B0A0460AEFDF14CFA5C982BAEF3B5FF45304F104529E816A7291EB399D11CB90
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 654106b5f7822088b084251e42f91319af516cf3ff9213f5226759ef91841d83
                                                          • Instruction ID: 8c24d5093cb75de24a48fbb15d4f841bd8c3664da2e8423cd5128e6a2ca904a7
                                                          • Opcode Fuzzy Hash: 654106b5f7822088b084251e42f91319af516cf3ff9213f5226759ef91841d83
                                                          • Instruction Fuzzy Hash: A602B3B1E0010AEBCF05DF65D981BAEB7B5FF44300F208569E8169B291EB35AE11CBD1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ffaf96e827c5e95b8aae9944efad0de9cecb51e5347f5343f43f65a70e785e1c
                                                          • Instruction ID: e51cb4556219649c54a2dfd881a73e431ab8ec302088ff828b55a729f82aacf7
                                                          • Opcode Fuzzy Hash: ffaf96e827c5e95b8aae9944efad0de9cecb51e5347f5343f43f65a70e785e1c
                                                          • Instruction Fuzzy Hash: A5B10329D2AF414DC7239A398831336B65CAFFB6D5F51D71BFC2678D22EB2296834140
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                          • Instruction ID: b5e2df07672110819022d441fcbc0d212051efc2ab2ea840c1544feefc21e720
                                                          • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                          • Instruction Fuzzy Hash: C09199729080A34ADB2D463E8574A3DFFE55A533A131A079DE4F3CB1C2FE24C964D625
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                          • Instruction ID: 40a34194e21b1035b22f3ee0d887f1fd68069954147deddf1415a6c6b042a0fd
                                                          • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                          • Instruction Fuzzy Hash: FB91C932A090E34EDB2D427A847493DFFE54A933A1319079DD4F2CA1C7FD24CA64DA25
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: f50710b0374cc4058883857c636dd98fd51f8094d73d1b316f9fcb32888f5f15
                                                          • Instruction ID: 55c66f5e026ecaa1493d4a43c21e0a11ffbda25878e3410f005ee5622fac5dc9
                                                          • Opcode Fuzzy Hash: f50710b0374cc4058883857c636dd98fd51f8094d73d1b316f9fcb32888f5f15
                                                          • Instruction Fuzzy Hash: 6D615871E4870967DB349AE88995FBFE39CDF81710F100D1EE882DB281D6159E428F17
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 93b8afa9fccf412d1056dd66e786b8226ee43d6d29a65661ec2ac74e0946eda8
                                                          • Instruction ID: e6d7b5fff039e736fbfa7ccef868e63d8aa918a983e4f6ab260f0eef46cc2e54
                                                          • Opcode Fuzzy Hash: 93b8afa9fccf412d1056dd66e786b8226ee43d6d29a65661ec2ac74e0946eda8
                                                          • Instruction Fuzzy Hash: E4616932E0870967DA385AE84856FBFE39CAF82740F100D5DE843CB2D1D6159D42CE57
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                          • Instruction ID: 4f487661bc97215155fad7f049daba6dace57028acf66838e334ad76dbc5750b
                                                          • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                          • Instruction Fuzzy Hash: 0F81887690C0A34ADB2D42398534A3EFFE55E933A131A079ED4F2CB1C3EE24C654E625
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 6840c909bbc6c4d87ca249d0c9c3db13d5ea77c1221b346cc4fc683f0c2c52e9
                                                          • Instruction ID: bc06f2b23f61bac633d92f11eb999771b8e766f1d292785f29d09116f075b877
                                                          • Opcode Fuzzy Hash: 6840c909bbc6c4d87ca249d0c9c3db13d5ea77c1221b346cc4fc683f0c2c52e9
                                                          • Instruction Fuzzy Hash: D82193326206118BD728CF79C8227BA73E5E754310F15862EE4A7C37D1DE39AD44CB80
                                                          APIs
                                                          • DeleteObject.GDI32(00000000), ref: 00A22B30
                                                          • DeleteObject.GDI32(00000000), ref: 00A22B43
                                                          • DestroyWindow.USER32 ref: 00A22B52
                                                          • GetDesktopWindow.USER32 ref: 00A22B6D
                                                          • GetWindowRect.USER32(00000000), ref: 00A22B74
                                                          • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00A22CA3
                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00A22CB1
                                                          • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A22CF8
                                                          • GetClientRect.USER32(00000000,?), ref: 00A22D04
                                                          • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00A22D40
                                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A22D62
                                                          • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A22D75
                                                          • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A22D80
                                                          • GlobalLock.KERNEL32(00000000), ref: 00A22D89
                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A22D98
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00A22DA1
                                                          • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A22DA8
                                                          • GlobalFree.KERNEL32(00000000), ref: 00A22DB3
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A22DC5
                                                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,00A3FC38,00000000), ref: 00A22DDB
                                                          • GlobalFree.KERNEL32(00000000), ref: 00A22DEB
                                                          • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00A22E11
                                                          • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00A22E30
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A22E52
                                                          • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A2303F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                          • String ID: $AutoIt v3$DISPLAY$static
                                                          • API String ID: 2211948467-2373415609
                                                          • Opcode ID: b1089d1edf20a57d4adee477c77c18a5a79e24ca996226b5ae57fdb29a43c6b7
                                                          • Instruction ID: 466a2ed8d354e4e964197a58a7ffcafa0fd8426e2f6c8b28b17a45af39a2928e
                                                          • Opcode Fuzzy Hash: b1089d1edf20a57d4adee477c77c18a5a79e24ca996226b5ae57fdb29a43c6b7
                                                          • Instruction Fuzzy Hash: EA027C75A00214AFDB14DFA8DD89EAE7BB9FF49320F048158F915AB2A1D774AD01CB60
                                                          APIs
                                                          • SetTextColor.GDI32(?,00000000), ref: 00A3712F
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00A37160
                                                          • GetSysColor.USER32(0000000F), ref: 00A3716C
                                                          • SetBkColor.GDI32(?,000000FF), ref: 00A37186
                                                          • SelectObject.GDI32(?,?), ref: 00A37195
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 00A371C0
                                                          • GetSysColor.USER32(00000010), ref: 00A371C8
                                                          • CreateSolidBrush.GDI32(00000000), ref: 00A371CF
                                                          • FrameRect.USER32(?,?,00000000), ref: 00A371DE
                                                          • DeleteObject.GDI32(00000000), ref: 00A371E5
                                                          • InflateRect.USER32(?,000000FE,000000FE), ref: 00A37230
                                                          • FillRect.USER32(?,?,?), ref: 00A37262
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00A37284
                                                            • Part of subcall function 00A373E8: GetSysColor.USER32(00000012), ref: 00A37421
                                                            • Part of subcall function 00A373E8: SetTextColor.GDI32(?,?), ref: 00A37425
                                                            • Part of subcall function 00A373E8: GetSysColorBrush.USER32(0000000F), ref: 00A3743B
                                                            • Part of subcall function 00A373E8: GetSysColor.USER32(0000000F), ref: 00A37446
                                                            • Part of subcall function 00A373E8: GetSysColor.USER32(00000011), ref: 00A37463
                                                            • Part of subcall function 00A373E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00A37471
                                                            • Part of subcall function 00A373E8: SelectObject.GDI32(?,00000000), ref: 00A37482
                                                            • Part of subcall function 00A373E8: SetBkColor.GDI32(?,00000000), ref: 00A3748B
                                                            • Part of subcall function 00A373E8: SelectObject.GDI32(?,?), ref: 00A37498
                                                            • Part of subcall function 00A373E8: InflateRect.USER32(?,000000FF,000000FF), ref: 00A374B7
                                                            • Part of subcall function 00A373E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00A374CE
                                                            • Part of subcall function 00A373E8: GetWindowLongW.USER32(00000000,000000F0), ref: 00A374DB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                          • String ID:
                                                          • API String ID: 4124339563-0
                                                          • Opcode ID: 1c0518b18ad951c95810b83b3bd854d47405d32f8501059674e5c10f991cda61
                                                          • Instruction ID: 6890191eeee746d7da4fcb9bb3505a74a8bc393d5db4d3e4478039c003a76baf
                                                          • Opcode Fuzzy Hash: 1c0518b18ad951c95810b83b3bd854d47405d32f8501059674e5c10f991cda61
                                                          • Instruction Fuzzy Hash: 3EA19EB2008301AFDB10DFA0DC48A6FBBA9FB89331F100B19F962A61E1D771E945DB51
                                                          APIs
                                                          • DestroyWindow.USER32(?,?), ref: 009B8E14
                                                          • SendMessageW.USER32(?,00001308,?,00000000), ref: 009F6AC5
                                                          • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 009F6AFE
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 009F6F43
                                                            • Part of subcall function 009B8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,009B8BE8,?,00000000,?,?,?,?,009B8BBA,00000000,?), ref: 009B8FC5
                                                          • SendMessageW.USER32(?,00001053), ref: 009F6F7F
                                                          • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 009F6F96
                                                          • ImageList_Destroy.COMCTL32(00000000,?), ref: 009F6FAC
                                                          • ImageList_Destroy.COMCTL32(00000000,?), ref: 009F6FB7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                          • String ID: 0
                                                          • API String ID: 2760611726-4108050209
                                                          • Opcode ID: 31a040479e00223cb4b9daa20661053d947707c81f8e76b6b46123bf1f4c757e
                                                          • Instruction ID: 29dc458b450908a947afebf5b6381be04a23e546d168274576ea4d75b755252a
                                                          • Opcode Fuzzy Hash: 31a040479e00223cb4b9daa20661053d947707c81f8e76b6b46123bf1f4c757e
                                                          • Instruction Fuzzy Hash: 2312AC31204205DFDB25DF28CD44BB6B7E9FB49320F148469F6899B261CB35EC92DB91
                                                          APIs
                                                          • DestroyWindow.USER32(00000000), ref: 00A2273E
                                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00A2286A
                                                          • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 00A228A9
                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00A228B9
                                                          • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00A22900
                                                          • GetClientRect.USER32(00000000,?), ref: 00A2290C
                                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00A22955
                                                          • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00A22964
                                                          • GetStockObject.GDI32(00000011), ref: 00A22974
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00A22978
                                                          • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00A22988
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00A22991
                                                          • DeleteDC.GDI32(00000000), ref: 00A2299A
                                                          • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00A229C6
                                                          • SendMessageW.USER32(00000030,00000000,00000001), ref: 00A229DD
                                                          • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00A22A1D
                                                          • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00A22A31
                                                          • SendMessageW.USER32(00000404,00000001,00000000), ref: 00A22A42
                                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00A22A77
                                                          • GetStockObject.GDI32(00000011), ref: 00A22A82
                                                          • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00A22A8D
                                                          • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00A22A97
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                          • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                          • API String ID: 2910397461-517079104
                                                          • Opcode ID: 725de93e29c5cd4e9d539dc1fe3e699e6fa5da0777fd6ca0cf6f69419c6b206a
                                                          • Instruction ID: 43cd24659539f723a907a06863d3ca90495e54564210b7c5f9c81ade36cca6cf
                                                          • Opcode Fuzzy Hash: 725de93e29c5cd4e9d539dc1fe3e699e6fa5da0777fd6ca0cf6f69419c6b206a
                                                          • Instruction Fuzzy Hash: 9FB15B71A40215BFEB14DFA8DC8AFAE7BA9EB49710F008114F915EB291D774ED41CBA0
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 00A14AED
                                                          • GetDriveTypeW.KERNEL32(?,00A3CB68,?,\\.\,00A3CC08), ref: 00A14BCA
                                                          • SetErrorMode.KERNEL32(00000000,00A3CB68,?,\\.\,00A3CC08), ref: 00A14D36
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DriveType
                                                          • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                          • API String ID: 2907320926-4222207086
                                                          • Opcode ID: a888bbde36d938feb293e7f620b8391f9d73610081084c9faa833b3ad66e21e7
                                                          • Instruction ID: 559431475b3ed5fe4343c55af9714d38365cc03215e0ea245ed90d2e0e2f28a9
                                                          • Opcode Fuzzy Hash: a888bbde36d938feb293e7f620b8391f9d73610081084c9faa833b3ad66e21e7
                                                          • Instruction Fuzzy Hash: 9E617F30705505EBCB04DF6CCA82DE9B7B1BB8E744B248415F806AB691DB36ED81DBC1
                                                          APIs
                                                          • GetSysColor.USER32(00000012), ref: 00A37421
                                                          • SetTextColor.GDI32(?,?), ref: 00A37425
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00A3743B
                                                          • GetSysColor.USER32(0000000F), ref: 00A37446
                                                          • CreateSolidBrush.GDI32(?), ref: 00A3744B
                                                          • GetSysColor.USER32(00000011), ref: 00A37463
                                                          • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00A37471
                                                          • SelectObject.GDI32(?,00000000), ref: 00A37482
                                                          • SetBkColor.GDI32(?,00000000), ref: 00A3748B
                                                          • SelectObject.GDI32(?,?), ref: 00A37498
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 00A374B7
                                                          • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00A374CE
                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00A374DB
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00A3752A
                                                          • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00A37554
                                                          • InflateRect.USER32(?,000000FD,000000FD), ref: 00A37572
                                                          • DrawFocusRect.USER32(?,?), ref: 00A3757D
                                                          • GetSysColor.USER32(00000011), ref: 00A3758E
                                                          • SetTextColor.GDI32(?,00000000), ref: 00A37596
                                                          • DrawTextW.USER32(?,00A370F5,000000FF,?,00000000), ref: 00A375A8
                                                          • SelectObject.GDI32(?,?), ref: 00A375BF
                                                          • DeleteObject.GDI32(?), ref: 00A375CA
                                                          • SelectObject.GDI32(?,?), ref: 00A375D0
                                                          • DeleteObject.GDI32(?), ref: 00A375D5
                                                          • SetTextColor.GDI32(?,?), ref: 00A375DB
                                                          • SetBkColor.GDI32(?,?), ref: 00A375E5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                          • String ID:
                                                          • API String ID: 1996641542-0
                                                          • Opcode ID: 3cb2ef98f20cb2c0595f35076470b3339f77c414237f0159e33b4d80cfaaee07
                                                          • Instruction ID: f45aade9f90a4006614004b925ad73e0aadd9eab23afb60c9fec3851c7ccaaf9
                                                          • Opcode Fuzzy Hash: 3cb2ef98f20cb2c0595f35076470b3339f77c414237f0159e33b4d80cfaaee07
                                                          • Instruction Fuzzy Hash: BC615972900218AFDF11DFA4EC49EAEBFB9EB08330F114215F915BB2A1D775A941DB90
                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 00A31128
                                                          • GetDesktopWindow.USER32 ref: 00A3113D
                                                          • GetWindowRect.USER32(00000000), ref: 00A31144
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00A31199
                                                          • DestroyWindow.USER32(?), ref: 00A311B9
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00A311ED
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00A3120B
                                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00A3121D
                                                          • SendMessageW.USER32(00000000,00000421,?,?), ref: 00A31232
                                                          • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00A31245
                                                          • IsWindowVisible.USER32(00000000), ref: 00A312A1
                                                          • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 00A312BC
                                                          • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 00A312D0
                                                          • GetWindowRect.USER32(00000000,?), ref: 00A312E8
                                                          • MonitorFromPoint.USER32(?,?,00000002), ref: 00A3130E
                                                          • GetMonitorInfoW.USER32(00000000,?), ref: 00A31328
                                                          • CopyRect.USER32(?,?), ref: 00A3133F
                                                          • SendMessageW.USER32(00000000,00000412,00000000), ref: 00A313AA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                          • String ID: ($0$tooltips_class32
                                                          • API String ID: 698492251-4156429822
                                                          • Opcode ID: 5be07c46b937f60260521cd895cac42e2217eaa484f45dca766418165ab1514a
                                                          • Instruction ID: 9e9294daa584b1bf34e5adcdbcc52140961b3b272f2d9082c11299e9005f6a3d
                                                          • Opcode Fuzzy Hash: 5be07c46b937f60260521cd895cac42e2217eaa484f45dca766418165ab1514a
                                                          • Instruction Fuzzy Hash: 4EB18B71608341AFD744DF64CC85BAABBE4FF85350F00891CF999AB2A1C731E845CB91
                                                          APIs
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 009B8968
                                                          • GetSystemMetrics.USER32(00000007), ref: 009B8970
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 009B899B
                                                          • GetSystemMetrics.USER32(00000008), ref: 009B89A3
                                                          • GetSystemMetrics.USER32(00000004), ref: 009B89C8
                                                          • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 009B89E5
                                                          • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 009B89F5
                                                          • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 009B8A28
                                                          • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 009B8A3C
                                                          • GetClientRect.USER32(00000000,000000FF), ref: 009B8A5A
                                                          • GetStockObject.GDI32(00000011), ref: 009B8A76
                                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 009B8A81
                                                            • Part of subcall function 009B912D: GetCursorPos.USER32(?), ref: 009B9141
                                                            • Part of subcall function 009B912D: ScreenToClient.USER32(00000000,?), ref: 009B915E
                                                            • Part of subcall function 009B912D: GetAsyncKeyState.USER32(00000001), ref: 009B9183
                                                            • Part of subcall function 009B912D: GetAsyncKeyState.USER32(00000002), ref: 009B919D
                                                          • SetTimer.USER32(00000000,00000000,00000028,009B90FC), ref: 009B8AA8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                          • String ID: AutoIt v3 GUI
                                                          • API String ID: 1458621304-248962490
                                                          • Opcode ID: ac194b46fe1b0d2ff64fba863db1c0bb09bafd76d4c6664c68b78fde74220e7f
                                                          • Instruction ID: 08df6c3787cef1ed08807060f941d8ddee1571416084a76f3f90f00fd0da21fc
                                                          • Opcode Fuzzy Hash: ac194b46fe1b0d2ff64fba863db1c0bb09bafd76d4c6664c68b78fde74220e7f
                                                          • Instruction Fuzzy Hash: D0B15D75A00209AFDF14DFA8DD45BEE7BB9FB48324F108229FA15A7290DB74A841CB51
                                                          APIs
                                                            • Part of subcall function 00A010F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00A01114
                                                            • Part of subcall function 00A010F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00A00B9B,?,?,?), ref: 00A01120
                                                            • Part of subcall function 00A010F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00A00B9B,?,?,?), ref: 00A0112F
                                                            • Part of subcall function 00A010F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00A00B9B,?,?,?), ref: 00A01136
                                                            • Part of subcall function 00A010F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00A0114D
                                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00A00DF5
                                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00A00E29
                                                          • GetLengthSid.ADVAPI32(?), ref: 00A00E40
                                                          • GetAce.ADVAPI32(?,00000000,?), ref: 00A00E7A
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00A00E96
                                                          • GetLengthSid.ADVAPI32(?), ref: 00A00EAD
                                                          • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00A00EB5
                                                          • HeapAlloc.KERNEL32(00000000), ref: 00A00EBC
                                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00A00EDD
                                                          • CopySid.ADVAPI32(00000000), ref: 00A00EE4
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00A00F13
                                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00A00F35
                                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00A00F47
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A00F6E
                                                          • HeapFree.KERNEL32(00000000), ref: 00A00F75
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A00F7E
                                                          • HeapFree.KERNEL32(00000000), ref: 00A00F85
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A00F8E
                                                          • HeapFree.KERNEL32(00000000), ref: 00A00F95
                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 00A00FA1
                                                          • HeapFree.KERNEL32(00000000), ref: 00A00FA8
                                                            • Part of subcall function 00A01193: GetProcessHeap.KERNEL32(00000008,00A00BB1,?,00000000,?,00A00BB1,?), ref: 00A011A1
                                                            • Part of subcall function 00A01193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00A00BB1,?), ref: 00A011A8
                                                            • Part of subcall function 00A01193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00A00BB1,?), ref: 00A011B7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                          • String ID:
                                                          • API String ID: 4175595110-0
                                                          • Opcode ID: 5d64c6741ff67626d429bd36b2b63231fce5d8cbd2550251a86061ae4a3372f9
                                                          • Instruction ID: bb6bdc94084b6de3ff058a9ee20499e73470f02e57fcdc5711738ef2e142bdbe
                                                          • Opcode Fuzzy Hash: 5d64c6741ff67626d429bd36b2b63231fce5d8cbd2550251a86061ae4a3372f9
                                                          • Instruction Fuzzy Hash: 91716A7290021AABDF20DFA4ED49FEEBBB8BF05311F044215FA59F6191D7319A06DB60
                                                          APIs
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A2C4BD
                                                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,00A3CC08,00000000,?,00000000,?,?), ref: 00A2C544
                                                          • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 00A2C5A4
                                                          • _wcslen.LIBCMT ref: 00A2C5F4
                                                          • _wcslen.LIBCMT ref: 00A2C66F
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 00A2C6B2
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 00A2C7C1
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 00A2C84D
                                                          • RegCloseKey.ADVAPI32(?), ref: 00A2C881
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00A2C88E
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 00A2C960
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                          • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                          • API String ID: 9721498-966354055
                                                          • Opcode ID: 1c9ecf5420f02747a26d05a0265e62d7000ff047edb1c5c461127e94e5fa651a
                                                          • Instruction ID: a53df75d7c518be44b53ec3dc87f971b7a01ead6b29ac0db78948c0d40a55d20
                                                          • Opcode Fuzzy Hash: 1c9ecf5420f02747a26d05a0265e62d7000ff047edb1c5c461127e94e5fa651a
                                                          • Instruction Fuzzy Hash: 851238356042119FDB14EF18D891B2EB7E5EF89724F14886CF84A9B3A2DB31ED41CB81
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?), ref: 00A309C6
                                                          • _wcslen.LIBCMT ref: 00A30A01
                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00A30A54
                                                          • _wcslen.LIBCMT ref: 00A30A8A
                                                          • _wcslen.LIBCMT ref: 00A30B06
                                                          • _wcslen.LIBCMT ref: 00A30B81
                                                            • Part of subcall function 009BF9F2: _wcslen.LIBCMT ref: 009BF9FD
                                                            • Part of subcall function 00A02BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00A02BFA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$MessageSend$BuffCharUpper
                                                          • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                          • API String ID: 1103490817-4258414348
                                                          • Opcode ID: b4df34d32c52f9dee9bf067d2142fd405462b16695d938dbcf4399d7e62fa7db
                                                          • Instruction ID: 8ca7d4fa3c17c0d2b0c47f66a72daf0d0e49aea6e66f3a5afa9cb4f3f594e910
                                                          • Opcode Fuzzy Hash: b4df34d32c52f9dee9bf067d2142fd405462b16695d938dbcf4399d7e62fa7db
                                                          • Instruction Fuzzy Hash: E5E188316083019FCB14EF24C461E2AB7E1BF99758F14895CF8969B3A2D731ED45CB81
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharUpper
                                                          • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                          • API String ID: 1256254125-909552448
                                                          • Opcode ID: 644efa0f95818e5523ad3196e9c27b534e60ad96039a8f45dbce817debfa2667
                                                          • Instruction ID: 74041d39c8c66701150a615541d20edfe976d3612887e8d0a8067a5be5596744
                                                          • Opcode Fuzzy Hash: 644efa0f95818e5523ad3196e9c27b534e60ad96039a8f45dbce817debfa2667
                                                          • Instruction Fuzzy Hash: 1671E732A1053A8BCB20DF7CED516BF33A2AFA17B4B254538F8569B284E635CD45C391
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 00A3835A
                                                          • _wcslen.LIBCMT ref: 00A3836E
                                                          • _wcslen.LIBCMT ref: 00A38391
                                                          • _wcslen.LIBCMT ref: 00A383B4
                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00A383F2
                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,00A3361A,?), ref: 00A3844E
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00A38487
                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00A384CA
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00A38501
                                                          • FreeLibrary.KERNEL32(?), ref: 00A3850D
                                                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00A3851D
                                                          • DestroyIcon.USER32(?), ref: 00A3852C
                                                          • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00A38549
                                                          • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00A38555
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                          • String ID: .dll$.exe$.icl
                                                          • API String ID: 799131459-1154884017
                                                          • Opcode ID: 718276cc7310d3b698a31cb67112638f6093a4de7f0ec27cbdbb0142dfea58ec
                                                          • Instruction ID: d6241f9758dade57683646daea973cda5118cb454f58594dfb67fab300037014
                                                          • Opcode Fuzzy Hash: 718276cc7310d3b698a31cb67112638f6093a4de7f0ec27cbdbb0142dfea58ec
                                                          • Instruction Fuzzy Hash: 8B61C171A40315BEEB14DF64DC45FBE77A8BB48B21F104609F815EA1D1DB78A981C7A0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                          • API String ID: 0-1645009161
                                                          • Opcode ID: 16035a8cd3f2566a5446a639a435930ee658e5db14af3ce45d99265574e03921
                                                          • Instruction ID: 5029ec720a341d7d5b728bbda0cbd699ffcd26501053f5f45e101aaeb70a6164
                                                          • Opcode Fuzzy Hash: 16035a8cd3f2566a5446a639a435930ee658e5db14af3ce45d99265574e03921
                                                          • Instruction Fuzzy Hash: 3881CD71A04205BBDB21BFA4DC43FABB7A8AF96300F044424F905AB196EB74DA01D7E1
                                                          APIs
                                                          • CharLowerBuffW.USER32(?,?), ref: 00A13EF8
                                                          • _wcslen.LIBCMT ref: 00A13F03
                                                          • _wcslen.LIBCMT ref: 00A13F5A
                                                          • _wcslen.LIBCMT ref: 00A13F98
                                                          • GetDriveTypeW.KERNEL32(?), ref: 00A13FD6
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00A1401E
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00A14059
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00A14087
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: SendString_wcslen$BuffCharDriveLowerType
                                                          • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                          • API String ID: 1839972693-4113822522
                                                          • Opcode ID: f513339573ebb5ae388505020b5dd99568802ab72238747a05b7b18f3732e11e
                                                          • Instruction ID: 9a23d2ccc099d2f0ca8eb997f050faa979b03879a1954d3b494bcd852dd7f708
                                                          • Opcode Fuzzy Hash: f513339573ebb5ae388505020b5dd99568802ab72238747a05b7b18f3732e11e
                                                          • Instruction Fuzzy Hash: 2B71F232A047119FC710EF28C8819AAB7F4FF99764F10492DF89697251EB31DD86CB91
                                                          APIs
                                                          • LoadIconW.USER32(00000063), ref: 00A05A2E
                                                          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00A05A40
                                                          • SetWindowTextW.USER32(?,?), ref: 00A05A57
                                                          • GetDlgItem.USER32(?,000003EA), ref: 00A05A6C
                                                          • SetWindowTextW.USER32(00000000,?), ref: 00A05A72
                                                          • GetDlgItem.USER32(?,000003E9), ref: 00A05A82
                                                          • SetWindowTextW.USER32(00000000,?), ref: 00A05A88
                                                          • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00A05AA9
                                                          • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00A05AC3
                                                          • GetWindowRect.USER32(?,?), ref: 00A05ACC
                                                          • _wcslen.LIBCMT ref: 00A05B33
                                                          • SetWindowTextW.USER32(?,?), ref: 00A05B6F
                                                          • GetDesktopWindow.USER32 ref: 00A05B75
                                                          • GetWindowRect.USER32(00000000), ref: 00A05B7C
                                                          • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00A05BD3
                                                          • GetClientRect.USER32(?,?), ref: 00A05BE0
                                                          • PostMessageW.USER32(?,00000005,00000000,?), ref: 00A05C05
                                                          • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00A05C2F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                          • String ID:
                                                          • API String ID: 895679908-0
                                                          • Opcode ID: d5667a47468525d8ce58469373a4e25d8cf2f3b011c640d92e02a225d20b0b80
                                                          • Instruction ID: 87d67c6e8d89e7295bf57a27317a8e1ea96352b14685591cfbc385c502e57f88
                                                          • Opcode Fuzzy Hash: d5667a47468525d8ce58469373a4e25d8cf2f3b011c640d92e02a225d20b0b80
                                                          • Instruction Fuzzy Hash: DB713931A00A09AFDB20DFB8DE8AAAFBBF5FF48714F104518E542A25A0D775E945CF50
                                                          APIs
                                                          • LoadCursorW.USER32(00000000,00007F89), ref: 00A1FE27
                                                          • LoadCursorW.USER32(00000000,00007F8A), ref: 00A1FE32
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00A1FE3D
                                                          • LoadCursorW.USER32(00000000,00007F03), ref: 00A1FE48
                                                          • LoadCursorW.USER32(00000000,00007F8B), ref: 00A1FE53
                                                          • LoadCursorW.USER32(00000000,00007F01), ref: 00A1FE5E
                                                          • LoadCursorW.USER32(00000000,00007F81), ref: 00A1FE69
                                                          • LoadCursorW.USER32(00000000,00007F88), ref: 00A1FE74
                                                          • LoadCursorW.USER32(00000000,00007F80), ref: 00A1FE7F
                                                          • LoadCursorW.USER32(00000000,00007F86), ref: 00A1FE8A
                                                          • LoadCursorW.USER32(00000000,00007F83), ref: 00A1FE95
                                                          • LoadCursorW.USER32(00000000,00007F85), ref: 00A1FEA0
                                                          • LoadCursorW.USER32(00000000,00007F82), ref: 00A1FEAB
                                                          • LoadCursorW.USER32(00000000,00007F84), ref: 00A1FEB6
                                                          • LoadCursorW.USER32(00000000,00007F04), ref: 00A1FEC1
                                                          • LoadCursorW.USER32(00000000,00007F02), ref: 00A1FECC
                                                          • GetCursorInfo.USER32(?), ref: 00A1FEDC
                                                          • GetLastError.KERNEL32 ref: 00A1FF1E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Cursor$Load$ErrorInfoLast
                                                          • String ID:
                                                          • API String ID: 3215588206-0
                                                          • Opcode ID: a99197cbdf46c12d43f89929ac75420f724ee4cc3099cfe16f8b1871fd998d0b
                                                          • Instruction ID: 252d8986f737d4bc4bf651b56d4ad9b32c05e444ad01f57f7e1096fe376a6843
                                                          • Opcode Fuzzy Hash: a99197cbdf46c12d43f89929ac75420f724ee4cc3099cfe16f8b1871fd998d0b
                                                          • Instruction Fuzzy Hash: 144153B0D043596EDB10DFBA8C8585EBFE8FF04354B54452AF119EB281DB789941CF91
                                                          APIs
                                                          • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 009C00C6
                                                            • Part of subcall function 009C00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(00A7070C,00000FA0,E9210293,?,?,?,?,009E23B3,000000FF), ref: 009C011C
                                                            • Part of subcall function 009C00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,009E23B3,000000FF), ref: 009C0127
                                                            • Part of subcall function 009C00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,009E23B3,000000FF), ref: 009C0138
                                                            • Part of subcall function 009C00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 009C014E
                                                            • Part of subcall function 009C00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 009C015C
                                                            • Part of subcall function 009C00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 009C016A
                                                            • Part of subcall function 009C00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 009C0195
                                                            • Part of subcall function 009C00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 009C01A0
                                                          • ___scrt_fastfail.LIBCMT ref: 009C00E7
                                                            • Part of subcall function 009C00A3: __onexit.LIBCMT ref: 009C00A9
                                                          Strings
                                                          • kernel32.dll, xrefs: 009C0133
                                                          • InitializeConditionVariable, xrefs: 009C0148
                                                          • SleepConditionVariableCS, xrefs: 009C0154
                                                          • api-ms-win-core-synch-l1-2-0.dll, xrefs: 009C0122
                                                          • WakeAllConditionVariable, xrefs: 009C0162
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                          • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                          • API String ID: 66158676-1714406822
                                                          • Opcode ID: 8a8c0cfd3e0f10c99c7d6fb338c52e749f4fb92f21c410d016e0304c52ea3bac
                                                          • Instruction ID: c5a1f150d01331e04ddec4b027bd857207477625beaf7ad27ba6dc188f5bdaae
                                                          • Opcode Fuzzy Hash: 8a8c0cfd3e0f10c99c7d6fb338c52e749f4fb92f21c410d016e0304c52ea3bac
                                                          • Instruction Fuzzy Hash: 1621DA32E44710FFE7119BE4AC09F6977A8EB85FA5F04452DF805A3691DB749C008B51
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                          • API String ID: 176396367-1603158881
                                                          • Opcode ID: a97b8ecb28113726305fd2e8a5151475ed1be4433ae849a596006ee19cbdf857
                                                          • Instruction ID: e43ad1d38c7e22060b1e7c630f46f2dc318d24c36db524ec5ed2cd0db89b332d
                                                          • Opcode Fuzzy Hash: a97b8ecb28113726305fd2e8a5151475ed1be4433ae849a596006ee19cbdf857
                                                          • Instruction Fuzzy Hash: 4CE1A533E0051AAFCF149F78D891BEEBBB8BF54750F548119E456B7290DB30AE458790
                                                          APIs
                                                          • CharLowerBuffW.USER32(00000000,00000000,00A3CC08), ref: 00A14527
                                                          • _wcslen.LIBCMT ref: 00A1453B
                                                          • _wcslen.LIBCMT ref: 00A14599
                                                          • _wcslen.LIBCMT ref: 00A145F4
                                                          • _wcslen.LIBCMT ref: 00A1463F
                                                          • _wcslen.LIBCMT ref: 00A146A7
                                                            • Part of subcall function 009BF9F2: _wcslen.LIBCMT ref: 009BF9FD
                                                          • GetDriveTypeW.KERNEL32(?,00A66BF0,00000061), ref: 00A14743
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharDriveLowerType
                                                          • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                          • API String ID: 2055661098-1000479233
                                                          • Opcode ID: 766a069d58ebb89ee785841105db695ce084507f7ce9169315844138f75e0fbf
                                                          • Instruction ID: fbb80558d18adca32af590a591310929a1cb57e7c56e580fb8d74ea1b7738b75
                                                          • Opcode Fuzzy Hash: 766a069d58ebb89ee785841105db695ce084507f7ce9169315844138f75e0fbf
                                                          • Instruction Fuzzy Hash: FFB1BD716083129FC710DF2CC890AAAB7E5AFEA764F50491DF4A6C7291D730DC85CBA2
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 00A2B198
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00A2B1B0
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00A2B1D4
                                                          • _wcslen.LIBCMT ref: 00A2B200
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00A2B214
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00A2B236
                                                          • _wcslen.LIBCMT ref: 00A2B332
                                                            • Part of subcall function 00A105A7: GetStdHandle.KERNEL32(000000F6), ref: 00A105C6
                                                          • _wcslen.LIBCMT ref: 00A2B34B
                                                          • _wcslen.LIBCMT ref: 00A2B366
                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00A2B3B6
                                                          • GetLastError.KERNEL32(00000000), ref: 00A2B407
                                                          • CloseHandle.KERNEL32(?), ref: 00A2B439
                                                          • CloseHandle.KERNEL32(00000000), ref: 00A2B44A
                                                          • CloseHandle.KERNEL32(00000000), ref: 00A2B45C
                                                          • CloseHandle.KERNEL32(00000000), ref: 00A2B46E
                                                          • CloseHandle.KERNEL32(?), ref: 00A2B4E3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 2178637699-0
                                                          • Opcode ID: 349d5dd2170b5890987c5f9018d2a2b14db6fd6a1bac1dc5fa22c309680c8cec
                                                          • Instruction ID: a553e90b227645c39315c47edd951adc06b96bdc55e22de95dd04807a0a59223
                                                          • Opcode Fuzzy Hash: 349d5dd2170b5890987c5f9018d2a2b14db6fd6a1bac1dc5fa22c309680c8cec
                                                          • Instruction Fuzzy Hash: C8F19F31518310DFC714EF28D891B6EBBE5AF85710F14856DF8959B2A2DB31EC40CBA2
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00A3CC08), ref: 00A240BB
                                                          • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00A240CD
                                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,00A3CC08), ref: 00A240F2
                                                          • FreeLibrary.KERNEL32(00000000,?,00A3CC08), ref: 00A2413E
                                                          • StringFromGUID2.OLE32(?,?,00000028,?,00A3CC08), ref: 00A241A8
                                                          • SysFreeString.OLEAUT32(00000009), ref: 00A24262
                                                          • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00A242C8
                                                          • SysFreeString.OLEAUT32(?), ref: 00A242F2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                                                          • String ID: GetModuleHandleExW$kernel32.dll
                                                          • API String ID: 354098117-199464113
                                                          • Opcode ID: 958d2830c8e0a7acc0373680389c6ab1adec5c7f4d3ef0e5a9f05191b514939e
                                                          • Instruction ID: d0a84bcccf75c69c48fcddc21a67693224114f11b8550606404b6d161060a394
                                                          • Opcode Fuzzy Hash: 958d2830c8e0a7acc0373680389c6ab1adec5c7f4d3ef0e5a9f05191b514939e
                                                          • Instruction Fuzzy Hash: BC121D75A00125EFDB14DF98D884EAEBBB5FF49314F2480A8F905AB251D731ED46CBA0
                                                          APIs
                                                          • GetMenuItemCount.USER32(00A71990), ref: 009E2F8D
                                                          • GetMenuItemCount.USER32(00A71990), ref: 009E303D
                                                          • GetCursorPos.USER32(?), ref: 009E3081
                                                          • SetForegroundWindow.USER32(00000000), ref: 009E308A
                                                          • TrackPopupMenuEx.USER32(00A71990,00000000,?,00000000,00000000,00000000), ref: 009E309D
                                                          • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 009E30A9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                          • String ID: 0
                                                          • API String ID: 36266755-4108050209
                                                          • Opcode ID: b9d327c89923dd44aad739085de1ace79fc1c1117e0f084c7be97ae777ff5678
                                                          • Instruction ID: be36fdc786203eb5e15338878a74b728a8d3474330cc6614802da50408b50f09
                                                          • Opcode Fuzzy Hash: b9d327c89923dd44aad739085de1ace79fc1c1117e0f084c7be97ae777ff5678
                                                          • Instruction Fuzzy Hash: A9711731640255BEEB228F65CC49FAABF6CFF05324F208216F9246A1E1C7B1AD50CB90
                                                          APIs
                                                          • DestroyWindow.USER32(00000000,?), ref: 00A36DEB
                                                            • Part of subcall function 009A6B57: _wcslen.LIBCMT ref: 009A6B6A
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00A36E5F
                                                          • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00A36E81
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00A36E94
                                                          • DestroyWindow.USER32(?), ref: 00A36EB5
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,009A0000,00000000), ref: 00A36EE4
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00A36EFD
                                                          • GetDesktopWindow.USER32 ref: 00A36F16
                                                          • GetWindowRect.USER32(00000000), ref: 00A36F1D
                                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00A36F35
                                                          • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00A36F4D
                                                            • Part of subcall function 009B9944: GetWindowLongW.USER32(?,000000EB), ref: 009B9952
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                          • String ID: 0$tooltips_class32
                                                          • API String ID: 2429346358-3619404913
                                                          • Opcode ID: 082e4404919c2bb01894310325b7cb734dc54139fb4e468bcdccae2c07831d93
                                                          • Instruction ID: 4683bd54592ecd5ec86dd3dc043a50e1f7ff01758ce67f73ba35fdce001f96ea
                                                          • Opcode Fuzzy Hash: 082e4404919c2bb01894310325b7cb734dc54139fb4e468bcdccae2c07831d93
                                                          • Instruction Fuzzy Hash: 74717874104240AFDB21CF58DC44FAABBF9FB89314F14881DFA9997261C774E94ACB21
                                                          APIs
                                                            • Part of subcall function 009B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 009B9BB2
                                                          • DragQueryPoint.SHELL32(?,?), ref: 00A39147
                                                            • Part of subcall function 00A37674: ClientToScreen.USER32(?,?), ref: 00A3769A
                                                            • Part of subcall function 00A37674: GetWindowRect.USER32(?,?), ref: 00A37710
                                                            • Part of subcall function 00A37674: PtInRect.USER32(?,?,00A38B89), ref: 00A37720
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00A391B0
                                                          • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00A391BB
                                                          • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00A391DE
                                                          • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00A39225
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00A3923E
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 00A39255
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 00A39277
                                                          • DragFinish.SHELL32(?), ref: 00A3927E
                                                          • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00A39371
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                          • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                          • API String ID: 221274066-3440237614
                                                          • Opcode ID: 82a48639827c682d271ff0de5af43ced3a5961b25fbc7b2da16d0070ad3d1d3c
                                                          • Instruction ID: 2a8f66402ed9f66f250678fe049c1a8f00f475e6fbe5816d4bf5a99437f5abaa
                                                          • Opcode Fuzzy Hash: 82a48639827c682d271ff0de5af43ced3a5961b25fbc7b2da16d0070ad3d1d3c
                                                          • Instruction Fuzzy Hash: B4612871108301AFD701DFA4DC89EAFBBE8FBC9760F00491DF595962A1DB709A49CB92
                                                          APIs
                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00A1C4B0
                                                          • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00A1C4C3
                                                          • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00A1C4D7
                                                          • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00A1C4F0
                                                          • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 00A1C533
                                                          • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00A1C549
                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00A1C554
                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00A1C584
                                                          • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00A1C5DC
                                                          • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00A1C5F0
                                                          • InternetCloseHandle.WININET(00000000), ref: 00A1C5FB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                          • String ID:
                                                          • API String ID: 3800310941-3916222277
                                                          • Opcode ID: 6c3722ea59885ed8b018a5397f488842996aca929c30548c20f99c709f5dac00
                                                          • Instruction ID: 4787bdf0654d4940ff3daec11707b98aafc7d2587a1478de5d5a643e9bcdc9b4
                                                          • Opcode Fuzzy Hash: 6c3722ea59885ed8b018a5397f488842996aca929c30548c20f99c709f5dac00
                                                          • Instruction Fuzzy Hash: 145139B5580308BFDB21DFA4CD88ABB7BBDFB08764F004419F946A6250DB34E9859B60
                                                          APIs
                                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 00A38592
                                                          • GetFileSize.KERNEL32(00000000,00000000), ref: 00A385A2
                                                          • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00A385AD
                                                          • CloseHandle.KERNEL32(00000000), ref: 00A385BA
                                                          • GlobalLock.KERNEL32(00000000), ref: 00A385C8
                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00A385D7
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00A385E0
                                                          • CloseHandle.KERNEL32(00000000), ref: 00A385E7
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00A385F8
                                                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,00A3FC38,?), ref: 00A38611
                                                          • GlobalFree.KERNEL32(00000000), ref: 00A38621
                                                          • GetObjectW.GDI32(?,00000018,000000FF), ref: 00A38641
                                                          • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00A38671
                                                          • DeleteObject.GDI32(00000000), ref: 00A38699
                                                          • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00A386AF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                          • String ID:
                                                          • API String ID: 3840717409-0
                                                          • Opcode ID: 892485ab1e69d8fe445b4818b2317b71bcd3fa105b996f41b0f237e9ca8cd39a
                                                          • Instruction ID: 96fb0a8a0292b952b4d625d9cb6ad5efcd53e80fcc07b4cf718c8f531e455caf
                                                          • Opcode Fuzzy Hash: 892485ab1e69d8fe445b4818b2317b71bcd3fa105b996f41b0f237e9ca8cd39a
                                                          • Instruction Fuzzy Hash: 8E41F975600204AFDB11DFA5DC89EABBBBCFF89721F108159F905EB260DB349902DB60
                                                          APIs
                                                          • VariantInit.OLEAUT32(00000000), ref: 00A11502
                                                          • VariantCopy.OLEAUT32(?,?), ref: 00A1150B
                                                          • VariantClear.OLEAUT32(?), ref: 00A11517
                                                          • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00A115FB
                                                          • VarR8FromDec.OLEAUT32(?,?), ref: 00A11657
                                                          • VariantInit.OLEAUT32(?), ref: 00A11708
                                                          • SysFreeString.OLEAUT32(?), ref: 00A1178C
                                                          • VariantClear.OLEAUT32(?), ref: 00A117D8
                                                          • VariantClear.OLEAUT32(?), ref: 00A117E7
                                                          • VariantInit.OLEAUT32(00000000), ref: 00A11823
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                          • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                          • API String ID: 1234038744-3931177956
                                                          • Opcode ID: 8e0533aec909ff644a1195656506a62d615e1bc18880789c020a1905fd845630
                                                          • Instruction ID: 3a4b04f77d49f25abf83e86ab4e3d05f842ac84729800a44dc54ec277ac89096
                                                          • Opcode Fuzzy Hash: 8e0533aec909ff644a1195656506a62d615e1bc18880789c020a1905fd845630
                                                          • Instruction Fuzzy Hash: 5CD1F031A00515EBDB10DFA5D885BFDB7B6BF85720F108156F646AB280DB30ED81DBA2
                                                          APIs
                                                            • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                            • Part of subcall function 00A2C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A2B6AE,?,?), ref: 00A2C9B5
                                                            • Part of subcall function 00A2C998: _wcslen.LIBCMT ref: 00A2C9F1
                                                            • Part of subcall function 00A2C998: _wcslen.LIBCMT ref: 00A2CA68
                                                            • Part of subcall function 00A2C998: _wcslen.LIBCMT ref: 00A2CA9E
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A2B6F4
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00A2B772
                                                          • RegDeleteValueW.ADVAPI32(?,?), ref: 00A2B80A
                                                          • RegCloseKey.ADVAPI32(?), ref: 00A2B87E
                                                          • RegCloseKey.ADVAPI32(?), ref: 00A2B89C
                                                          • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00A2B8F2
                                                          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00A2B904
                                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00A2B922
                                                          • FreeLibrary.KERNEL32(00000000), ref: 00A2B983
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00A2B994
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                                          • API String ID: 146587525-4033151799
                                                          • Opcode ID: 0df833079c6b5c5cefd4943c759454813d77ed24bbc721a03ab51a2066f2649f
                                                          • Instruction ID: 89db6cef1781d1baf23fd2e688580ae91fe0ccfec362f8ecac50a7aab4e5f591
                                                          • Opcode Fuzzy Hash: 0df833079c6b5c5cefd4943c759454813d77ed24bbc721a03ab51a2066f2649f
                                                          • Instruction Fuzzy Hash: 17C1AE34214211AFD714DF18D895F2ABBE5FF85318F14846CF59A8B2A2CB35EC46CBA1
                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 00A225D8
                                                          • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00A225E8
                                                          • CreateCompatibleDC.GDI32(?), ref: 00A225F4
                                                          • SelectObject.GDI32(00000000,?), ref: 00A22601
                                                          • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00A2266D
                                                          • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00A226AC
                                                          • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 00A226D0
                                                          • SelectObject.GDI32(?,?), ref: 00A226D8
                                                          • DeleteObject.GDI32(?), ref: 00A226E1
                                                          • DeleteDC.GDI32(?), ref: 00A226E8
                                                          • ReleaseDC.USER32(00000000,?), ref: 00A226F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                          • String ID: (
                                                          • API String ID: 2598888154-3887548279
                                                          • Opcode ID: ce643ce0c76b562094a9de9b18539234a417c7824032aea06dee9ed12400f168
                                                          • Instruction ID: 896486713280deacd5843097665711d5933accc3ffc20f6a8dee7cd5fba705d3
                                                          • Opcode Fuzzy Hash: ce643ce0c76b562094a9de9b18539234a417c7824032aea06dee9ed12400f168
                                                          • Instruction Fuzzy Hash: BA61F276D00219EFCB14CFE8DD84AAEBBB5FF48310F208529E955A7250E774A941DF60
                                                          APIs
                                                          • ___free_lconv_mon.LIBCMT ref: 009DDAA1
                                                            • Part of subcall function 009DD63C: _free.LIBCMT ref: 009DD659
                                                            • Part of subcall function 009DD63C: _free.LIBCMT ref: 009DD66B
                                                            • Part of subcall function 009DD63C: _free.LIBCMT ref: 009DD67D
                                                            • Part of subcall function 009DD63C: _free.LIBCMT ref: 009DD68F
                                                            • Part of subcall function 009DD63C: _free.LIBCMT ref: 009DD6A1
                                                            • Part of subcall function 009DD63C: _free.LIBCMT ref: 009DD6B3
                                                            • Part of subcall function 009DD63C: _free.LIBCMT ref: 009DD6C5
                                                            • Part of subcall function 009DD63C: _free.LIBCMT ref: 009DD6D7
                                                            • Part of subcall function 009DD63C: _free.LIBCMT ref: 009DD6E9
                                                            • Part of subcall function 009DD63C: _free.LIBCMT ref: 009DD6FB
                                                            • Part of subcall function 009DD63C: _free.LIBCMT ref: 009DD70D
                                                            • Part of subcall function 009DD63C: _free.LIBCMT ref: 009DD71F
                                                            • Part of subcall function 009DD63C: _free.LIBCMT ref: 009DD731
                                                          • _free.LIBCMT ref: 009DDA96
                                                            • Part of subcall function 009D29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,009DD7D1,00000000,00000000,00000000,00000000,?,009DD7F8,00000000,00000007,00000000,?,009DDBF5,00000000), ref: 009D29DE
                                                            • Part of subcall function 009D29C8: GetLastError.KERNEL32(00000000,?,009DD7D1,00000000,00000000,00000000,00000000,?,009DD7F8,00000000,00000007,00000000,?,009DDBF5,00000000,00000000), ref: 009D29F0
                                                          • _free.LIBCMT ref: 009DDAB8
                                                          • _free.LIBCMT ref: 009DDACD
                                                          • _free.LIBCMT ref: 009DDAD8
                                                          • _free.LIBCMT ref: 009DDAFA
                                                          • _free.LIBCMT ref: 009DDB0D
                                                          • _free.LIBCMT ref: 009DDB1B
                                                          • _free.LIBCMT ref: 009DDB26
                                                          • _free.LIBCMT ref: 009DDB5E
                                                          • _free.LIBCMT ref: 009DDB65
                                                          • _free.LIBCMT ref: 009DDB82
                                                          • _free.LIBCMT ref: 009DDB9A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                          • String ID:
                                                          • API String ID: 161543041-0
                                                          • Opcode ID: acc119e305aec218358ac27fe46b925021e3cb435819470c1a4d852f6f406473
                                                          • Instruction ID: 1303dbffbdaa4e6cbbf2c7ed81e860320a47ba8df90d05e08379119813075dd7
                                                          • Opcode Fuzzy Hash: acc119e305aec218358ac27fe46b925021e3cb435819470c1a4d852f6f406473
                                                          • Instruction Fuzzy Hash: 59315A316856049FEB21AB78E945B6A77ECFF50314F15C41BE449D7391DB34EC409B20
                                                          APIs
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 00A0369C
                                                          • _wcslen.LIBCMT ref: 00A036A7
                                                          • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00A03797
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 00A0380C
                                                          • GetDlgCtrlID.USER32(?), ref: 00A0385D
                                                          • GetWindowRect.USER32(?,?), ref: 00A03882
                                                          • GetParent.USER32(?), ref: 00A038A0
                                                          • ScreenToClient.USER32(00000000), ref: 00A038A7
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 00A03921
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 00A0395D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                          • String ID: %s%u
                                                          • API String ID: 4010501982-679674701
                                                          • Opcode ID: 72cf39e1bc59d81558c769c97c17a3127f187863d2a3f7d8e2aa573a06335e84
                                                          • Instruction ID: 5903c4d3c3229ae90dc3ac60194ab2159630168ae786e1f915915a9621af7282
                                                          • Opcode Fuzzy Hash: 72cf39e1bc59d81558c769c97c17a3127f187863d2a3f7d8e2aa573a06335e84
                                                          • Instruction Fuzzy Hash: DB91B17220470AAFDB19DF64D895FAAB7ACFF44350F008629F999D21D0DB30EA45CB91
                                                          APIs
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 00A04994
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 00A049DA
                                                          • _wcslen.LIBCMT ref: 00A049EB
                                                          • CharUpperBuffW.USER32(?,00000000), ref: 00A049F7
                                                          • _wcsstr.LIBVCRUNTIME ref: 00A04A2C
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 00A04A64
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 00A04A9D
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 00A04AE6
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 00A04B20
                                                          • GetWindowRect.USER32(?,?), ref: 00A04B8B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                          • String ID: ThumbnailClass
                                                          • API String ID: 1311036022-1241985126
                                                          • Opcode ID: 4d80bea6bafeb1adcff8f1dcacf1f86a28478e917a04a5999d72ed248422960b
                                                          • Instruction ID: a730a97748fe454927c9d16d33ea84d36dd3f0ef1313183640479e7636862658
                                                          • Opcode Fuzzy Hash: 4d80bea6bafeb1adcff8f1dcacf1f86a28478e917a04a5999d72ed248422960b
                                                          • Instruction Fuzzy Hash: 7D91BEB21042099FDB04DF14E985FAA77E8FF89354F048469FE859A0D6EB30ED45CBA1
                                                          APIs
                                                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00A2CC64
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 00A2CC8D
                                                          • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00A2CD48
                                                            • Part of subcall function 00A2CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 00A2CCAA
                                                            • Part of subcall function 00A2CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 00A2CCBD
                                                            • Part of subcall function 00A2CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00A2CCCF
                                                            • Part of subcall function 00A2CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00A2CD05
                                                            • Part of subcall function 00A2CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00A2CD28
                                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00A2CCF3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                                          • API String ID: 2734957052-4033151799
                                                          • Opcode ID: cac696decd835d5d985ac010a3b69c06030ebf4ab82f54c31c96aa5ea5d76678
                                                          • Instruction ID: 0b739722168c9659ec436787680fa88766786704ae263a199f614967c2e14572
                                                          • Opcode Fuzzy Hash: cac696decd835d5d985ac010a3b69c06030ebf4ab82f54c31c96aa5ea5d76678
                                                          • Instruction Fuzzy Hash: 9B315E75901129BBD720CBA5EC88EFFBB7CEF46760F000175B905E3140D6749A469BA0
                                                          APIs
                                                          • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00A13D40
                                                          • _wcslen.LIBCMT ref: 00A13D6D
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00A13D9D
                                                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00A13DBE
                                                          • RemoveDirectoryW.KERNEL32(?), ref: 00A13DCE
                                                          • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00A13E55
                                                          • CloseHandle.KERNEL32(00000000), ref: 00A13E60
                                                          • CloseHandle.KERNEL32(00000000), ref: 00A13E6B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                          • String ID: :$\$\??\%s
                                                          • API String ID: 1149970189-3457252023
                                                          • Opcode ID: c7251e7d627676ef1fb3e5cd229e78911f1b4f5b5eb34a6088942280d2615585
                                                          • Instruction ID: 2ca7d57dd6cab3981de5cb3c63e8c3da4a2c34f8efd252d1ffac67ef08249ac1
                                                          • Opcode Fuzzy Hash: c7251e7d627676ef1fb3e5cd229e78911f1b4f5b5eb34a6088942280d2615585
                                                          • Instruction Fuzzy Hash: 3A319072900219AADF21DFA0EC49FEB77BDEF88750F1041A5F509E60A0EB7497858B64
                                                          APIs
                                                          • timeGetTime.WINMM ref: 00A0E6B4
                                                            • Part of subcall function 009BE551: timeGetTime.WINMM(?,?,00A0E6D4), ref: 009BE555
                                                          • Sleep.KERNEL32(0000000A), ref: 00A0E6E1
                                                          • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 00A0E705
                                                          • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00A0E727
                                                          • SetActiveWindow.USER32 ref: 00A0E746
                                                          • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00A0E754
                                                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 00A0E773
                                                          • Sleep.KERNEL32(000000FA), ref: 00A0E77E
                                                          • IsWindow.USER32 ref: 00A0E78A
                                                          • EndDialog.USER32(00000000), ref: 00A0E79B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                          • String ID: BUTTON
                                                          • API String ID: 1194449130-3405671355
                                                          • Opcode ID: eeea7a4655ffc59ffbde5e626fdb1efc0b4b3a9c98c96758bdb08e75749a91d5
                                                          • Instruction ID: 034429e8daf51012ca3e9219827715ec3e30f2942fe62884ef02c77f0695a8e8
                                                          • Opcode Fuzzy Hash: eeea7a4655ffc59ffbde5e626fdb1efc0b4b3a9c98c96758bdb08e75749a91d5
                                                          • Instruction Fuzzy Hash: 9321A571200208AFEB00EFE4FC89B253B69F754759F149835F50A921F1DB72AC52AB24
                                                          APIs
                                                            • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                          • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00A0EA5D
                                                          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00A0EA73
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00A0EA84
                                                          • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00A0EA96
                                                          • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00A0EAA7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: SendString$_wcslen
                                                          • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                          • API String ID: 2420728520-1007645807
                                                          • Opcode ID: c4f49a47f058b1d44c36ca28decc6459abe48a54a83e35ef72f83500b40a06c2
                                                          • Instruction ID: 3ac2115f1f3ffdf36fcbb2f94cac18e5d48814a6a31fb1b043ac2bec1a60cb88
                                                          • Opcode Fuzzy Hash: c4f49a47f058b1d44c36ca28decc6459abe48a54a83e35ef72f83500b40a06c2
                                                          • Instruction Fuzzy Hash: 57115131A5021979D720E7A1DC4AEFF6A7CFBD6F40F4408297811A20D1EEB00915C9F0
                                                          APIs
                                                          • GetKeyboardState.USER32(?), ref: 00A0A012
                                                          • SetKeyboardState.USER32(?), ref: 00A0A07D
                                                          • GetAsyncKeyState.USER32(000000A0), ref: 00A0A09D
                                                          • GetKeyState.USER32(000000A0), ref: 00A0A0B4
                                                          • GetAsyncKeyState.USER32(000000A1), ref: 00A0A0E3
                                                          • GetKeyState.USER32(000000A1), ref: 00A0A0F4
                                                          • GetAsyncKeyState.USER32(00000011), ref: 00A0A120
                                                          • GetKeyState.USER32(00000011), ref: 00A0A12E
                                                          • GetAsyncKeyState.USER32(00000012), ref: 00A0A157
                                                          • GetKeyState.USER32(00000012), ref: 00A0A165
                                                          • GetAsyncKeyState.USER32(0000005B), ref: 00A0A18E
                                                          • GetKeyState.USER32(0000005B), ref: 00A0A19C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: State$Async$Keyboard
                                                          • String ID:
                                                          • API String ID: 541375521-0
                                                          • Opcode ID: 0605973e532c85043fdfc11d9c5fec967ffea4f21e7b8be7da24e3e080805c54
                                                          • Instruction ID: 002acb68ee6b56df203bbf14492ae0c62c40ae592cf3560c9bd236117988c514
                                                          • Opcode Fuzzy Hash: 0605973e532c85043fdfc11d9c5fec967ffea4f21e7b8be7da24e3e080805c54
                                                          • Instruction Fuzzy Hash: 4D51CC3090478C2AFB35DBB0A9117EBBFB55F22380F088599D5C2571C3DA549E4CC762
                                                          APIs
                                                          • GetDlgItem.USER32(?,00000001), ref: 00A05CE2
                                                          • GetWindowRect.USER32(00000000,?), ref: 00A05CFB
                                                          • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00A05D59
                                                          • GetDlgItem.USER32(?,00000002), ref: 00A05D69
                                                          • GetWindowRect.USER32(00000000,?), ref: 00A05D7B
                                                          • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00A05DCF
                                                          • GetDlgItem.USER32(?,000003E9), ref: 00A05DDD
                                                          • GetWindowRect.USER32(00000000,?), ref: 00A05DEF
                                                          • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00A05E31
                                                          • GetDlgItem.USER32(?,000003EA), ref: 00A05E44
                                                          • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00A05E5A
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00A05E67
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ItemMoveRect$Invalidate
                                                          • String ID:
                                                          • API String ID: 3096461208-0
                                                          • Opcode ID: f7f2d2e16fcf5496d88bf648b6d968d5db43aadddcf3b6ba06f210ac202b7389
                                                          • Instruction ID: 0a50f5f31315873ee95aad2c388b58a418c8f9734c1252859057500ed512fcbd
                                                          • Opcode Fuzzy Hash: f7f2d2e16fcf5496d88bf648b6d968d5db43aadddcf3b6ba06f210ac202b7389
                                                          • Instruction Fuzzy Hash: 7151FCB1E00619AFDF18CFA8DD89AAEBBB5EB48310F148129F915E6290D7709E05CF50
                                                          APIs
                                                            • Part of subcall function 009B8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,009B8BE8,?,00000000,?,?,?,?,009B8BBA,00000000,?), ref: 009B8FC5
                                                          • DestroyWindow.USER32(?), ref: 009B8C81
                                                          • KillTimer.USER32(00000000,?,?,?,?,009B8BBA,00000000,?), ref: 009B8D1B
                                                          • DestroyAcceleratorTable.USER32(00000000), ref: 009F6973
                                                          • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,009B8BBA,00000000,?), ref: 009F69A1
                                                          • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,009B8BBA,00000000,?), ref: 009F69B8
                                                          • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,009B8BBA,00000000), ref: 009F69D4
                                                          • DeleteObject.GDI32(00000000), ref: 009F69E6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                          • String ID:
                                                          • API String ID: 641708696-0
                                                          • Opcode ID: 70d6509ab0a2539d09d6db8a2f179224d6a25848773db2b097e3379112fe8bb2
                                                          • Instruction ID: 6bea6f79a076ee02e4e374519059f3fd6fb9d5991c286684c38a263d93f1bf78
                                                          • Opcode Fuzzy Hash: 70d6509ab0a2539d09d6db8a2f179224d6a25848773db2b097e3379112fe8bb2
                                                          • Instruction Fuzzy Hash: FA61BC71101705DFCB25DF68CE49BB67BF9FB48322F148918E1869A960CB75A8C2DB90
                                                          APIs
                                                            • Part of subcall function 009B9944: GetWindowLongW.USER32(?,000000EB), ref: 009B9952
                                                          • GetSysColor.USER32(0000000F), ref: 009B9862
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ColorLongWindow
                                                          • String ID:
                                                          • API String ID: 259745315-0
                                                          • Opcode ID: c1254ac3077ae7146ccac947258593e9072882d811940dc86347d584da25e503
                                                          • Instruction ID: 94e054659a2c28fb5480fc4e97c1310fa522240b0ef340e82bf959487fc88a3a
                                                          • Opcode Fuzzy Hash: c1254ac3077ae7146ccac947258593e9072882d811940dc86347d584da25e503
                                                          • Instruction Fuzzy Hash: 1241B131114644AFDB219FB89D89BF93BB9EB06330F144619FBA29B2E1D7359C42DB10
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,009EF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00A09717
                                                          • LoadStringW.USER32(00000000,?,009EF7F8,00000001), ref: 00A09720
                                                            • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                          • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,009EF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00A09742
                                                          • LoadStringW.USER32(00000000,?,009EF7F8,00000001), ref: 00A09745
                                                          • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00A09866
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString$Message_wcslen
                                                          • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                          • API String ID: 747408836-2268648507
                                                          • Opcode ID: 5ff40900595a236228c578f2f057d44499147c8d3b3a11bc2d5b853c8ce56959
                                                          • Instruction ID: 30f439c35a77e4865fd8e63845d14477722aec3000b548846c0eab53f30a5eec
                                                          • Opcode Fuzzy Hash: 5ff40900595a236228c578f2f057d44499147c8d3b3a11bc2d5b853c8ce56959
                                                          • Instruction Fuzzy Hash: F8411E72804219ABCF04EBE0DE46EEEB778AF96340F504465F50572092EF356F49CBA1
                                                          APIs
                                                            • Part of subcall function 009A6B57: _wcslen.LIBCMT ref: 009A6B6A
                                                          • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00A007A2
                                                          • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00A007BE
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00A007DA
                                                          • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00A00804
                                                          • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 00A0082C
                                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00A00837
                                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00A0083C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                          • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                          • API String ID: 323675364-22481851
                                                          • Opcode ID: 578fe0d7041d1dfa6dff83dc21c5fefc0223b98e9a4332bb9909f6f3ab16d787
                                                          • Instruction ID: b1d8889453820ea174301042ebe8c39377b12d7c55629432f76d67aa280e4e39
                                                          • Opcode Fuzzy Hash: 578fe0d7041d1dfa6dff83dc21c5fefc0223b98e9a4332bb9909f6f3ab16d787
                                                          • Instruction Fuzzy Hash: 4941E772C10229ABDF15EBA4DC95EEEB778BF45350F444529F901B31A1EB349E04CBA0
                                                          APIs
                                                          • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00A3403B
                                                          • CreateCompatibleDC.GDI32(00000000), ref: 00A34042
                                                          • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00A34055
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00A3405D
                                                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 00A34068
                                                          • DeleteDC.GDI32(00000000), ref: 00A34072
                                                          • GetWindowLongW.USER32(?,000000EC), ref: 00A3407C
                                                          • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 00A34092
                                                          • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 00A3409E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                          • String ID: static
                                                          • API String ID: 2559357485-2160076837
                                                          • Opcode ID: d00bd88ccb39042aa0824c64a90e9ba93963bb33327c0d67be8f1e8636472731
                                                          • Instruction ID: 14c07fbbe104043b87a6c07f979e77990fcca97533c9a33f80b0f5a7f5f4dcee
                                                          • Opcode Fuzzy Hash: d00bd88ccb39042aa0824c64a90e9ba93963bb33327c0d67be8f1e8636472731
                                                          • Instruction Fuzzy Hash: A3316C32501215BBDF219FA4DC49FDA3BA8FF0E320F110211FA19E61A0C779D861DB90
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 00A23C5C
                                                          • CoInitialize.OLE32(00000000), ref: 00A23C8A
                                                          • CoUninitialize.OLE32 ref: 00A23C94
                                                          • _wcslen.LIBCMT ref: 00A23D2D
                                                          • GetRunningObjectTable.OLE32(00000000,?), ref: 00A23DB1
                                                          • SetErrorMode.KERNEL32(00000001,00000029), ref: 00A23ED5
                                                          • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00A23F0E
                                                          • CoGetObject.OLE32(?,00000000,00A3FB98,?), ref: 00A23F2D
                                                          • SetErrorMode.KERNEL32(00000000), ref: 00A23F40
                                                          • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00A23FC4
                                                          • VariantClear.OLEAUT32(?), ref: 00A23FD8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                          • String ID:
                                                          • API String ID: 429561992-0
                                                          • Opcode ID: 996e01aa564547b0584c3b10fa74ba607060c75c3c1db76c4dc78ed432ac41ed
                                                          • Instruction ID: a41892d16f1726804d91691908c42e2c3ea0477fcb3130cc545ed863d109ceaf
                                                          • Opcode Fuzzy Hash: 996e01aa564547b0584c3b10fa74ba607060c75c3c1db76c4dc78ed432ac41ed
                                                          • Instruction Fuzzy Hash: 98C147726083159FCB00DF68D98492BB7E9FF8A744F10492DF98A9B211D735EE05CB52
                                                          APIs
                                                          • CoInitialize.OLE32(00000000), ref: 00A17AF3
                                                          • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00A17B8F
                                                          • SHGetDesktopFolder.SHELL32(?), ref: 00A17BA3
                                                          • CoCreateInstance.OLE32(00A3FD08,00000000,00000001,00A66E6C,?), ref: 00A17BEF
                                                          • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00A17C74
                                                          • CoTaskMemFree.OLE32(?,?), ref: 00A17CCC
                                                          • SHBrowseForFolderW.SHELL32(?), ref: 00A17D57
                                                          • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00A17D7A
                                                          • CoTaskMemFree.OLE32(00000000), ref: 00A17D81
                                                          • CoTaskMemFree.OLE32(00000000), ref: 00A17DD6
                                                          • CoUninitialize.OLE32 ref: 00A17DDC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                          • String ID:
                                                          • API String ID: 2762341140-0
                                                          • Opcode ID: 08d85267c418acd8cdd9c47d0d0fbea5be39d0b9d2d0f962de11020ab547f66a
                                                          • Instruction ID: 80c2527186fd48e45a811617979258fd5179f8bd0af86e243e0ec658dbbb18e5
                                                          • Opcode Fuzzy Hash: 08d85267c418acd8cdd9c47d0d0fbea5be39d0b9d2d0f962de11020ab547f66a
                                                          • Instruction Fuzzy Hash: FEC11C75A04119AFCB14DFA4C884DAEBBF9FF48314B149499F41ADB261D730EE85CB90
                                                          APIs
                                                          • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00A35504
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00A35515
                                                          • CharNextW.USER32(00000158), ref: 00A35544
                                                          • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00A35585
                                                          • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00A3559B
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00A355AC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CharNext
                                                          • String ID:
                                                          • API String ID: 1350042424-0
                                                          • Opcode ID: c283489032d617e72904fb0eea9af5553bce31e659e96d9f4a58c1944a44bb9f
                                                          • Instruction ID: 8f5b497eb3ebece8602eabeeb552c9f094c1ffba8edb556e11e03d19f3d90e7f
                                                          • Opcode Fuzzy Hash: c283489032d617e72904fb0eea9af5553bce31e659e96d9f4a58c1944a44bb9f
                                                          • Instruction Fuzzy Hash: 5F618E71D00608AFDF14DFA8CC85AFE7BB9EB09720F108145F925A7291D7749A81DBA0
                                                          APIs
                                                          • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 009FFAAF
                                                          • SafeArrayAllocData.OLEAUT32(?), ref: 009FFB08
                                                          • VariantInit.OLEAUT32(?), ref: 009FFB1A
                                                          • SafeArrayAccessData.OLEAUT32(?,?), ref: 009FFB3A
                                                          • VariantCopy.OLEAUT32(?,?), ref: 009FFB8D
                                                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 009FFBA1
                                                          • VariantClear.OLEAUT32(?), ref: 009FFBB6
                                                          • SafeArrayDestroyData.OLEAUT32(?), ref: 009FFBC3
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 009FFBCC
                                                          • VariantClear.OLEAUT32(?), ref: 009FFBDE
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 009FFBE9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                          • String ID:
                                                          • API String ID: 2706829360-0
                                                          • Opcode ID: 22d8166808d40c29f26e8f6ce2b78531174a79c349de719544b69b0751c5621d
                                                          • Instruction ID: 3684f98fff135e429ed7c63fdff990b0b5e026e8595e89f8bebbc9be3030c7f2
                                                          • Opcode Fuzzy Hash: 22d8166808d40c29f26e8f6ce2b78531174a79c349de719544b69b0751c5621d
                                                          • Instruction Fuzzy Hash: A0414175A0021D9FCB00DFA4DC689BDBBB9EF48355F008065F956A7261DB30E946CB90
                                                          APIs
                                                          • GetKeyboardState.USER32(?), ref: 00A09CA1
                                                          • GetAsyncKeyState.USER32(000000A0), ref: 00A09D22
                                                          • GetKeyState.USER32(000000A0), ref: 00A09D3D
                                                          • GetAsyncKeyState.USER32(000000A1), ref: 00A09D57
                                                          • GetKeyState.USER32(000000A1), ref: 00A09D6C
                                                          • GetAsyncKeyState.USER32(00000011), ref: 00A09D84
                                                          • GetKeyState.USER32(00000011), ref: 00A09D96
                                                          • GetAsyncKeyState.USER32(00000012), ref: 00A09DAE
                                                          • GetKeyState.USER32(00000012), ref: 00A09DC0
                                                          • GetAsyncKeyState.USER32(0000005B), ref: 00A09DD8
                                                          • GetKeyState.USER32(0000005B), ref: 00A09DEA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: State$Async$Keyboard
                                                          • String ID:
                                                          • API String ID: 541375521-0
                                                          • Opcode ID: e65cca4195fa35105f85a046d4a7d28aa2eab22cbc986237095cf1cb9b346dcf
                                                          • Instruction ID: 15367d114fc6f4c2e16b9d7fbc17d22ca00d2620e71998d83506b03a71a8d3ae
                                                          • Opcode Fuzzy Hash: e65cca4195fa35105f85a046d4a7d28aa2eab22cbc986237095cf1cb9b346dcf
                                                          • Instruction Fuzzy Hash: 4D41C6349447CE6DFF319760E8143B7BEA06F11344F08805ADAC6565C3EBA59DC8C7A2
                                                          APIs
                                                          • WSAStartup.WSOCK32(00000101,?), ref: 00A205BC
                                                          • inet_addr.WSOCK32(?), ref: 00A2061C
                                                          • gethostbyname.WSOCK32(?), ref: 00A20628
                                                          • IcmpCreateFile.IPHLPAPI ref: 00A20636
                                                          • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00A206C6
                                                          • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00A206E5
                                                          • IcmpCloseHandle.IPHLPAPI(?), ref: 00A207B9
                                                          • WSACleanup.WSOCK32 ref: 00A207BF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                          • String ID: Ping
                                                          • API String ID: 1028309954-2246546115
                                                          • Opcode ID: 653c84f79801fd97eb3434b1330a2440f333300b55043fab1b76b04b50153754
                                                          • Instruction ID: 8f3806dca9ff316f8c45a2cf6d83f8acd8cc528fabb89ed1cf49344b8835197e
                                                          • Opcode Fuzzy Hash: 653c84f79801fd97eb3434b1330a2440f333300b55043fab1b76b04b50153754
                                                          • Instruction Fuzzy Hash: 8B91AC356086119FD320CF19E888F1ABBE1AF84328F1485A9F4699B6A3C770ED41CF91
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharLower
                                                          • String ID: cdecl$none$stdcall$winapi
                                                          • API String ID: 707087890-567219261
                                                          • Opcode ID: 013d506184d01a8451f21db1fd6ad7308b45fd3a56523b324334719b4af237d6
                                                          • Instruction ID: dc22e5bd724f6a0ff83835ac418d9f7989fae5aceaed5216ade285338184c49c
                                                          • Opcode Fuzzy Hash: 013d506184d01a8451f21db1fd6ad7308b45fd3a56523b324334719b4af237d6
                                                          • Instruction Fuzzy Hash: 8E51AD32A011269BCB14DF6CD9509BEB3B5BF65764B214239F826E72C4DB38DD44C790
                                                          APIs
                                                          • CoInitialize.OLE32 ref: 00A23774
                                                          • CoUninitialize.OLE32 ref: 00A2377F
                                                          • CoCreateInstance.OLE32(?,00000000,00000017,00A3FB78,?), ref: 00A237D9
                                                          • IIDFromString.OLE32(?,?), ref: 00A2384C
                                                          • VariantInit.OLEAUT32(?), ref: 00A238E4
                                                          • VariantClear.OLEAUT32(?), ref: 00A23936
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                          • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                          • API String ID: 636576611-1287834457
                                                          • Opcode ID: 4d40146431df8f8f6e75f7445f5f5e2e052b8dbca0289bc4adfadae1fa9aff51
                                                          • Instruction ID: fefdf3b069dfd429b86721b368a0479f357a09cc29eec1675acfb2851bd0009e
                                                          • Opcode Fuzzy Hash: 4d40146431df8f8f6e75f7445f5f5e2e052b8dbca0289bc4adfadae1fa9aff51
                                                          • Instruction Fuzzy Hash: 5D61B272608321AFDB10DF68D949F6AB7F4EF86714F000829F5859B291D774EE48CB92
                                                          APIs
                                                          • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00A133CF
                                                            • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                          • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00A133F0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: LoadString$_wcslen
                                                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                          • API String ID: 4099089115-3080491070
                                                          • Opcode ID: 4eded3e840ec3871347ade8fa440ae21791b016125cdfacfbe14ae1ca1867804
                                                          • Instruction ID: 73df3b6ba91288ca305b83cf0a8e23c4d8fd6df5ec491f83b22cb438cd9aa2bb
                                                          • Opcode Fuzzy Hash: 4eded3e840ec3871347ade8fa440ae21791b016125cdfacfbe14ae1ca1867804
                                                          • Instruction Fuzzy Hash: E1518E32900219BADF15EBE0DE46EEEB779BF45740F108465F40972092EF212F98CBA0
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharUpper
                                                          • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                          • API String ID: 1256254125-769500911
                                                          • Opcode ID: 02cd6fab163ebc9ec6fd3f0041b9bc70ad857f633f67cf17b87411a80eda3564
                                                          • Instruction ID: 2312dfce650a99a5305a4c3a0c65e4794487cc52566b1e4415557df739b23e5d
                                                          • Opcode Fuzzy Hash: 02cd6fab163ebc9ec6fd3f0041b9bc70ad857f633f67cf17b87411a80eda3564
                                                          • Instruction Fuzzy Hash: FD41C532A1112B9BCB105F7DDE905BE77B5ABA1B94F244629E421DB2C4E732CD81C7A0
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 00A153A0
                                                          • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00A15416
                                                          • GetLastError.KERNEL32 ref: 00A15420
                                                          • SetErrorMode.KERNEL32(00000000,READY), ref: 00A154A7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Error$Mode$DiskFreeLastSpace
                                                          • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                          • API String ID: 4194297153-14809454
                                                          • Opcode ID: c5937081706eba174908ecdb2c6b0163bf01ad374a6bb77738891cdb583cbfb3
                                                          • Instruction ID: 5595a9fca681314c4e00994edea45bf9cc0c1844b66d60d57f6bf336e771a247
                                                          • Opcode Fuzzy Hash: c5937081706eba174908ecdb2c6b0163bf01ad374a6bb77738891cdb583cbfb3
                                                          • Instruction Fuzzy Hash: 9C314B39E00604DFD710DF68D884BEABBB9EF95315F148065E4059B292DB71DDC6CB90
                                                          APIs
                                                          • CreateMenu.USER32 ref: 00A33C79
                                                          • SetMenu.USER32(?,00000000), ref: 00A33C88
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A33D10
                                                          • IsMenu.USER32(?), ref: 00A33D24
                                                          • CreatePopupMenu.USER32 ref: 00A33D2E
                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00A33D5B
                                                          • DrawMenuBar.USER32 ref: 00A33D63
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                          • String ID: 0$F
                                                          • API String ID: 161812096-3044882817
                                                          • Opcode ID: ac0f7814f7f986b0ada385433f0596bab850dfbd15fd4a7f2869e33bc2111d82
                                                          • Instruction ID: 2685999517d73c4670ad53dfe6287a92e5af9f24ec5fbea5c21d65baafcd1e11
                                                          • Opcode Fuzzy Hash: ac0f7814f7f986b0ada385433f0596bab850dfbd15fd4a7f2869e33bc2111d82
                                                          • Instruction Fuzzy Hash: 6E41577AA05209AFDF14CFA4DC84BAA7BB5FF49350F144429FA46A7360D730AA11CF94
                                                          APIs
                                                            • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                            • Part of subcall function 00A03CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00A03CCA
                                                          • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 00A01F64
                                                          • GetDlgCtrlID.USER32 ref: 00A01F6F
                                                          • GetParent.USER32 ref: 00A01F8B
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00A01F8E
                                                          • GetDlgCtrlID.USER32(?), ref: 00A01F97
                                                          • GetParent.USER32(?), ref: 00A01FAB
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00A01FAE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 711023334-1403004172
                                                          • Opcode ID: ab3367759676fd7ebe5bff98689628023a5a4c4309c89eacc3d9ca562a6a299d
                                                          • Instruction ID: 2cdd79999d3155e076772bd504cce4e2f0671f018a5f397d00b874b2aa0eb26a
                                                          • Opcode Fuzzy Hash: ab3367759676fd7ebe5bff98689628023a5a4c4309c89eacc3d9ca562a6a299d
                                                          • Instruction Fuzzy Hash: 4421B071900218BBCF04EFA0DC85AEEBBB8EF06350F004116F965A72D1DB3859099B60
                                                          APIs
                                                            • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                            • Part of subcall function 00A03CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00A03CCA
                                                          • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 00A02043
                                                          • GetDlgCtrlID.USER32 ref: 00A0204E
                                                          • GetParent.USER32 ref: 00A0206A
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00A0206D
                                                          • GetDlgCtrlID.USER32(?), ref: 00A02076
                                                          • GetParent.USER32(?), ref: 00A0208A
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00A0208D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 711023334-1403004172
                                                          • Opcode ID: f9718fed1c2fc9ab4ef0cfbaf2ff0fd5ea292bed898d40d196a641f25b52825c
                                                          • Instruction ID: 508305832c94fe4da151455233d295e20df05c7978b8fdbba4893d2562173db2
                                                          • Opcode Fuzzy Hash: f9718fed1c2fc9ab4ef0cfbaf2ff0fd5ea292bed898d40d196a641f25b52825c
                                                          • Instruction Fuzzy Hash: 34218E75900218BBDF10AFA4DC89AEEBBB8FB05350F004415F955A71A1DB794919DB60
                                                          APIs
                                                          • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00A33A9D
                                                          • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00A33AA0
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00A33AC7
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00A33AEA
                                                          • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00A33B62
                                                          • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00A33BAC
                                                          • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00A33BC7
                                                          • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00A33BE2
                                                          • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00A33BF6
                                                          • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00A33C13
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$LongWindow
                                                          • String ID:
                                                          • API String ID: 312131281-0
                                                          • Opcode ID: a9e7767686eb7340d8689a546106cf4e5e474c04e9b6aa4442286e248851b5a1
                                                          • Instruction ID: b6cc9c5cd4770fe20be29bc7c8102c96eaa2f10fe4df97b46438d72e4e146ef5
                                                          • Opcode Fuzzy Hash: a9e7767686eb7340d8689a546106cf4e5e474c04e9b6aa4442286e248851b5a1
                                                          • Instruction Fuzzy Hash: 5B616C76900248AFDB10DFA8CC81EEE77F8EB49710F104199FA15E72A1D774AE46DB50
                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 00A0B151
                                                          • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00A0A1E1,?,00000001), ref: 00A0B165
                                                          • GetWindowThreadProcessId.USER32(00000000), ref: 00A0B16C
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00A0A1E1,?,00000001), ref: 00A0B17B
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 00A0B18D
                                                          • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,00A0A1E1,?,00000001), ref: 00A0B1A6
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00A0A1E1,?,00000001), ref: 00A0B1B8
                                                          • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00A0A1E1,?,00000001), ref: 00A0B1FD
                                                          • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,00A0A1E1,?,00000001), ref: 00A0B212
                                                          • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,00A0A1E1,?,00000001), ref: 00A0B21D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                          • String ID:
                                                          • API String ID: 2156557900-0
                                                          • Opcode ID: 2884f3930e3429d2a7488c70f922844088aa1f33e7676216e53d64d9fb1b7c15
                                                          • Instruction ID: 4c1b309ebfbe42c00bbbb4fdb7f2004fd20efdbd8dfdb3fad2f6bd7c4725606c
                                                          • Opcode Fuzzy Hash: 2884f3930e3429d2a7488c70f922844088aa1f33e7676216e53d64d9fb1b7c15
                                                          • Instruction Fuzzy Hash: A6319372510208BFDF10DFA4EE45BAD7BA9BB65321F118505F905D61E0D7B49A828F70
                                                          APIs
                                                          • _free.LIBCMT ref: 009D2C94
                                                            • Part of subcall function 009D29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,009DD7D1,00000000,00000000,00000000,00000000,?,009DD7F8,00000000,00000007,00000000,?,009DDBF5,00000000), ref: 009D29DE
                                                            • Part of subcall function 009D29C8: GetLastError.KERNEL32(00000000,?,009DD7D1,00000000,00000000,00000000,00000000,?,009DD7F8,00000000,00000007,00000000,?,009DDBF5,00000000,00000000), ref: 009D29F0
                                                          • _free.LIBCMT ref: 009D2CA0
                                                          • _free.LIBCMT ref: 009D2CAB
                                                          • _free.LIBCMT ref: 009D2CB6
                                                          • _free.LIBCMT ref: 009D2CC1
                                                          • _free.LIBCMT ref: 009D2CCC
                                                          • _free.LIBCMT ref: 009D2CD7
                                                          • _free.LIBCMT ref: 009D2CE2
                                                          • _free.LIBCMT ref: 009D2CED
                                                          • _free.LIBCMT ref: 009D2CFB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: 63310eabe3f783481451e30f1c91562ce90e6ae9e94767fd2d189d0719b5eb8b
                                                          • Instruction ID: 3c9ca2093af12bc9bff92253eed418f95e1e2d0f17d204dfb0c5d33fecebc3e9
                                                          • Opcode Fuzzy Hash: 63310eabe3f783481451e30f1c91562ce90e6ae9e94767fd2d189d0719b5eb8b
                                                          • Instruction Fuzzy Hash: D011B976140108BFCB02EF54D952DDD3BA5FF55350F4184A6F9485F322D631EE50AB90
                                                          APIs
                                                          • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 009A1459
                                                          • OleUninitialize.OLE32(?,00000000), ref: 009A14F8
                                                          • UnregisterHotKey.USER32(?), ref: 009A16DD
                                                          • DestroyWindow.USER32(?), ref: 009E24B9
                                                          • FreeLibrary.KERNEL32(?), ref: 009E251E
                                                          • VirtualFree.KERNEL32(?,00000000,00008000), ref: 009E254B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                          • String ID: close all
                                                          • API String ID: 469580280-3243417748
                                                          • Opcode ID: 33cb6a65ab7bfd10592cf8abada171e6d4be6acec780579b8c09b9bfa7c8c7a6
                                                          • Instruction ID: 9f388cac3ec29e2781a2a5565e0d23e87dec2b3012548e28d5f006b84e290f41
                                                          • Opcode Fuzzy Hash: 33cb6a65ab7bfd10592cf8abada171e6d4be6acec780579b8c09b9bfa7c8c7a6
                                                          • Instruction Fuzzy Hash: 81D15931701212CFCB1AEF15C999B69F7A8BF46710F1542ADF44AAB261DB30AD12CF90
                                                          APIs
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00A17FAD
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00A17FC1
                                                          • GetFileAttributesW.KERNEL32(?), ref: 00A17FEB
                                                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 00A18005
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00A18017
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00A18060
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00A180B0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectory$AttributesFile
                                                          • String ID: *.*
                                                          • API String ID: 769691225-438819550
                                                          • Opcode ID: c05f4384d8d39df3980fca5ec3c767e9328d94f06330cb2ff45ffff5bb56f3d0
                                                          • Instruction ID: 8fc1fba72fbe4d19fb6fff319bd5354937c6243be183ab0bcdca79df4cde78a8
                                                          • Opcode Fuzzy Hash: c05f4384d8d39df3980fca5ec3c767e9328d94f06330cb2ff45ffff5bb56f3d0
                                                          • Instruction Fuzzy Hash: D9818D725082459BCB20EF54C844AEEB3F8BF89310F54585EF885DB290EB35DD85CB92
                                                          APIs
                                                          • SetWindowLongW.USER32(?,000000EB), ref: 009A5C7A
                                                            • Part of subcall function 009A5D0A: GetClientRect.USER32(?,?), ref: 009A5D30
                                                            • Part of subcall function 009A5D0A: GetWindowRect.USER32(?,?), ref: 009A5D71
                                                            • Part of subcall function 009A5D0A: ScreenToClient.USER32(?,?), ref: 009A5D99
                                                          • GetDC.USER32 ref: 009E46F5
                                                          • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 009E4708
                                                          • SelectObject.GDI32(00000000,00000000), ref: 009E4716
                                                          • SelectObject.GDI32(00000000,00000000), ref: 009E472B
                                                          • ReleaseDC.USER32(?,00000000), ref: 009E4733
                                                          • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 009E47C4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                          • String ID: U
                                                          • API String ID: 4009187628-3372436214
                                                          • Opcode ID: 02903e43d168c45386b63d0f78c36b1676d9fdf4632c5889ccf363b8d6dbcf0e
                                                          • Instruction ID: 43c15c2d64a4d72153106a20d863fa953c280cce0553bdf5cbc5717cf1b491dc
                                                          • Opcode Fuzzy Hash: 02903e43d168c45386b63d0f78c36b1676d9fdf4632c5889ccf363b8d6dbcf0e
                                                          • Instruction Fuzzy Hash: 1871E030500245EFCF22CF65CD84AAA7BB9FF4A360F144269FD955A1AAC3318C82DF90
                                                          APIs
                                                          • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 00A135E4
                                                            • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                          • LoadStringW.USER32(00A72390,?,00000FFF,?), ref: 00A1360A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: LoadString$_wcslen
                                                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                          • API String ID: 4099089115-2391861430
                                                          • Opcode ID: 4483487ec37b73018afb35d294c5c4025935a7c5d7a5be57d648cb5b87f35eef
                                                          • Instruction ID: 504e94605161e2d743888f8cc0e720aee91f985247c34db8168dbb71c3e3487e
                                                          • Opcode Fuzzy Hash: 4483487ec37b73018afb35d294c5c4025935a7c5d7a5be57d648cb5b87f35eef
                                                          • Instruction Fuzzy Hash: C1515A72800219BADF15EBE0DD46EEEBB78FF45350F148125F109721A2EB311A99DBA0
                                                          APIs
                                                          • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00A1C272
                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00A1C29A
                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00A1C2CA
                                                          • GetLastError.KERNEL32 ref: 00A1C322
                                                          • SetEvent.KERNEL32(?), ref: 00A1C336
                                                          • InternetCloseHandle.WININET(00000000), ref: 00A1C341
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                          • String ID:
                                                          • API String ID: 3113390036-3916222277
                                                          • Opcode ID: 7ca9e1a86541eb17ccbc4b8ceae7659315eb66ee04eb533f72972a071d81bead
                                                          • Instruction ID: 348d91637a643fd92ad4d947ed8848def653a51c44ede2bff6daa975c3e13232
                                                          • Opcode Fuzzy Hash: 7ca9e1a86541eb17ccbc4b8ceae7659315eb66ee04eb533f72972a071d81bead
                                                          • Instruction Fuzzy Hash: 2A319CB1640308AFD721DFA58C88AEBBBFCEB49760B10851EF456E7200DB30DD858B61
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,009E3AAF,?,?,Bad directive syntax error,00A3CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 00A098BC
                                                          • LoadStringW.USER32(00000000,?,009E3AAF,?), ref: 00A098C3
                                                            • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                          • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00A09987
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadMessageModuleString_wcslen
                                                          • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                          • API String ID: 858772685-4153970271
                                                          • Opcode ID: 92e6009043ed941161d59e4b194e2d0499eff9bb0db3bc8caf00949754306086
                                                          • Instruction ID: 96cc49f7d2de481051fe4fb4bc8c3fcabab06ce59793201d4c8eecda24e1a9e3
                                                          • Opcode Fuzzy Hash: 92e6009043ed941161d59e4b194e2d0499eff9bb0db3bc8caf00949754306086
                                                          • Instruction Fuzzy Hash: F2215E3280021EBBCF15AF90DC0AFEE7775FF59750F048855F519660A2EB719A18DB90
                                                          APIs
                                                          • GetParent.USER32 ref: 00A020AB
                                                          • GetClassNameW.USER32(00000000,?,00000100), ref: 00A020C0
                                                          • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00A0214D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameParentSend
                                                          • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                          • API String ID: 1290815626-3381328864
                                                          • Opcode ID: 7cebcfc61c1a7f3534ad06546cf53bc9c8bed775490db28397ffb8ed1d789716
                                                          • Instruction ID: ec5480b96ba095239378cf34aa45ea4913e9ecee284d714a8a20c87b0b3e2a97
                                                          • Opcode Fuzzy Hash: 7cebcfc61c1a7f3534ad06546cf53bc9c8bed775490db28397ffb8ed1d789716
                                                          • Instruction Fuzzy Hash: 1F110676A8870AB9FA156730EC0BFA677ACDF05324F20021AFB04A50D2FB6168525714
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 945abd7c622c5823ce9a5b5d83d8427e39d604c4f7e0cbb8334c37080ec00f19
                                                          • Instruction ID: fc2d978928b5d75ac175aaf0639bd599bf4e79686748b8e06014d135b454bd3e
                                                          • Opcode Fuzzy Hash: 945abd7c622c5823ce9a5b5d83d8427e39d604c4f7e0cbb8334c37080ec00f19
                                                          • Instruction Fuzzy Hash: 09C1F474E44249AFDB11EFECDC41BAEBBB5AF49310F04809AF418AB392C7349941CB61
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                          • String ID:
                                                          • API String ID: 1282221369-0
                                                          • Opcode ID: 595d2033fa8f608d2ccf3b27dcc3ca053add1a3ec4143316e8facbdfe3fa12e7
                                                          • Instruction ID: fa9551e5d71f5c7b446afcbecf8532bf6d25afb5a81c374dacb7d7c4d4954536
                                                          • Opcode Fuzzy Hash: 595d2033fa8f608d2ccf3b27dcc3ca053add1a3ec4143316e8facbdfe3fa12e7
                                                          • Instruction Fuzzy Hash: 386116B1A84302AFDB21AFB8DC95BAA7BA9EF45310F04C16FF944A7382D6319D41D750
                                                          APIs
                                                          • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00A35186
                                                          • ShowWindow.USER32(?,00000000), ref: 00A351C7
                                                          • ShowWindow.USER32(?,00000005,?,00000000), ref: 00A351CD
                                                          • SetFocus.USER32(?,?,00000005,?,00000000), ref: 00A351D1
                                                            • Part of subcall function 00A36FBA: DeleteObject.GDI32(00000000), ref: 00A36FE6
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00A3520D
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00A3521A
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00A3524D
                                                          • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00A35287
                                                          • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00A35296
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                          • String ID:
                                                          • API String ID: 3210457359-0
                                                          • Opcode ID: 2ec9a92a083257c76b5c026025f717f46ee21c511a6e1f1aa76e498cc451fcc3
                                                          • Instruction ID: 986e9c68af255ecaf555b48ab965b4c230d42c3da057af32bc4d79daba8b8e6e
                                                          • Opcode Fuzzy Hash: 2ec9a92a083257c76b5c026025f717f46ee21c511a6e1f1aa76e498cc451fcc3
                                                          • Instruction Fuzzy Hash: 1C518130E50A08BFEF20AFBCCC46BD97BB5EB05721F148611FA15962E1C775A990DB41
                                                          APIs
                                                          • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 009F6890
                                                          • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 009F68A9
                                                          • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 009F68B9
                                                          • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 009F68D1
                                                          • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 009F68F2
                                                          • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,009B8874,00000000,00000000,00000000,000000FF,00000000), ref: 009F6901
                                                          • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 009F691E
                                                          • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,009B8874,00000000,00000000,00000000,000000FF,00000000), ref: 009F692D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                          • String ID:
                                                          • API String ID: 1268354404-0
                                                          • Opcode ID: 01db94e7c2b6247e2e0fea1acf247eb4bd8e74f4940d231689fe499b26f59069
                                                          • Instruction ID: 0063f3eb74abcc9668442919d866813599df57b5553dbf41e36c6f4908994ef3
                                                          • Opcode Fuzzy Hash: 01db94e7c2b6247e2e0fea1acf247eb4bd8e74f4940d231689fe499b26f59069
                                                          • Instruction Fuzzy Hash: DB517B70600309EFDB20CF64CD55FAA7BB9FB48760F104518FA56A72A0DB74E991DB50
                                                          APIs
                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00A1C182
                                                          • GetLastError.KERNEL32 ref: 00A1C195
                                                          • SetEvent.KERNEL32(?), ref: 00A1C1A9
                                                            • Part of subcall function 00A1C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00A1C272
                                                            • Part of subcall function 00A1C253: GetLastError.KERNEL32 ref: 00A1C322
                                                            • Part of subcall function 00A1C253: SetEvent.KERNEL32(?), ref: 00A1C336
                                                            • Part of subcall function 00A1C253: InternetCloseHandle.WININET(00000000), ref: 00A1C341
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                          • String ID:
                                                          • API String ID: 337547030-0
                                                          • Opcode ID: eedea510066a9779c3fb9aa7e36a415ad067509c8f14726f5c52abca2aaa8d15
                                                          • Instruction ID: 14d79ef7905963ce8186146ea5c698b9b6263601f6f79605f870feadf09c17a1
                                                          • Opcode Fuzzy Hash: eedea510066a9779c3fb9aa7e36a415ad067509c8f14726f5c52abca2aaa8d15
                                                          • Instruction Fuzzy Hash: EF31AC71280701BFDB21AFE5DD08AEBBBF8FF18320B00451DF95696610D730E8959BA0
                                                          APIs
                                                            • Part of subcall function 00A03A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00A03A57
                                                            • Part of subcall function 00A03A3D: GetCurrentThreadId.KERNEL32 ref: 00A03A5E
                                                            • Part of subcall function 00A03A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00A025B3), ref: 00A03A65
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 00A025BD
                                                          • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00A025DB
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00A025DF
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 00A025E9
                                                          • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00A02601
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00A02605
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 00A0260F
                                                          • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00A02623
                                                          • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00A02627
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                          • String ID:
                                                          • API String ID: 2014098862-0
                                                          • Opcode ID: f5fc4c2a4d2cacb09fde515c783c773ec01470c14a3771ad3068200eb42e4673
                                                          • Instruction ID: ab7ec1c9c153d2d9dfb5b83d77f83854def5b1150ab9dc458c539a45f8547e28
                                                          • Opcode Fuzzy Hash: f5fc4c2a4d2cacb09fde515c783c773ec01470c14a3771ad3068200eb42e4673
                                                          • Instruction Fuzzy Hash: 7B01D431390324BBFB10A7A89C8EF593F59DB4EB62F100011F318BE0D1C9E224459B69
                                                          APIs
                                                          • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00A01449,?,?,00000000), ref: 00A0180C
                                                          • HeapAlloc.KERNEL32(00000000,?,00A01449,?,?,00000000), ref: 00A01813
                                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00A01449,?,?,00000000), ref: 00A01828
                                                          • GetCurrentProcess.KERNEL32(?,00000000,?,00A01449,?,?,00000000), ref: 00A01830
                                                          • DuplicateHandle.KERNEL32(00000000,?,00A01449,?,?,00000000), ref: 00A01833
                                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00A01449,?,?,00000000), ref: 00A01843
                                                          • GetCurrentProcess.KERNEL32(00A01449,00000000,?,00A01449,?,?,00000000), ref: 00A0184B
                                                          • DuplicateHandle.KERNEL32(00000000,?,00A01449,?,?,00000000), ref: 00A0184E
                                                          • CreateThread.KERNEL32(00000000,00000000,00A01874,00000000,00000000,00000000), ref: 00A01868
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                          • String ID:
                                                          • API String ID: 1957940570-0
                                                          • Opcode ID: ae942e935c58f69a8d79e6edf9585baec7c2f1f13731f0ccdc61e5099978ad02
                                                          • Instruction ID: ecd668bbfdbd3e2f0d8af9d8dcc1246b3300288bf70acfe4f49b8e9e20680dc6
                                                          • Opcode Fuzzy Hash: ae942e935c58f69a8d79e6edf9585baec7c2f1f13731f0ccdc61e5099978ad02
                                                          • Instruction Fuzzy Hash: 4B01BBB5240308BFE750EBA5DC8DF6B7BACEB89B11F008511FA05EB1A1CA70D811DB20
                                                          APIs
                                                            • Part of subcall function 00A0D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 00A0D501
                                                            • Part of subcall function 00A0D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 00A0D50F
                                                            • Part of subcall function 00A0D4DC: CloseHandle.KERNEL32(00000000), ref: 00A0D5DC
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00A2A16D
                                                          • GetLastError.KERNEL32 ref: 00A2A180
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00A2A1B3
                                                          • TerminateProcess.KERNEL32(00000000,00000000), ref: 00A2A268
                                                          • GetLastError.KERNEL32(00000000), ref: 00A2A273
                                                          • CloseHandle.KERNEL32(00000000), ref: 00A2A2C4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                          • String ID: SeDebugPrivilege
                                                          • API String ID: 2533919879-2896544425
                                                          • Opcode ID: 7b1d0697e086dbcb8dee47f6c8422ed729446ec50e34c75a9d5a346e40d427ca
                                                          • Instruction ID: 5a0a4ddcf33989ca041fc5a12fb822453e3278db56ac0e6370b74b040c508d8d
                                                          • Opcode Fuzzy Hash: 7b1d0697e086dbcb8dee47f6c8422ed729446ec50e34c75a9d5a346e40d427ca
                                                          • Instruction Fuzzy Hash: E3618D712042529FD720DF18D894F59BBE1AF55318F1884ACE4668F7A3C772EC46CB92
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00A33925
                                                          • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 00A3393A
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00A33954
                                                          • _wcslen.LIBCMT ref: 00A33999
                                                          • SendMessageW.USER32(?,00001057,00000000,?), ref: 00A339C6
                                                          • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00A339F4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window_wcslen
                                                          • String ID: SysListView32
                                                          • API String ID: 2147712094-78025650
                                                          • Opcode ID: aef8250fd5b28b22654af41b1ddeb3207e930394310232e0b8b5f06cf922aab8
                                                          • Instruction ID: 927b2fcc3facf4448bf514b0908d89bf8ab784947d4bd9f91f69c5c2cef2d03a
                                                          • Opcode Fuzzy Hash: aef8250fd5b28b22654af41b1ddeb3207e930394310232e0b8b5f06cf922aab8
                                                          • Instruction Fuzzy Hash: 9741A272A04218ABEF21DF64CC45FEA7BA9FF48350F100526F958E7281D7759D80CB90
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A0BCFD
                                                          • IsMenu.USER32(00000000), ref: 00A0BD1D
                                                          • CreatePopupMenu.USER32 ref: 00A0BD53
                                                          • GetMenuItemCount.USER32(01466F20), ref: 00A0BDA4
                                                          • InsertMenuItemW.USER32(01466F20,?,00000001,00000030), ref: 00A0BDCC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                          • String ID: 0$2
                                                          • API String ID: 93392585-3793063076
                                                          • Opcode ID: 2981c632f711dde6b48c9619cd5e76bafda978f856bacec98e342ea843c501db
                                                          • Instruction ID: 4099de78204a15429d2b67e0dd93da1d26ef37e4cd10fe03cb34f22073599c8f
                                                          • Opcode Fuzzy Hash: 2981c632f711dde6b48c9619cd5e76bafda978f856bacec98e342ea843c501db
                                                          • Instruction Fuzzy Hash: 0B518C70A1020EDBDF10DFA8EA88BAEFBF4AF45324F148259E411A72D1D770A941CB71
                                                          APIs
                                                          • LoadIconW.USER32(00000000,00007F03), ref: 00A0C913
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: IconLoad
                                                          • String ID: blank$info$question$stop$warning
                                                          • API String ID: 2457776203-404129466
                                                          • Opcode ID: 44c9c358607a624d87db4f2526cb4917d93bdb4175da63c51515dbfad7107c38
                                                          • Instruction ID: 464da0baf17081643ea4cfac6069c93f4bc5987558b3bc7bf8587f81c1877da4
                                                          • Opcode Fuzzy Hash: 44c9c358607a624d87db4f2526cb4917d93bdb4175da63c51515dbfad7107c38
                                                          • Instruction Fuzzy Hash: 9C110D3278930EBAE7159B54BC83EAA77BCDF15374B10452EF904A62C3D7705D005269
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                          • String ID: 0.0.0.0
                                                          • API String ID: 642191829-3771769585
                                                          • Opcode ID: 0bd83cc4bbe6dedcf36260d8a5775e58b31c28f6946bc0b66ebb45ffec96192a
                                                          • Instruction ID: b808c4c1db035f8810d3968f02fdc55076d3aea0e4d904e9436e1d2734f07fc6
                                                          • Opcode Fuzzy Hash: 0bd83cc4bbe6dedcf36260d8a5775e58b31c28f6946bc0b66ebb45ffec96192a
                                                          • Instruction Fuzzy Hash: 1211D672904118ABCB20ABA4EC4AFEE77BCDF51721F000169F545AA0D1EF718A818B61
                                                          APIs
                                                            • Part of subcall function 009B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 009B9BB2
                                                          • GetSystemMetrics.USER32(0000000F), ref: 00A39FC7
                                                          • GetSystemMetrics.USER32(0000000F), ref: 00A39FE7
                                                          • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00A3A224
                                                          • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00A3A242
                                                          • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00A3A263
                                                          • ShowWindow.USER32(00000003,00000000), ref: 00A3A282
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00A3A2A7
                                                          • DefDlgProcW.USER32(?,00000005,?,?), ref: 00A3A2CA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                          • String ID:
                                                          • API String ID: 1211466189-0
                                                          • Opcode ID: 2120d66027cb57c29083c76baab7b263cf31a50e6dc1aea69702265ce277a444
                                                          • Instruction ID: 0b3f9f906aa825baa83ab2bc6de7068fe79a2ad7c6096ec9065ba5cd4d14de5b
                                                          • Opcode Fuzzy Hash: 2120d66027cb57c29083c76baab7b263cf31a50e6dc1aea69702265ce277a444
                                                          • Instruction Fuzzy Hash: 5DB19931600225EFDF14CFA8C9857EE7BB2BF64711F188169FC89AB2A5D731A940CB51
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$LocalTime
                                                          • String ID:
                                                          • API String ID: 952045576-0
                                                          • Opcode ID: f71ef6f4ca4f39a9e63c3030d40513efb5c98400cac00b0d6d18d7a06f9a5da2
                                                          • Instruction ID: 92849fa9186dfff8c9e6b2087383ca6983f9ad97b41f1d3609befacc854953a5
                                                          • Opcode Fuzzy Hash: f71ef6f4ca4f39a9e63c3030d40513efb5c98400cac00b0d6d18d7a06f9a5da2
                                                          • Instruction Fuzzy Hash: 9441A465D1011876DB11EBF4CC8AFCFB7A8AF85750F50886AE528E3161FB34E245C3A6
                                                          APIs
                                                          • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,009F682C,00000004,00000000,00000000), ref: 009BF953
                                                          • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,009F682C,00000004,00000000,00000000), ref: 009FF3D1
                                                          • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,009F682C,00000004,00000000,00000000), ref: 009FF454
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ShowWindow
                                                          • String ID:
                                                          • API String ID: 1268545403-0
                                                          • Opcode ID: 57101e576131facc66bdf26e2ffe353f7096d3f795e1b860e83eca6b58354e73
                                                          • Instruction ID: 8306055783defc0a8e1d6dc7762e2530c5452924b0acc044e48032fc3e216409
                                                          • Opcode Fuzzy Hash: 57101e576131facc66bdf26e2ffe353f7096d3f795e1b860e83eca6b58354e73
                                                          • Instruction Fuzzy Hash: B7412831208680FAC739CB2C8EB87BA7B99AF46370F14443CF18762560D675A881CB11
                                                          APIs
                                                          • DeleteObject.GDI32(00000000), ref: 00A32D1B
                                                          • GetDC.USER32(00000000), ref: 00A32D23
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00A32D2E
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 00A32D3A
                                                          • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00A32D76
                                                          • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00A32D87
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00A35A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00A32DC2
                                                          • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00A32DE1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                          • String ID:
                                                          • API String ID: 3864802216-0
                                                          • Opcode ID: 3ec6776d475f58e9e79015a52518f73d9d787a7f5a6e6e4e200ea3ef311d6417
                                                          • Instruction ID: f66fc23632f7669f9323d3b4795692e572135b8906e85371a28141472f91145f
                                                          • Opcode Fuzzy Hash: 3ec6776d475f58e9e79015a52518f73d9d787a7f5a6e6e4e200ea3ef311d6417
                                                          • Instruction Fuzzy Hash: 4B318E72201214BFEB218F50CC8AFEB3FADEF09765F044055FE08AA291C6759C51CBA4
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: _memcmp
                                                          • String ID:
                                                          • API String ID: 2931989736-0
                                                          • Opcode ID: 2f626b5cc69f91280c9b2fcf1074ce00d87ce154cd156e6ef6cc5196771ddabf
                                                          • Instruction ID: ac4f989ea892d40c6dd4562dd3160c76dbc5dee8bf163dbb077f90b77f7b5766
                                                          • Opcode Fuzzy Hash: 2f626b5cc69f91280c9b2fcf1074ce00d87ce154cd156e6ef6cc5196771ddabf
                                                          • Instruction Fuzzy Hash: 0D219871E50A0D7BD2145631AE82FBB335CBE62384F480424FD055A5C2F722ED108DA9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: NULL Pointer assignment$Not an Object type
                                                          • API String ID: 0-572801152
                                                          • Opcode ID: 3afa1144bf374c59d9d08349f7a455b25aac5ce08c901e828c6b7b7915e348ae
                                                          • Instruction ID: 30f37c7c786272f7a1cf052250d8ef2eb73c12b2d400c38d8f02b2b081ca93ab
                                                          • Opcode Fuzzy Hash: 3afa1144bf374c59d9d08349f7a455b25aac5ce08c901e828c6b7b7915e348ae
                                                          • Instruction Fuzzy Hash: F1D1C171E0061AAFDF14CFA8E890BAEB7B5BF48354F148179E915AB280E770DD41CB90
                                                          APIs
                                                          • GetCPInfo.KERNEL32(?,?), ref: 009E15CE
                                                          • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 009E1651
                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 009E16E4
                                                          • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 009E16FB
                                                            • Part of subcall function 009D3820: RtlAllocateHeap.NTDLL(00000000,?,00A71444,?,009BFDF5,?,?,009AA976,00000010,00A71440,009A13FC,?,009A13C6,?,009A1129), ref: 009D3852
                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 009E1777
                                                          • __freea.LIBCMT ref: 009E17A2
                                                          • __freea.LIBCMT ref: 009E17AE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                          • String ID:
                                                          • API String ID: 2829977744-0
                                                          • Opcode ID: 7aff18eadd2a150e7beab5e5eb955e9fa743d22a72000eb2cfb82ddbcb29c35e
                                                          • Instruction ID: cd3f08e5b0b838bdc9b74b5c175d252e859e972bbef51ffc073e3ac0ee25d896
                                                          • Opcode Fuzzy Hash: 7aff18eadd2a150e7beab5e5eb955e9fa743d22a72000eb2cfb82ddbcb29c35e
                                                          • Instruction Fuzzy Hash: B891C571E002969ADF228FB6CC41EEEBBB9AF89710F184659F805E7141DB35DD80CB60
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit
                                                          • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                          • API String ID: 2610073882-625585964
                                                          • Opcode ID: c3c166b4b4d387856de1d741b762772f3356e42fa06953eb91f3cae9d1d467bf
                                                          • Instruction ID: dc46a393af85af0d9df9fc01d71ecb5d86b4595bb005c7ebd6349b3ac32aa7d4
                                                          • Opcode Fuzzy Hash: c3c166b4b4d387856de1d741b762772f3356e42fa06953eb91f3cae9d1d467bf
                                                          • Instruction Fuzzy Hash: A6917371A00225AFDF24CFA9DC44FAEBBB8EF4A714F108569F515AB280D7709945CFA0
                                                          APIs
                                                          • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 00A1125C
                                                          • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00A11284
                                                          • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 00A112A8
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00A112D8
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00A1135F
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00A113C4
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00A11430
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                          • String ID:
                                                          • API String ID: 2550207440-0
                                                          • Opcode ID: adf85fece4ee70f8cba1e191f095649eea380834e1c23dde61fc1831e7258b88
                                                          • Instruction ID: 27b77ac97bcf04511855b7da3bb0036b5561b33122dceacd7be9822e257ff064
                                                          • Opcode Fuzzy Hash: adf85fece4ee70f8cba1e191f095649eea380834e1c23dde61fc1831e7258b88
                                                          • Instruction Fuzzy Hash: E1910475A00219AFDB00DFA8D884BFEB7B9FF45725F144029EA11EB291D774E981CB90
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ObjectSelect$BeginCreatePath
                                                          • String ID:
                                                          • API String ID: 3225163088-0
                                                          • Opcode ID: 55a3e3e36dc234d14c8249fa94b0224f6c024f217a68f0a1f7996656c23cbf46
                                                          • Instruction ID: 4040ed1644ab6406c66dcf2451ac0e9923409614ea03c73f55910e63281e309e
                                                          • Opcode Fuzzy Hash: 55a3e3e36dc234d14c8249fa94b0224f6c024f217a68f0a1f7996656c23cbf46
                                                          • Instruction Fuzzy Hash: 9D913771D44219EFCB14CFA9CD84AEEBBB8FF49320F144459EA15B7251D378AA42CB60
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 00A2396B
                                                          • CharUpperBuffW.USER32(?,?), ref: 00A23A7A
                                                          • _wcslen.LIBCMT ref: 00A23A8A
                                                          • VariantClear.OLEAUT32(?), ref: 00A23C1F
                                                            • Part of subcall function 00A10CDF: VariantInit.OLEAUT32(00000000), ref: 00A10D1F
                                                            • Part of subcall function 00A10CDF: VariantCopy.OLEAUT32(?,?), ref: 00A10D28
                                                            • Part of subcall function 00A10CDF: VariantClear.OLEAUT32(?), ref: 00A10D34
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                          • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                          • API String ID: 4137639002-1221869570
                                                          • Opcode ID: 67484d1e7095a89a7ce79228a9df7ce5798adcf3e54c026fb4a7878986354df7
                                                          • Instruction ID: be38e727de22d6c4b7800fc8706879e5275cd8c270eb349d085e1265358644c9
                                                          • Opcode Fuzzy Hash: 67484d1e7095a89a7ce79228a9df7ce5798adcf3e54c026fb4a7878986354df7
                                                          • Instruction Fuzzy Hash: 1A918A756083119FCB04EF28D48196AB7E4FF8A314F04882DF88997351DB35EE45CB92
                                                          APIs
                                                            • Part of subcall function 00A0000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,009FFF41,80070057,?,?,?,00A0035E), ref: 00A0002B
                                                            • Part of subcall function 00A0000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,009FFF41,80070057,?,?), ref: 00A00046
                                                            • Part of subcall function 00A0000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,009FFF41,80070057,?,?), ref: 00A00054
                                                            • Part of subcall function 00A0000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,009FFF41,80070057,?), ref: 00A00064
                                                          • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00A24C51
                                                          • _wcslen.LIBCMT ref: 00A24D59
                                                          • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00A24DCF
                                                          • CoTaskMemFree.OLE32(?), ref: 00A24DDA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                          • String ID: NULL Pointer assignment
                                                          • API String ID: 614568839-2785691316
                                                          • Opcode ID: cb5740a1708f33ba5c0a87ff5c934ababc23a2a6d64b7e5de6bbb16ca9579f60
                                                          • Instruction ID: f34743239a0d2cf8eefeed974345e6738a74db4bbb91dabd915d058d06bfb1ba
                                                          • Opcode Fuzzy Hash: cb5740a1708f33ba5c0a87ff5c934ababc23a2a6d64b7e5de6bbb16ca9579f60
                                                          • Instruction Fuzzy Hash: F1912771D0022DAFDF10DFA8DC80AEEB7B8BF48310F108169E915A7241DB349A44CFA0
                                                          APIs
                                                          • GetMenu.USER32(?), ref: 00A32183
                                                          • GetMenuItemCount.USER32(00000000), ref: 00A321B5
                                                          • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00A321DD
                                                          • _wcslen.LIBCMT ref: 00A32213
                                                          • GetMenuItemID.USER32(?,?), ref: 00A3224D
                                                          • GetSubMenu.USER32(?,?), ref: 00A3225B
                                                            • Part of subcall function 00A03A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00A03A57
                                                            • Part of subcall function 00A03A3D: GetCurrentThreadId.KERNEL32 ref: 00A03A5E
                                                            • Part of subcall function 00A03A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00A025B3), ref: 00A03A65
                                                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00A322E3
                                                            • Part of subcall function 00A0E97B: Sleep.KERNEL32 ref: 00A0E9F3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                          • String ID:
                                                          • API String ID: 4196846111-0
                                                          • Opcode ID: 006d3f6efc1da63ec12ceb293296180c28ea4a8cfddf0806cd4284f1728d0e5d
                                                          • Instruction ID: 84633dadc9dfca17960ef5214bf145985d1bceb0fb3d5cc9aa82b98231ec93ba
                                                          • Opcode Fuzzy Hash: 006d3f6efc1da63ec12ceb293296180c28ea4a8cfddf0806cd4284f1728d0e5d
                                                          • Instruction Fuzzy Hash: 80714C75E00215AFCB10EFA4CD45BAEB7F5AF89320F148459F916AB351DB34ED418B90
                                                          APIs
                                                          • IsWindow.USER32(01466D40), ref: 00A37F37
                                                          • IsWindowEnabled.USER32(01466D40), ref: 00A37F43
                                                          • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 00A3801E
                                                          • SendMessageW.USER32(01466D40,000000B0,?,?), ref: 00A38051
                                                          • IsDlgButtonChecked.USER32(?,?), ref: 00A38089
                                                          • GetWindowLongW.USER32(01466D40,000000EC), ref: 00A380AB
                                                          • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00A380C3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                          • String ID:
                                                          • API String ID: 4072528602-0
                                                          • Opcode ID: b3501a6fc4e0c22ef2c0bd24882cbe70c0936cd911cf7b11c1f773d6690bd0a9
                                                          • Instruction ID: 5bc72907f5b13eb83c1f392c0d9840a59a7a4cbe87f5ce781a64c61dafc0db4a
                                                          • Opcode Fuzzy Hash: b3501a6fc4e0c22ef2c0bd24882cbe70c0936cd911cf7b11c1f773d6690bd0a9
                                                          • Instruction Fuzzy Hash: 4D715AB4608204AFEB35DF64CC95FAEBBB9FF0A310F14445AF945972A1CB35A845DB20
                                                          APIs
                                                          • GetParent.USER32(?), ref: 00A0AEF9
                                                          • GetKeyboardState.USER32(?), ref: 00A0AF0E
                                                          • SetKeyboardState.USER32(?), ref: 00A0AF6F
                                                          • PostMessageW.USER32(?,00000101,00000010,?), ref: 00A0AF9D
                                                          • PostMessageW.USER32(?,00000101,00000011,?), ref: 00A0AFBC
                                                          • PostMessageW.USER32(?,00000101,00000012,?), ref: 00A0AFFD
                                                          • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00A0B020
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: 1f5c1ac01efde82bfab00405d803ff3f51178105420c4898a118cddcf19d7699
                                                          • Instruction ID: 1599a2bd2064d28c51c741eed5b4f1a113454bf2145f3fefd3dc9b97a8b74cc1
                                                          • Opcode Fuzzy Hash: 1f5c1ac01efde82bfab00405d803ff3f51178105420c4898a118cddcf19d7699
                                                          • Instruction Fuzzy Hash: 9751D1A0A147DA3EFB368734DD45BBBBEA95B06304F088489F1D9958C2C398ACC4D761
                                                          APIs
                                                          • GetParent.USER32(00000000), ref: 00A0AD19
                                                          • GetKeyboardState.USER32(?), ref: 00A0AD2E
                                                          • SetKeyboardState.USER32(?), ref: 00A0AD8F
                                                          • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00A0ADBB
                                                          • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00A0ADD8
                                                          • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00A0AE17
                                                          • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00A0AE38
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: 9518a0fe723e18cb6faad8dc4eac0e23f3a7b7adef6f6f74bf3c31d6562774ac
                                                          • Instruction ID: c532ceb93a556e524820a6e35e63d9410b352710a07729d00af15fbb0227c262
                                                          • Opcode Fuzzy Hash: 9518a0fe723e18cb6faad8dc4eac0e23f3a7b7adef6f6f74bf3c31d6562774ac
                                                          • Instruction Fuzzy Hash: F95107A1A147E93DFB338334DC55BBABEA95B56300F088489F1D5568C3D394EC88D762
                                                          APIs
                                                          • GetConsoleCP.KERNEL32(009E3CD6,?,?,?,?,?,?,?,?,009D5BA3,?,?,009E3CD6,?,?), ref: 009D5470
                                                          • __fassign.LIBCMT ref: 009D54EB
                                                          • __fassign.LIBCMT ref: 009D5506
                                                          • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,009E3CD6,00000005,00000000,00000000), ref: 009D552C
                                                          • WriteFile.KERNEL32(?,009E3CD6,00000000,009D5BA3,00000000,?,?,?,?,?,?,?,?,?,009D5BA3,?), ref: 009D554B
                                                          • WriteFile.KERNEL32(?,?,00000001,009D5BA3,00000000,?,?,?,?,?,?,?,?,?,009D5BA3,?), ref: 009D5584
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                          • String ID:
                                                          • API String ID: 1324828854-0
                                                          • Opcode ID: 47cdf955f17599b95e17b73ed6b6e5909934a0bad025eb3f279853c3cad35690
                                                          • Instruction ID: a7afd514a030f6ca33aca619dc774a0dcd2b7b7562bfe3880fca2b04377cbe70
                                                          • Opcode Fuzzy Hash: 47cdf955f17599b95e17b73ed6b6e5909934a0bad025eb3f279853c3cad35690
                                                          • Instruction Fuzzy Hash: 7E51C070A00649AFDB11CFA8EC45AEEBBF9EF08300F15851BF555E7391D6309A81CB60
                                                          APIs
                                                          • _ValidateLocalCookies.LIBCMT ref: 009C2D4B
                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 009C2D53
                                                          • _ValidateLocalCookies.LIBCMT ref: 009C2DE1
                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 009C2E0C
                                                          • _ValidateLocalCookies.LIBCMT ref: 009C2E61
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                          • String ID: csm
                                                          • API String ID: 1170836740-1018135373
                                                          • Opcode ID: 3c7aa84eec09284f1e9bad31f72879d776e4d4f275f3d2ae2c21946dcdb234ab
                                                          • Instruction ID: d7bb9b763ace8771f2d0882e1f5e35746d2287156ba7347a483bb38ad7b4d029
                                                          • Opcode Fuzzy Hash: 3c7aa84eec09284f1e9bad31f72879d776e4d4f275f3d2ae2c21946dcdb234ab
                                                          • Instruction Fuzzy Hash: F541C334E00209ABCF10DF68C845F9EBBB9BF84364F148159E8156B392DB31AA01CBD2
                                                          APIs
                                                            • Part of subcall function 00A2304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00A2307A
                                                            • Part of subcall function 00A2304E: _wcslen.LIBCMT ref: 00A2309B
                                                          • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00A21112
                                                          • WSAGetLastError.WSOCK32 ref: 00A21121
                                                          • WSAGetLastError.WSOCK32 ref: 00A211C9
                                                          • closesocket.WSOCK32(00000000), ref: 00A211F9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 2675159561-0
                                                          • Opcode ID: 6e8a8e27eefefbf68d1191ea9c2d1964c0dedd0cc98756416055340a655e55f5
                                                          • Instruction ID: c6e0ec31966f52118c061e2e5d57846bc71211aaefe3f3fb389957f4a78e0069
                                                          • Opcode Fuzzy Hash: 6e8a8e27eefefbf68d1191ea9c2d1964c0dedd0cc98756416055340a655e55f5
                                                          • Instruction Fuzzy Hash: 3C41F431600214AFDB10DF68DC85BAAB7E9FF95324F148169FD05AB291D770AE42CBE1
                                                          APIs
                                                            • Part of subcall function 00A0DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00A0CF22,?), ref: 00A0DDFD
                                                            • Part of subcall function 00A0DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00A0CF22,?), ref: 00A0DE16
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 00A0CF45
                                                          • MoveFileW.KERNEL32(?,?), ref: 00A0CF7F
                                                          • _wcslen.LIBCMT ref: 00A0D005
                                                          • _wcslen.LIBCMT ref: 00A0D01B
                                                          • SHFileOperationW.SHELL32(?), ref: 00A0D061
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                          • String ID: \*.*
                                                          • API String ID: 3164238972-1173974218
                                                          • Opcode ID: e4d4695f442b68cef7e0c2d03a224862e7221c609de82a6c3499a3bce7027c30
                                                          • Instruction ID: 2a3098210fb9efd9ce7d0f0e3062f0a34332b0c3d838f39f6a7949a7c0dccd48
                                                          • Opcode Fuzzy Hash: e4d4695f442b68cef7e0c2d03a224862e7221c609de82a6c3499a3bce7027c30
                                                          • Instruction Fuzzy Hash: 8A4155B190521D5FDF12EFA4ED81FDEB7B8AF48790F0000E6E505EB182EA34AA44CB51
                                                          APIs
                                                          • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00A32E1C
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00A32E4F
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00A32E84
                                                          • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00A32EB6
                                                          • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00A32EE0
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00A32EF1
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00A32F0B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: LongWindow$MessageSend
                                                          • String ID:
                                                          • API String ID: 2178440468-0
                                                          • Opcode ID: 52dac29a4d14054157c640457351fece0acc22d66eb37fb85e6b828f96c22095
                                                          • Instruction ID: 3e51d391bf3a68d31dc43f3635de1ada5c761382576181b623419e1e6f026553
                                                          • Opcode Fuzzy Hash: 52dac29a4d14054157c640457351fece0acc22d66eb37fb85e6b828f96c22095
                                                          • Instruction Fuzzy Hash: 17313731644250AFDB20CF98DC86F653BE0FB8A720F245164FA049F2B1CB75AC82DB40
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A07769
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A0778F
                                                          • SysAllocString.OLEAUT32(00000000), ref: 00A07792
                                                          • SysAllocString.OLEAUT32(?), ref: 00A077B0
                                                          • SysFreeString.OLEAUT32(?), ref: 00A077B9
                                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 00A077DE
                                                          • SysAllocString.OLEAUT32(?), ref: 00A077EC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                          • String ID:
                                                          • API String ID: 3761583154-0
                                                          • Opcode ID: 7a8da0fd463e29542fdd4293985f42a5fd025af9834e400ee89caa655c11af53
                                                          • Instruction ID: 343a3e0531983af7d25c6f4bc3b2fa99731221364674ade6c9d5fe325792464f
                                                          • Opcode Fuzzy Hash: 7a8da0fd463e29542fdd4293985f42a5fd025af9834e400ee89caa655c11af53
                                                          • Instruction Fuzzy Hash: FA21A176A0421DAFDF10DFA8DC88DBF77ACEB097A4B048025FA15DB191D670ED428760
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A07842
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A07868
                                                          • SysAllocString.OLEAUT32(00000000), ref: 00A0786B
                                                          • SysAllocString.OLEAUT32 ref: 00A0788C
                                                          • SysFreeString.OLEAUT32 ref: 00A07895
                                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 00A078AF
                                                          • SysAllocString.OLEAUT32(?), ref: 00A078BD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                          • String ID:
                                                          • API String ID: 3761583154-0
                                                          • Opcode ID: 21122a503a01b13e56f28ef4cc23249d2ca4d0f195008488c8410e860e7e1845
                                                          • Instruction ID: fe24e401e6df94ae2809b20de056f2d78926e62aaddde3c6bf1d33797312b7e0
                                                          • Opcode Fuzzy Hash: 21122a503a01b13e56f28ef4cc23249d2ca4d0f195008488c8410e860e7e1845
                                                          • Instruction Fuzzy Hash: 44216232A04208AFDB10DFE8DC8DDAE77ACEB097607108125F915DB2A1D674EC85CB64
                                                          APIs
                                                          • GetStdHandle.KERNEL32(0000000C), ref: 00A104F2
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00A1052E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateHandlePipe
                                                          • String ID: nul
                                                          • API String ID: 1424370930-2873401336
                                                          • Opcode ID: 22368dd3a169b94c02cdb44913bfb776dfbb83af817e83d0e81276ac016317c4
                                                          • Instruction ID: 55fb6efa740a14525d6b50c8109f6211ae5f7b9a7660d1fa7ac178b22f282c99
                                                          • Opcode Fuzzy Hash: 22368dd3a169b94c02cdb44913bfb776dfbb83af817e83d0e81276ac016317c4
                                                          • Instruction Fuzzy Hash: EA213D75500305ABDB209F69DC44EDABBB6BF54774F208A19F8A1E62E0D7B099D1CF20
                                                          APIs
                                                          • GetStdHandle.KERNEL32(000000F6), ref: 00A105C6
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00A10601
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateHandlePipe
                                                          • String ID: nul
                                                          • API String ID: 1424370930-2873401336
                                                          • Opcode ID: 225e81c61c06bad161fba7f1082e8e971d80f5c37a1cb6e100e65e70bb3c7ec9
                                                          • Instruction ID: 8826c42897749b1fd5489450f4ddac54a5cbc958492cd726a39ab297389bc590
                                                          • Opcode Fuzzy Hash: 225e81c61c06bad161fba7f1082e8e971d80f5c37a1cb6e100e65e70bb3c7ec9
                                                          • Instruction Fuzzy Hash: 5E2141755003059BDB209FA99C44EDAB7A5AF95730F204A19F8B1E72D0D7F099E1CB50
                                                          APIs
                                                            • Part of subcall function 009A600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 009A604C
                                                            • Part of subcall function 009A600E: GetStockObject.GDI32(00000011), ref: 009A6060
                                                            • Part of subcall function 009A600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 009A606A
                                                          • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00A34112
                                                          • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00A3411F
                                                          • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00A3412A
                                                          • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00A34139
                                                          • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00A34145
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CreateObjectStockWindow
                                                          • String ID: Msctls_Progress32
                                                          • API String ID: 1025951953-3636473452
                                                          • Opcode ID: cc1c761aeb1ea25bd7f1c1ccd2c6a36c227e7d8501ee5ea41f05d0c1a90eb15b
                                                          • Instruction ID: f60045719e1b91ada02b55eb46e2d116d543e9099de59852e6967dd3f760e915
                                                          • Opcode Fuzzy Hash: cc1c761aeb1ea25bd7f1c1ccd2c6a36c227e7d8501ee5ea41f05d0c1a90eb15b
                                                          • Instruction Fuzzy Hash: 8C11B2B2150219BEEF118FA4CC86EE77FADEF09798F014111FA18A2050CB769C61DBA4
                                                          APIs
                                                            • Part of subcall function 009DD7A3: _free.LIBCMT ref: 009DD7CC
                                                          • _free.LIBCMT ref: 009DD82D
                                                            • Part of subcall function 009D29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,009DD7D1,00000000,00000000,00000000,00000000,?,009DD7F8,00000000,00000007,00000000,?,009DDBF5,00000000), ref: 009D29DE
                                                            • Part of subcall function 009D29C8: GetLastError.KERNEL32(00000000,?,009DD7D1,00000000,00000000,00000000,00000000,?,009DD7F8,00000000,00000007,00000000,?,009DDBF5,00000000,00000000), ref: 009D29F0
                                                          • _free.LIBCMT ref: 009DD838
                                                          • _free.LIBCMT ref: 009DD843
                                                          • _free.LIBCMT ref: 009DD897
                                                          • _free.LIBCMT ref: 009DD8A2
                                                          • _free.LIBCMT ref: 009DD8AD
                                                          • _free.LIBCMT ref: 009DD8B8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                          • Instruction ID: 5cd90b801f3497e71f8588e03df04e79a25cc8f57ab9715de7d39b59ba3cf581
                                                          • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                          • Instruction Fuzzy Hash: 0E1151B15C2B04AAE521BFB0CC47FCB7BDC6F90700F408826B29DB6292DA65B5055650
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00A0DA74
                                                          • LoadStringW.USER32(00000000), ref: 00A0DA7B
                                                          • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00A0DA91
                                                          • LoadStringW.USER32(00000000), ref: 00A0DA98
                                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00A0DADC
                                                          Strings
                                                          • %s (%d) : ==> %s: %s %s, xrefs: 00A0DAB9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString$Message
                                                          • String ID: %s (%d) : ==> %s: %s %s
                                                          • API String ID: 4072794657-3128320259
                                                          • Opcode ID: 028ac7f3235e13422ad8005d92bd46da7a68958d35e243c819efbca7c1021060
                                                          • Instruction ID: 0091e666dbf850dfda22409f8c4b2214c301dfd11194fb77b4cb17946022a2f7
                                                          • Opcode Fuzzy Hash: 028ac7f3235e13422ad8005d92bd46da7a68958d35e243c819efbca7c1021060
                                                          • Instruction Fuzzy Hash: F80162F35002087FE710DBE09D89EE7726CE708311F400595B706F2082EA749E854F74
                                                          APIs
                                                          • InterlockedExchange.KERNEL32(014647F0,014647F0), ref: 00A1097B
                                                          • EnterCriticalSection.KERNEL32(014647D0,00000000), ref: 00A1098D
                                                          • TerminateThread.KERNEL32(?,000001F6), ref: 00A1099B
                                                          • WaitForSingleObject.KERNEL32(?,000003E8), ref: 00A109A9
                                                          • CloseHandle.KERNEL32(?), ref: 00A109B8
                                                          • InterlockedExchange.KERNEL32(014647F0,000001F6), ref: 00A109C8
                                                          • LeaveCriticalSection.KERNEL32(014647D0), ref: 00A109CF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                          • String ID:
                                                          • API String ID: 3495660284-0
                                                          • Opcode ID: f20ae8fc21e9f73c60c673fdeab8d3f080ee9a0c6a15e8232060466ecfb5ec99
                                                          • Instruction ID: a876e938b287de502ddaa7d13f35e39ea88e0d50e04f5eef2f8f67d842c3c0cd
                                                          • Opcode Fuzzy Hash: f20ae8fc21e9f73c60c673fdeab8d3f080ee9a0c6a15e8232060466ecfb5ec99
                                                          • Instruction Fuzzy Hash: EEF03131442512BBD741AFD4EE8CBD6BB35FF05712F401015F201608A1C7B494B6CF90
                                                          APIs
                                                          • GetClientRect.USER32(?,?), ref: 009A5D30
                                                          • GetWindowRect.USER32(?,?), ref: 009A5D71
                                                          • ScreenToClient.USER32(?,?), ref: 009A5D99
                                                          • GetClientRect.USER32(?,?), ref: 009A5ED7
                                                          • GetWindowRect.USER32(?,?), ref: 009A5EF8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Rect$Client$Window$Screen
                                                          • String ID:
                                                          • API String ID: 1296646539-0
                                                          • Opcode ID: d7068681ec39f0d39093712e02c6ad5f9352ac7e8444343b0beec742d225d0a9
                                                          • Instruction ID: 35a7e6411bcf0bc40a9395623689df7084dcd81b6ee764bdd97132fabfa4f580
                                                          • Opcode Fuzzy Hash: d7068681ec39f0d39093712e02c6ad5f9352ac7e8444343b0beec742d225d0a9
                                                          • Instruction Fuzzy Hash: 90B19D34A0078AEBDB10CFA9C4407EEB7F5FF58310F14881AE8A9D7250D734AA51DB90
                                                          APIs
                                                          • __allrem.LIBCMT ref: 009D00BA
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 009D00D6
                                                          • __allrem.LIBCMT ref: 009D00ED
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 009D010B
                                                          • __allrem.LIBCMT ref: 009D0122
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 009D0140
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                          • String ID:
                                                          • API String ID: 1992179935-0
                                                          • Opcode ID: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                          • Instruction ID: 6e449b314ae05e6937b7d4d798190c3b2830b226db762e66fcd799562b1fcf37
                                                          • Opcode Fuzzy Hash: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                          • Instruction Fuzzy Hash: 3F81E272A40706ABE720AB69CC51B6AB3A9EFC1364F24853FF551D7781E770DA008B91
                                                          APIs
                                                            • Part of subcall function 00A23149: select.WSOCK32(00000000,?,00000000,00000000,?,?,?,00000000,?,?,?,00A2101C,00000000,?,?,00000000), ref: 00A23195
                                                          • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00A21DC0
                                                          • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00A21DE1
                                                          • WSAGetLastError.WSOCK32 ref: 00A21DF2
                                                          • inet_ntoa.WSOCK32(?), ref: 00A21E8C
                                                          • htons.WSOCK32(?,?,?,?,?), ref: 00A21EDB
                                                          • _strlen.LIBCMT ref: 00A21F35
                                                            • Part of subcall function 00A039E8: _strlen.LIBCMT ref: 00A039F2
                                                            • Part of subcall function 009A6D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000002,?,?,?,?,009BCF58,?,?,?), ref: 009A6DBA
                                                            • Part of subcall function 009A6D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,?,?,?,009BCF58,?,?,?), ref: 009A6DED
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide_strlen$ErrorLasthtonsinet_ntoaselect
                                                          • String ID:
                                                          • API String ID: 1923757996-0
                                                          • Opcode ID: 5a5d7a7da9b1accc409d06d3b262522452484c362b57e5141b3b54c840a74fe9
                                                          • Instruction ID: 520f3a77b805abc51cdcef880a875312230c0dd46010cb5d18004cc7d2353f85
                                                          • Opcode Fuzzy Hash: 5a5d7a7da9b1accc409d06d3b262522452484c362b57e5141b3b54c840a74fe9
                                                          • Instruction Fuzzy Hash: BFA1ED31604310AFC324DF28D895F2A7BA5AFD5318F54896CF4665B2E2DB31EE42CB91
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,009C82D9,009C82D9,?,?,?,009D644F,00000001,00000001,8BE85006), ref: 009D6258
                                                          • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,009D644F,00000001,00000001,8BE85006,?,?,?), ref: 009D62DE
                                                          • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 009D63D8
                                                          • __freea.LIBCMT ref: 009D63E5
                                                            • Part of subcall function 009D3820: RtlAllocateHeap.NTDLL(00000000,?,00A71444,?,009BFDF5,?,?,009AA976,00000010,00A71440,009A13FC,?,009A13C6,?,009A1129), ref: 009D3852
                                                          • __freea.LIBCMT ref: 009D63EE
                                                          • __freea.LIBCMT ref: 009D6413
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1414292761-0
                                                          • Opcode ID: 15ea37208c42928e620603d81634b11ecb884d7565d30a018b204a67f9686413
                                                          • Instruction ID: 26dd41b28d96eb2ada58c92bfd57fd80d66902774b103555a472f9ec461cc7c3
                                                          • Opcode Fuzzy Hash: 15ea37208c42928e620603d81634b11ecb884d7565d30a018b204a67f9686413
                                                          • Instruction Fuzzy Hash: 0751E172A40216ABDB258FA4CC81FBFB7A9EB84750F15C72AFD05D6241DB34DC40D660
                                                          APIs
                                                            • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                            • Part of subcall function 00A2C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A2B6AE,?,?), ref: 00A2C9B5
                                                            • Part of subcall function 00A2C998: _wcslen.LIBCMT ref: 00A2C9F1
                                                            • Part of subcall function 00A2C998: _wcslen.LIBCMT ref: 00A2CA68
                                                            • Part of subcall function 00A2C998: _wcslen.LIBCMT ref: 00A2CA9E
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A2BCCA
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00A2BD25
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00A2BD6A
                                                          • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00A2BD99
                                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00A2BDF3
                                                          • RegCloseKey.ADVAPI32(?), ref: 00A2BDFF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                          • String ID:
                                                          • API String ID: 1120388591-0
                                                          • Opcode ID: b3c6e766e6a416ab5e29b2adb8f93d449641a57cdc240cc1fdafda7b6ce402f8
                                                          • Instruction ID: 098b099d0e20c6997c7b82cbd982239900db5f44a3bd5c2742a1ef3ccab8e017
                                                          • Opcode Fuzzy Hash: b3c6e766e6a416ab5e29b2adb8f93d449641a57cdc240cc1fdafda7b6ce402f8
                                                          • Instruction Fuzzy Hash: E881AE30218241EFC714DF28D891E6ABBE5FF85318F14896CF4594B2A2DB31ED45CBA2
                                                          APIs
                                                          • VariantInit.OLEAUT32(00000035), ref: 009FF7B9
                                                          • SysAllocString.OLEAUT32(00000001), ref: 009FF860
                                                          • VariantCopy.OLEAUT32(009FFA64,00000000), ref: 009FF889
                                                          • VariantClear.OLEAUT32(009FFA64), ref: 009FF8AD
                                                          • VariantCopy.OLEAUT32(009FFA64,00000000), ref: 009FF8B1
                                                          • VariantClear.OLEAUT32(?), ref: 009FF8BB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCopy$AllocInitString
                                                          • String ID:
                                                          • API String ID: 3859894641-0
                                                          • Opcode ID: 8d35731d7ad8b5d064877826db119e9ae8cf2f9bb987116ffe6e330cfe9dd42b
                                                          • Instruction ID: b13cb309d463835c6020c61b0fb144a42664f2e9219a8b696e5cd963000b4041
                                                          • Opcode Fuzzy Hash: 8d35731d7ad8b5d064877826db119e9ae8cf2f9bb987116ffe6e330cfe9dd42b
                                                          • Instruction Fuzzy Hash: 2F51EC35500318BACF14AF65D8B5739B3A8EF85720F249467FA06DF292DBB48C80D796
                                                          APIs
                                                            • Part of subcall function 009A7620: _wcslen.LIBCMT ref: 009A7625
                                                            • Part of subcall function 009A6B57: _wcslen.LIBCMT ref: 009A6B6A
                                                          • GetOpenFileNameW.COMDLG32(00000058), ref: 00A194E5
                                                          • _wcslen.LIBCMT ref: 00A19506
                                                          • _wcslen.LIBCMT ref: 00A1952D
                                                          • GetSaveFileNameW.COMDLG32(00000058), ref: 00A19585
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$FileName$OpenSave
                                                          • String ID: X
                                                          • API String ID: 83654149-3081909835
                                                          • Opcode ID: 7d30d382db41a7221f451b11333c45851a0eeb954b33603b032d291e02429ae6
                                                          • Instruction ID: dac96522961097546b714197db3410f3dec61909d5a7d4b7d36fbe0128694ba3
                                                          • Opcode Fuzzy Hash: 7d30d382db41a7221f451b11333c45851a0eeb954b33603b032d291e02429ae6
                                                          • Instruction Fuzzy Hash: 73E18E31A083109FD724DF24C891BAAB7E5BFC5314F04896DF8999B2A2DB31DD45CB92
                                                          APIs
                                                            • Part of subcall function 009B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 009B9BB2
                                                          • BeginPaint.USER32(?,?,?), ref: 009B9241
                                                          • GetWindowRect.USER32(?,?), ref: 009B92A5
                                                          • ScreenToClient.USER32(?,?), ref: 009B92C2
                                                          • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 009B92D3
                                                          • EndPaint.USER32(?,?,?,?,?), ref: 009B9321
                                                          • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 009F71EA
                                                            • Part of subcall function 009B9339: BeginPath.GDI32(00000000), ref: 009B9357
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                          • String ID:
                                                          • API String ID: 3050599898-0
                                                          • Opcode ID: 336638d275780c1e8edff17b0df2d31863558d254c299fcc3c04898f12f277d8
                                                          • Instruction ID: c5490f4d58a8b4982857200cbd2971007a27b60dddfb781a6c87e36890abc5c0
                                                          • Opcode Fuzzy Hash: 336638d275780c1e8edff17b0df2d31863558d254c299fcc3c04898f12f277d8
                                                          • Instruction Fuzzy Hash: 5141AF31108204AFD711DFA8CC85FBA7BE8EB45730F144629FA64972A1C7319846DB61
                                                          APIs
                                                          • InterlockedExchange.KERNEL32(?,000001F5), ref: 00A1080C
                                                          • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00A10847
                                                          • EnterCriticalSection.KERNEL32(?), ref: 00A10863
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 00A108DC
                                                          • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 00A108F3
                                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 00A10921
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                          • String ID:
                                                          • API String ID: 3368777196-0
                                                          • Opcode ID: 305f8d0cbb70adbff97000e13528d7ebdc6deef3d99f88d4038eeb755c3726ed
                                                          • Instruction ID: 97b75eb65a937778d3ee029daa0046397e7f0aa04c48c8d4aca04e22364d902a
                                                          • Opcode Fuzzy Hash: 305f8d0cbb70adbff97000e13528d7ebdc6deef3d99f88d4038eeb755c3726ed
                                                          • Instruction Fuzzy Hash: 7E416971900205EBDF14EFA4DC85AAA77B9FF44710F1440A9ED04AA297DB70DEA1DBA0
                                                          APIs
                                                          • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,009FF3AB,00000000,?,?,00000000,?,009F682C,00000004,00000000,00000000), ref: 00A3824C
                                                          • EnableWindow.USER32(?,00000000), ref: 00A38272
                                                          • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00A382D1
                                                          • ShowWindow.USER32(?,00000004), ref: 00A382E5
                                                          • EnableWindow.USER32(?,00000001), ref: 00A3830B
                                                          • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00A3832F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Show$Enable$MessageSend
                                                          • String ID:
                                                          • API String ID: 642888154-0
                                                          • Opcode ID: 6e35fbfe77a5d109b0795c9abc506be31532efcf7955d39b625aade9d69f63b8
                                                          • Instruction ID: eff9dfc882b9f960d2d768388b9ab032cafa52bace893c26e2fa624032aafca7
                                                          • Opcode Fuzzy Hash: 6e35fbfe77a5d109b0795c9abc506be31532efcf7955d39b625aade9d69f63b8
                                                          • Instruction Fuzzy Hash: 1641A574601744AFDB11CF95DC99BE57BE0FB0A714F184169FA185F262CB35A842CB50
                                                          APIs
                                                          • IsWindowVisible.USER32(?), ref: 00A04C95
                                                          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00A04CB2
                                                          • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00A04CEA
                                                          • _wcslen.LIBCMT ref: 00A04D08
                                                          • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00A04D10
                                                          • _wcsstr.LIBVCRUNTIME ref: 00A04D1A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                          • String ID:
                                                          • API String ID: 72514467-0
                                                          • Opcode ID: fcc19e29eb57e96091d6dff79a51bba60f9c8b0203157ff8f2750d78cfbc07dd
                                                          • Instruction ID: c79046b17512f1431d65d99ea5054a942f9007e7aece1b2fd2c5baa21bf59aa9
                                                          • Opcode Fuzzy Hash: fcc19e29eb57e96091d6dff79a51bba60f9c8b0203157ff8f2750d78cfbc07dd
                                                          • Instruction Fuzzy Hash: F62129B26042047BEB159B75AC0AF7B7BACEF89760F10402DF905DA1D1DB75CD0187A0
                                                          APIs
                                                            • Part of subcall function 009A3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,009A3A97,?,?,009A2E7F,?,?,?,00000000), ref: 009A3AC2
                                                          • _wcslen.LIBCMT ref: 00A1587B
                                                          • CoInitialize.OLE32(00000000), ref: 00A15995
                                                          • CoCreateInstance.OLE32(00A3FCF8,00000000,00000001,00A3FB68,?), ref: 00A159AE
                                                          • CoUninitialize.OLE32 ref: 00A159CC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                          • String ID: .lnk
                                                          • API String ID: 3172280962-24824748
                                                          • Opcode ID: 6e033469e58e716d0726db179edd5a13240343b23af52c2aee6f061636c42024
                                                          • Instruction ID: 3fe952a7308d53f20840f826b59d49a4bad16447e79889fd64e69045539d4f22
                                                          • Opcode Fuzzy Hash: 6e033469e58e716d0726db179edd5a13240343b23af52c2aee6f061636c42024
                                                          • Instruction Fuzzy Hash: 64D14271A08601DFC714DF24C884A6ABBE5FFC9710F148859F88A9B261DB31ED85CB92
                                                          APIs
                                                            • Part of subcall function 00A00FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00A00FCA
                                                            • Part of subcall function 00A00FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00A00FD6
                                                            • Part of subcall function 00A00FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00A00FE5
                                                            • Part of subcall function 00A00FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00A00FEC
                                                            • Part of subcall function 00A00FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00A01002
                                                          • GetLengthSid.ADVAPI32(?,00000000,00A01335), ref: 00A017AE
                                                          • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00A017BA
                                                          • HeapAlloc.KERNEL32(00000000), ref: 00A017C1
                                                          • CopySid.ADVAPI32(00000000,00000000,?), ref: 00A017DA
                                                          • GetProcessHeap.KERNEL32(00000000,00000000,00A01335), ref: 00A017EE
                                                          • HeapFree.KERNEL32(00000000), ref: 00A017F5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                          • String ID:
                                                          • API String ID: 3008561057-0
                                                          • Opcode ID: 9209ed13d3356624cf392c347d2635d54a1af2b905727d614a6cc52a7c7f2842
                                                          • Instruction ID: a3d72c62c8104051d4f5005936aa2ca7b3f1380627554766eda5db66aae320be
                                                          • Opcode Fuzzy Hash: 9209ed13d3356624cf392c347d2635d54a1af2b905727d614a6cc52a7c7f2842
                                                          • Instruction Fuzzy Hash: 00117932600209EFDB14DFA4EC59FEE7BB9EB46365F104118F481A7290D736A945DF60
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00A014FF
                                                          • OpenProcessToken.ADVAPI32(00000000), ref: 00A01506
                                                          • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00A01515
                                                          • CloseHandle.KERNEL32(00000004), ref: 00A01520
                                                          • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00A0154F
                                                          • DestroyEnvironmentBlock.USERENV(00000000), ref: 00A01563
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                          • String ID:
                                                          • API String ID: 1413079979-0
                                                          • Opcode ID: 52a78c0cb7b128d395c3669605d7ee1cd0ee6e803fab26f8ab75f0ce2d6d5433
                                                          • Instruction ID: c41f492ec5823d33b666d015798fbaf4c8829f3ce0569b3b44149f80e4284793
                                                          • Opcode Fuzzy Hash: 52a78c0cb7b128d395c3669605d7ee1cd0ee6e803fab26f8ab75f0ce2d6d5433
                                                          • Instruction Fuzzy Hash: FE1156B250020DABDF11CFE8ED49FDE7BA9EF48718F044024FA05A60A0C3769E65DB60
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,009C3379,009C2FE5), ref: 009C3390
                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 009C339E
                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 009C33B7
                                                          • SetLastError.KERNEL32(00000000,?,009C3379,009C2FE5), ref: 009C3409
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLastValue___vcrt_
                                                          • String ID:
                                                          • API String ID: 3852720340-0
                                                          • Opcode ID: 295cc91d4d2a119a64d8f2690fa52ee2d500f56f35122229b4834b3f40a7bc61
                                                          • Instruction ID: 312eea314c76fb29886d59c6c082e1e7a0b41e80c74b4b5bc44a4927a1f7b5fc
                                                          • Opcode Fuzzy Hash: 295cc91d4d2a119a64d8f2690fa52ee2d500f56f35122229b4834b3f40a7bc61
                                                          • Instruction Fuzzy Hash: 53012432E0C711BEE62427B47C96F762AA8EB45379360C32EF410852F0FF514D025286
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,009D5686,009E3CD6,?,00000000,?,009D5B6A,?,?,?,?,?,009CE6D1,?,00A68A48), ref: 009D2D78
                                                          • _free.LIBCMT ref: 009D2DAB
                                                          • _free.LIBCMT ref: 009D2DD3
                                                          • SetLastError.KERNEL32(00000000,?,?,?,?,009CE6D1,?,00A68A48,00000010,009A4F4A,?,?,00000000,009E3CD6), ref: 009D2DE0
                                                          • SetLastError.KERNEL32(00000000,?,?,?,?,009CE6D1,?,00A68A48,00000010,009A4F4A,?,?,00000000,009E3CD6), ref: 009D2DEC
                                                          • _abort.LIBCMT ref: 009D2DF2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_free$_abort
                                                          • String ID:
                                                          • API String ID: 3160817290-0
                                                          • Opcode ID: c256b32d9413b31d01bb4b1366e0f402dd1a554d8881a7e02598dfd4611dcc69
                                                          • Instruction ID: 68f7a7c35b3c0145952efe3c5a467968eb23e294a49c0d7365d6b1746abab0a5
                                                          • Opcode Fuzzy Hash: c256b32d9413b31d01bb4b1366e0f402dd1a554d8881a7e02598dfd4611dcc69
                                                          • Instruction Fuzzy Hash: 24F0CD355C460067C21267747C06F5B266F6FE27B1F25C517F464A73D2EE6488025271
                                                          APIs
                                                            • Part of subcall function 009B9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 009B9693
                                                            • Part of subcall function 009B9639: SelectObject.GDI32(?,00000000), ref: 009B96A2
                                                            • Part of subcall function 009B9639: BeginPath.GDI32(?), ref: 009B96B9
                                                            • Part of subcall function 009B9639: SelectObject.GDI32(?,00000000), ref: 009B96E2
                                                          • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00A38A4E
                                                          • LineTo.GDI32(?,00000003,00000000), ref: 00A38A62
                                                          • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00A38A70
                                                          • LineTo.GDI32(?,00000000,00000003), ref: 00A38A80
                                                          • EndPath.GDI32(?), ref: 00A38A90
                                                          • StrokePath.GDI32(?), ref: 00A38AA0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                          • String ID:
                                                          • API String ID: 43455801-0
                                                          • Opcode ID: 1207b901bb2bcd7d18154d2eb1cbd92219df59249dc2a415d8749698c3624b71
                                                          • Instruction ID: cdda1c94659081a9561c33c747ce215edd105305a23d8cb21176f63c2195c10b
                                                          • Opcode Fuzzy Hash: 1207b901bb2bcd7d18154d2eb1cbd92219df59249dc2a415d8749698c3624b71
                                                          • Instruction Fuzzy Hash: 2911CC7640014DFFDB11DFD4DC48E9A7F6DEB05364F048011FA1999161C7719D56DB60
                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 00A05218
                                                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 00A05229
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00A05230
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 00A05238
                                                          • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00A0524F
                                                          • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00A05261
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: CapsDevice$Release
                                                          • String ID:
                                                          • API String ID: 1035833867-0
                                                          • Opcode ID: 60169d6a776f325ad0a7324bf8806c25220a5035b0591f8aa5edf8afdc2929ed
                                                          • Instruction ID: 585e420d12057e27e71d22271f73f550da0c936f1e12e031982d861064148eb4
                                                          • Opcode Fuzzy Hash: 60169d6a776f325ad0a7324bf8806c25220a5035b0591f8aa5edf8afdc2929ed
                                                          • Instruction Fuzzy Hash: 91014F75E00718BBEB109BF59C49B5EBFB8EF48761F044065FA04E7291D6709901CFA0
                                                          APIs
                                                          • MapVirtualKeyW.USER32(0000005B,00000000), ref: 009A1BF4
                                                          • MapVirtualKeyW.USER32(00000010,00000000), ref: 009A1BFC
                                                          • MapVirtualKeyW.USER32(000000A0,00000000), ref: 009A1C07
                                                          • MapVirtualKeyW.USER32(000000A1,00000000), ref: 009A1C12
                                                          • MapVirtualKeyW.USER32(00000011,00000000), ref: 009A1C1A
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 009A1C22
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Virtual
                                                          • String ID:
                                                          • API String ID: 4278518827-0
                                                          • Opcode ID: 49e819b7814d94e68da622e601b9ac326db4ef3ce621dc8f2568275bb6a970dd
                                                          • Instruction ID: 74b703975d66cc58a9cc6e4452c1a5f2f5891e44dc75f26e2634c1a1742ffddf
                                                          • Opcode Fuzzy Hash: 49e819b7814d94e68da622e601b9ac326db4ef3ce621dc8f2568275bb6a970dd
                                                          • Instruction Fuzzy Hash: 820167B0902B5ABDE3008F6A8C85B52FFA8FF19354F00411BA15C4BA42C7F5A864CBE5
                                                          APIs
                                                          • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00A0EB30
                                                          • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00A0EB46
                                                          • GetWindowThreadProcessId.USER32(?,?), ref: 00A0EB55
                                                          • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00A0EB64
                                                          • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00A0EB6E
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00A0EB75
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                          • String ID:
                                                          • API String ID: 839392675-0
                                                          • Opcode ID: 38ee2948ef8f1faff6606852f8ea731c516f300a2fa51cadd3908b05a8656270
                                                          • Instruction ID: 089a4777de07f89127d4131fb913b436d1115f196fa07cfd732802134edc3f0f
                                                          • Opcode Fuzzy Hash: 38ee2948ef8f1faff6606852f8ea731c516f300a2fa51cadd3908b05a8656270
                                                          • Instruction Fuzzy Hash: 1FF05E72240158BBE7219BA29C0EEEF7E7CEFCBB21F004158F601E1091D7A45A02D7B5
                                                          APIs
                                                          • GetClientRect.USER32(?), ref: 009F7452
                                                          • SendMessageW.USER32(?,00001328,00000000,?), ref: 009F7469
                                                          • GetWindowDC.USER32(?), ref: 009F7475
                                                          • GetPixel.GDI32(00000000,?,?), ref: 009F7484
                                                          • ReleaseDC.USER32(?,00000000), ref: 009F7496
                                                          • GetSysColor.USER32(00000005), ref: 009F74B0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                          • String ID:
                                                          • API String ID: 272304278-0
                                                          • Opcode ID: 81d9b3d3a3919f310e8495265aab18ea9d800a1d4b9a184660440fc4ba8c1b55
                                                          • Instruction ID: 857f6821581bf6d06b5662f21eee8b7092e1387f47be16a35d8ff85cf8c968e7
                                                          • Opcode Fuzzy Hash: 81d9b3d3a3919f310e8495265aab18ea9d800a1d4b9a184660440fc4ba8c1b55
                                                          • Instruction Fuzzy Hash: 77014B31400619EFEB519FE4DC0ABAABBB6FB04321F514564FA16A21B1CB351E52AB50
                                                          APIs
                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00A0187F
                                                          • UnloadUserProfile.USERENV(?,?), ref: 00A0188B
                                                          • CloseHandle.KERNEL32(?), ref: 00A01894
                                                          • CloseHandle.KERNEL32(?), ref: 00A0189C
                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 00A018A5
                                                          • HeapFree.KERNEL32(00000000), ref: 00A018AC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                          • String ID:
                                                          • API String ID: 146765662-0
                                                          • Opcode ID: 4e7806e31044741af0454cc71cf22a335d402ca69a4659bfa971041083a87fe2
                                                          • Instruction ID: 2ae0c9f1f88aeeeb32bc6521781a37196769f5c2cf0e810972c63753889b299d
                                                          • Opcode Fuzzy Hash: 4e7806e31044741af0454cc71cf22a335d402ca69a4659bfa971041083a87fe2
                                                          • Instruction Fuzzy Hash: 7EE0C236004101BBDA419BE1ED0C90ABB29FB49B32B108220F225A5070CB329432EB50
                                                          APIs
                                                            • Part of subcall function 009A7620: _wcslen.LIBCMT ref: 009A7625
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00A0C6EE
                                                          • _wcslen.LIBCMT ref: 00A0C735
                                                          • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00A0C79C
                                                          • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00A0C7CA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info_wcslen$Default
                                                          • String ID: 0
                                                          • API String ID: 1227352736-4108050209
                                                          • Opcode ID: 5dce5e60a9c3211c4b44983a2f13efdc2a5d6cb22acd87d7adfd786c87bc0781
                                                          • Instruction ID: 0fe282626d3b6c78219cbc4d7ffed5ec49965e334bafde7c0c266445eebc071b
                                                          • Opcode Fuzzy Hash: 5dce5e60a9c3211c4b44983a2f13efdc2a5d6cb22acd87d7adfd786c87bc0781
                                                          • Instruction Fuzzy Hash: 0151AD716043089BD7659F28EC85B6A77E8AB89320F044B29F995E21E0DB64D9058B92
                                                          APIs
                                                          • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00A07206
                                                          • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00A0723C
                                                          • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00A0724D
                                                          • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00A072CF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$AddressCreateInstanceProc
                                                          • String ID: DllGetClassObject
                                                          • API String ID: 753597075-1075368562
                                                          • Opcode ID: 79ddfd3ad43377fb7c032437f3505139672630e3c5408311651b9722f9470a27
                                                          • Instruction ID: 0737f9648b5bc2464ecc471577623a30175fb81b328491a67709aa13d3ffcfa8
                                                          • Opcode Fuzzy Hash: 79ddfd3ad43377fb7c032437f3505139672630e3c5408311651b9722f9470a27
                                                          • Instruction Fuzzy Hash: 4B419171A04208EFDB15CF94D884ADE7BB9EF48310F1580A9BD059F28AD7B1ED41CBA0
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A33E35
                                                          • IsMenu.USER32(?), ref: 00A33E4A
                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00A33E92
                                                          • DrawMenuBar.USER32 ref: 00A33EA5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$DrawInfoInsert
                                                          • String ID: 0
                                                          • API String ID: 3076010158-4108050209
                                                          • Opcode ID: 4d22e3479acb8f6ff89175aa8f4c5f0231c364efa9e7186377c8c272c8908ef5
                                                          • Instruction ID: cd0e5de97af1e89d61fa01dfda6fb3ab18a34dd9b4bf41b0391a792e6da05d17
                                                          • Opcode Fuzzy Hash: 4d22e3479acb8f6ff89175aa8f4c5f0231c364efa9e7186377c8c272c8908ef5
                                                          • Instruction Fuzzy Hash: 2E414676A05209AFDF10DFA4D884AAABBF9FF49360F148129F905A7250D730AE45CF60
                                                          APIs
                                                            • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                            • Part of subcall function 00A03CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00A03CCA
                                                          • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00A01E66
                                                          • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00A01E79
                                                          • SendMessageW.USER32(?,00000189,?,00000000), ref: 00A01EA9
                                                            • Part of subcall function 009A6B57: _wcslen.LIBCMT ref: 009A6B6A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$_wcslen$ClassName
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 2081771294-1403004172
                                                          • Opcode ID: b76e1c285745ec28a2d3736b0fb774bd1d6c16d94f3b89de93fe1c04aedf6d70
                                                          • Instruction ID: 61ce97899afb657eeea2bb22c5b1cf12aba84e79992ed89ef33da30c716834de
                                                          • Opcode Fuzzy Hash: b76e1c285745ec28a2d3736b0fb774bd1d6c16d94f3b89de93fe1c04aedf6d70
                                                          • Instruction Fuzzy Hash: DB213B71A00108BFDB149BB4ED46DFFB7B9EF86360F144519F825A71E1DB38490A8760
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID: HKEY_LOCAL_MACHINE$HKLM
                                                          • API String ID: 176396367-4004644295
                                                          • Opcode ID: 69306560dcd0c870ab15f9ab7087c20f00d8f1ac46254cbb71e180129e0603d7
                                                          • Instruction ID: 5a3cf55d51e5475ed1040c27d5f5558536ba98705cc6bd5d02afb84cb7f63507
                                                          • Opcode Fuzzy Hash: 69306560dcd0c870ab15f9ab7087c20f00d8f1ac46254cbb71e180129e0603d7
                                                          • Instruction Fuzzy Hash: 3431F873A001794BCB20DF6CE9516BE33A39BA17E4B154039E845AB345F671CE40D3E0
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00A32F8D
                                                          • LoadLibraryW.KERNEL32(?), ref: 00A32F94
                                                          • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00A32FA9
                                                          • DestroyWindow.USER32(?), ref: 00A32FB1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$DestroyLibraryLoadWindow
                                                          • String ID: SysAnimate32
                                                          • API String ID: 3529120543-1011021900
                                                          • Opcode ID: 72a723697e11ac8a00211411e6dff55c4982059f53cf1617bace0f03283122c1
                                                          • Instruction ID: b922fe7022db5f7aa252de46f12d6fc4c019aeae8771347ece4b2e0775a29241
                                                          • Opcode Fuzzy Hash: 72a723697e11ac8a00211411e6dff55c4982059f53cf1617bace0f03283122c1
                                                          • Instruction Fuzzy Hash: 1B219D72204205ABEB208FA4DC81FBB77BDEF99364F104618FA50E6190D771DCA19760
                                                          APIs
                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,009C4D1E,009D28E9,?,009C4CBE,009D28E9,00A688B8,0000000C,009C4E15,009D28E9,00000002), ref: 009C4D8D
                                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 009C4DA0
                                                          • FreeLibrary.KERNEL32(00000000,?,?,?,009C4D1E,009D28E9,?,009C4CBE,009D28E9,00A688B8,0000000C,009C4E15,009D28E9,00000002,00000000), ref: 009C4DC3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                          • String ID: CorExitProcess$mscoree.dll
                                                          • API String ID: 4061214504-1276376045
                                                          • Opcode ID: e5ba3f91e875f228b990a72ea54d30fa2e9f86aeb6b9944aa1cce419bb27ec13
                                                          • Instruction ID: 302c3adbdc7fc4d74cd69d685441e61dc9a4a283518c08588de146bce28eda0f
                                                          • Opcode Fuzzy Hash: e5ba3f91e875f228b990a72ea54d30fa2e9f86aeb6b9944aa1cce419bb27ec13
                                                          • Instruction Fuzzy Hash: 63F06235A40208BBDB119FD0DC49FADBFB9EF44761F0001A8F906B62A0CB746E41DB92
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?,009A4EDD,?,00A71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009A4E9C
                                                          • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 009A4EAE
                                                          • FreeLibrary.KERNEL32(00000000,?,?,009A4EDD,?,00A71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009A4EC0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Library$AddressFreeLoadProc
                                                          • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                          • API String ID: 145871493-3689287502
                                                          • Opcode ID: 48e9fea7b742ae312d574a51bfd40597f8a913238f0e2b5f13b0665768684db2
                                                          • Instruction ID: e5e82de35d6696d418198740f2450adbb212334b08939da0d6fdbe7b54d4b056
                                                          • Opcode Fuzzy Hash: 48e9fea7b742ae312d574a51bfd40597f8a913238f0e2b5f13b0665768684db2
                                                          • Instruction Fuzzy Hash: 4CE08C36A026226BD2225B65AC18A6BA668AFC2F72B150215FC01F2200DBA4CD0392E0
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?,009E3CDE,?,00A71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009A4E62
                                                          • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 009A4E74
                                                          • FreeLibrary.KERNEL32(00000000,?,?,009E3CDE,?,00A71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 009A4E87
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Library$AddressFreeLoadProc
                                                          • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                          • API String ID: 145871493-1355242751
                                                          • Opcode ID: 1c50385186adc417c2bc6f2d12c1544f94e88f34ef5d2ee41bdb92dc56ca5a01
                                                          • Instruction ID: 1963d28ca273e932ac31dd3a03d448bb38a3fcd2e9ce928437f1aa0bc6c8412c
                                                          • Opcode Fuzzy Hash: 1c50385186adc417c2bc6f2d12c1544f94e88f34ef5d2ee41bdb92dc56ca5a01
                                                          • Instruction Fuzzy Hash: E1D0123650262167DA225B657C18D8B6A5CBFC6F713150615B905F2154CFA4CD0296D1
                                                          APIs
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00A12C05
                                                          • DeleteFileW.KERNEL32(?), ref: 00A12C87
                                                          • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00A12C9D
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00A12CAE
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00A12CC0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: File$Delete$Copy
                                                          • String ID:
                                                          • API String ID: 3226157194-0
                                                          • Opcode ID: 5bd2a48061cffebb563b77931978b2b5e436b51f5b502bbca08b84bb6bf38905
                                                          • Instruction ID: 34f2ee802f70811a6546ac58168c40d7e143d3c516608aae7a96c9b41ec56950
                                                          • Opcode Fuzzy Hash: 5bd2a48061cffebb563b77931978b2b5e436b51f5b502bbca08b84bb6bf38905
                                                          • Instruction Fuzzy Hash: 8EB13E71E01129ABDF11DBA4CD85FDEB7BDEF49350F1040A6F609E6141EA30DA948FA1
                                                          APIs
                                                          • GetCurrentProcessId.KERNEL32 ref: 00A2A427
                                                          • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00A2A435
                                                          • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00A2A468
                                                          • CloseHandle.KERNEL32(?), ref: 00A2A63D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseCountersCurrentHandleOpen
                                                          • String ID:
                                                          • API String ID: 3488606520-0
                                                          • Opcode ID: bedb2f30341c9aac9fdefc639a5a3c5937c47d01abe931a9f59f5512cf11cda7
                                                          • Instruction ID: 3227827e869522a33671c0a819c478d4bae2e289a8fe3be9727b78a33e9c2c31
                                                          • Opcode Fuzzy Hash: bedb2f30341c9aac9fdefc639a5a3c5937c47d01abe931a9f59f5512cf11cda7
                                                          • Instruction Fuzzy Hash: 25A181716043019FD720DF28D886F2AB7E5AF94714F14886DF99A9B2D2D770EC41CB92
                                                          APIs
                                                            • Part of subcall function 00A0DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00A0CF22,?), ref: 00A0DDFD
                                                            • Part of subcall function 00A0DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00A0CF22,?), ref: 00A0DE16
                                                            • Part of subcall function 00A0E199: GetFileAttributesW.KERNEL32(?,00A0CF95), ref: 00A0E19A
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 00A0E473
                                                          • MoveFileW.KERNEL32(?,?), ref: 00A0E4AC
                                                          • _wcslen.LIBCMT ref: 00A0E5EB
                                                          • _wcslen.LIBCMT ref: 00A0E603
                                                          • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 00A0E650
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                          • String ID:
                                                          • API String ID: 3183298772-0
                                                          • Opcode ID: f8d0526feed39d207a847192d879ed824a01bc105bf273bea1685c5975f3e05f
                                                          • Instruction ID: c1f37bff9647a7e34c22825b0301e260a6c61130a522f3129ebe2238d3832cbd
                                                          • Opcode Fuzzy Hash: f8d0526feed39d207a847192d879ed824a01bc105bf273bea1685c5975f3e05f
                                                          • Instruction Fuzzy Hash: BF5150B24083495BC724EB94EC91ADBB3ECAF85350F004D1EF589D3191EF75A6888766
                                                          APIs
                                                            • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                            • Part of subcall function 00A2C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A2B6AE,?,?), ref: 00A2C9B5
                                                            • Part of subcall function 00A2C998: _wcslen.LIBCMT ref: 00A2C9F1
                                                            • Part of subcall function 00A2C998: _wcslen.LIBCMT ref: 00A2CA68
                                                            • Part of subcall function 00A2C998: _wcslen.LIBCMT ref: 00A2CA9E
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A2BAA5
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00A2BB00
                                                          • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00A2BB63
                                                          • RegCloseKey.ADVAPI32(?,?), ref: 00A2BBA6
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00A2BBB3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                          • String ID:
                                                          • API String ID: 826366716-0
                                                          • Opcode ID: 39540e422d6801c4d699fb7015c3d107f66cb775412ab774b6f45fba646d4a4d
                                                          • Instruction ID: 02468d23e0631e4ad80399b62ea10993c6ef03e167bae3f5d4fb519867d20b2d
                                                          • Opcode Fuzzy Hash: 39540e422d6801c4d699fb7015c3d107f66cb775412ab774b6f45fba646d4a4d
                                                          • Instruction Fuzzy Hash: C661B031218241AFC314DF18D890F2ABBE5FF85358F14856CF4998B2A2DB31ED45CBA2
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 00A08BCD
                                                          • VariantClear.OLEAUT32 ref: 00A08C3E
                                                          • VariantClear.OLEAUT32 ref: 00A08C9D
                                                          • VariantClear.OLEAUT32(?), ref: 00A08D10
                                                          • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00A08D3B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$Clear$ChangeInitType
                                                          • String ID:
                                                          • API String ID: 4136290138-0
                                                          • Opcode ID: 3d99dca6cb536c1d2559a1f7318ccb2e6cbf16a488f8d29105093d6de69d25c9
                                                          • Instruction ID: bc8b8b1ee6dc0a81d935bb5af1dea377d8cbc8c2825695122068d89d4cc89a5e
                                                          • Opcode Fuzzy Hash: 3d99dca6cb536c1d2559a1f7318ccb2e6cbf16a488f8d29105093d6de69d25c9
                                                          • Instruction Fuzzy Hash: B9517AB5A00219EFCB10CF68D884AAAB7F8FF89310B158559F949EB350E734E911CF94
                                                          APIs
                                                          • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00A18BAE
                                                          • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00A18BDA
                                                          • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00A18C32
                                                          • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00A18C57
                                                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00A18C5F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: PrivateProfile$SectionWrite$String
                                                          • String ID:
                                                          • API String ID: 2832842796-0
                                                          • Opcode ID: b04c83a6878a6a263eaabab928616d5923858972673b8e1a0208649fffd604f2
                                                          • Instruction ID: 3716bd07ce94a92caf4c1e900b82ab7205d093eaf838dc2ec0c1ff74e3a6b746
                                                          • Opcode Fuzzy Hash: b04c83a6878a6a263eaabab928616d5923858972673b8e1a0208649fffd604f2
                                                          • Instruction Fuzzy Hash: BE511C35A002159FCB15DFA4C881AAEBBF5FF89314F088458F849AB362DB35ED51CB90
                                                          APIs
                                                          • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00A28F40
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00A28FD0
                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 00A28FEC
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00A29032
                                                          • FreeLibrary.KERNEL32(00000000), ref: 00A29052
                                                            • Part of subcall function 009BF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00A11043,?,753CE610), ref: 009BF6E6
                                                            • Part of subcall function 009BF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,009FFA64,00000000,00000000,?,?,00A11043,?,753CE610,?,009FFA64), ref: 009BF70D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                          • String ID:
                                                          • API String ID: 666041331-0
                                                          • Opcode ID: f9d2d25ac51191fa5ca8e617cb6cfb031f4e72d99ada6b54d643fef9837802ae
                                                          • Instruction ID: 296018dbac08f9adf5fb89feba92804ab4c72a35f5f72bdaeb513f9c58bdc96c
                                                          • Opcode Fuzzy Hash: f9d2d25ac51191fa5ca8e617cb6cfb031f4e72d99ada6b54d643fef9837802ae
                                                          • Instruction Fuzzy Hash: BA512935605215DFC711DF58C4949ADBBB1FF49324F0880A9F806AB362DB31ED86CB90
                                                          APIs
                                                          • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00A36C33
                                                          • SetWindowLongW.USER32(?,000000EC,?), ref: 00A36C4A
                                                          • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00A36C73
                                                          • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,00A1AB79,00000000,00000000), ref: 00A36C98
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00A36CC7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Long$MessageSendShow
                                                          • String ID:
                                                          • API String ID: 3688381893-0
                                                          • Opcode ID: cb0fd8745fcad937b6cb978ee8d037c3079150adabfa82e39c1454fcb0d51972
                                                          • Instruction ID: 1cf72fbf99acde49828efaaf6fff75e50d613d09de3407980a2d2e9b99d539bc
                                                          • Opcode Fuzzy Hash: cb0fd8745fcad937b6cb978ee8d037c3079150adabfa82e39c1454fcb0d51972
                                                          • Instruction Fuzzy Hash: 0541E435A04104BFDB24CF68CC59FA9BBB5EB09360F149228F999E72E0C371ED42CA50
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID:
                                                          • API String ID: 269201875-0
                                                          • Opcode ID: 9d6feb60c1d9681bf2e820a99847a5344687fa928655ffaa27029c208e194bcd
                                                          • Instruction ID: e27ab9f3e76eb37eb323022ee6e2fbcfc3a3e3ec678da819557e83f808b5f12c
                                                          • Opcode Fuzzy Hash: 9d6feb60c1d9681bf2e820a99847a5344687fa928655ffaa27029c208e194bcd
                                                          • Instruction Fuzzy Hash: 9541C432A40200AFCB24DFB8C981A6DB7F5EF99324F1585AAE515EB351D731ED01DB80
                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 009B9141
                                                          • ScreenToClient.USER32(00000000,?), ref: 009B915E
                                                          • GetAsyncKeyState.USER32(00000001), ref: 009B9183
                                                          • GetAsyncKeyState.USER32(00000002), ref: 009B919D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: AsyncState$ClientCursorScreen
                                                          • String ID:
                                                          • API String ID: 4210589936-0
                                                          • Opcode ID: 20b0b3287ad0f7d62fa63d9a54eb225f64e77cff0e35f780b9d0b226472ce5c6
                                                          • Instruction ID: d90b7244e311dda204e56af0c3323875b425efdbce23e8bc33dcedba1e8fe216
                                                          • Opcode Fuzzy Hash: 20b0b3287ad0f7d62fa63d9a54eb225f64e77cff0e35f780b9d0b226472ce5c6
                                                          • Instruction Fuzzy Hash: D3416C31A0C60ABBDF059FA8C948BFEB774FF05330F208219E529A6290C7346954DB91
                                                          APIs
                                                          • GetInputState.USER32 ref: 00A138CB
                                                          • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00A13922
                                                          • TranslateMessage.USER32(?), ref: 00A1394B
                                                          • DispatchMessageW.USER32(?), ref: 00A13955
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00A13966
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                          • String ID:
                                                          • API String ID: 2256411358-0
                                                          • Opcode ID: f36c166bc1f69505e5c5bfc333808c4405b4738e279413bca5731b4435357461
                                                          • Instruction ID: 322ae33e50c485b5a5b62fa6e72b60abaa7e2edf3384dfd3214e44a7a0e73c14
                                                          • Opcode Fuzzy Hash: f36c166bc1f69505e5c5bfc333808c4405b4738e279413bca5731b4435357461
                                                          • Instruction Fuzzy Hash: E531D5729043419EEF35CFB49C69FF63BE8EB05310F044569E466961A0E3F4AAC6CB11
                                                          APIs
                                                          • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,00A1C21E,00000000), ref: 00A1CF38
                                                          • InternetReadFile.WININET(?,00000000,?,?), ref: 00A1CF6F
                                                          • GetLastError.KERNEL32(?,00000000,?,?,?,00A1C21E,00000000), ref: 00A1CFB4
                                                          • SetEvent.KERNEL32(?,?,00000000,?,?,?,00A1C21E,00000000), ref: 00A1CFC8
                                                          • SetEvent.KERNEL32(?,?,00000000,?,?,?,00A1C21E,00000000), ref: 00A1CFF2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                          • String ID:
                                                          • API String ID: 3191363074-0
                                                          • Opcode ID: 05c56220cb9593e64ac55ec9d157c8391552fd52de95e4fdf9d6e15d0e7c48f2
                                                          • Instruction ID: c3091c1dc57530dc94189c5b017145238d962f2b12dc410a388d90bd0e71a171
                                                          • Opcode Fuzzy Hash: 05c56220cb9593e64ac55ec9d157c8391552fd52de95e4fdf9d6e15d0e7c48f2
                                                          • Instruction Fuzzy Hash: 8F314A71640305AFDB20DFA5CD84AEBBBF9EB54360B10442EF516E2141DB30EE82DB60
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 00A01915
                                                          • PostMessageW.USER32(00000001,00000201,00000001), ref: 00A019C1
                                                          • Sleep.KERNEL32(00000000,?,?,?), ref: 00A019C9
                                                          • PostMessageW.USER32(00000001,00000202,00000000), ref: 00A019DA
                                                          • Sleep.KERNEL32(00000000,?,?,?,?), ref: 00A019E2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessagePostSleep$RectWindow
                                                          • String ID:
                                                          • API String ID: 3382505437-0
                                                          • Opcode ID: 9adc3cdecb667110ccbbed4cf13d7e3ca83ee30d673534fdbed66cebc23751b2
                                                          • Instruction ID: e345f76f5983be0db274accb2f7f02bca050e48e9df500120650985f959a7c51
                                                          • Opcode Fuzzy Hash: 9adc3cdecb667110ccbbed4cf13d7e3ca83ee30d673534fdbed66cebc23751b2
                                                          • Instruction Fuzzy Hash: CE31DF72A0021DEFCB00CFA8DD99AEE3BB5EB05325F104229F921AB2D1C7709D54DB90
                                                          APIs
                                                          • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00A35745
                                                          • SendMessageW.USER32(?,00001074,?,00000001), ref: 00A3579D
                                                          • _wcslen.LIBCMT ref: 00A357AF
                                                          • _wcslen.LIBCMT ref: 00A357BA
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00A35816
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$_wcslen
                                                          • String ID:
                                                          • API String ID: 763830540-0
                                                          • Opcode ID: 2b0c32dedf011ac362da1a07c29018bca2e5b0c3569222a8002203b4ebd4c846
                                                          • Instruction ID: c4c2c6c397a91e85f96f1225ac06d33d51ae67bae0d1b0c6dc1b186545bc2da7
                                                          • Opcode Fuzzy Hash: 2b0c32dedf011ac362da1a07c29018bca2e5b0c3569222a8002203b4ebd4c846
                                                          • Instruction Fuzzy Hash: 4F21A071D04618AADB20CFB8CC85AEE7BB9FF44720F108616F929EA180D7748A85CF50
                                                          APIs
                                                          • GetSysColor.USER32(00000008), ref: 009B98CC
                                                          • SetTextColor.GDI32(?,?), ref: 009B98D6
                                                          • SetBkMode.GDI32(?,00000001), ref: 009B98E9
                                                          • GetStockObject.GDI32(00000005), ref: 009B98F1
                                                          • GetWindowLongW.USER32(?,000000EB), ref: 009B9952
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Color$LongModeObjectStockTextWindow
                                                          • String ID:
                                                          • API String ID: 1860813098-0
                                                          • Opcode ID: 3eabbd3cffaa3a4d8679f92e4ccaad1477cc164bee57d8a6e187fc824e45efd6
                                                          • Instruction ID: c3748fc27e86d8136dac832ecf76b7297735deb3c30fbee0a31034c6e0177c91
                                                          • Opcode Fuzzy Hash: 3eabbd3cffaa3a4d8679f92e4ccaad1477cc164bee57d8a6e187fc824e45efd6
                                                          • Instruction Fuzzy Hash: F121F6321592509FCB228F75ED65AE63F64EF13330B08425DF6929B1A2C72A4982CB51
                                                          APIs
                                                          • IsWindow.USER32(00000000), ref: 00A20951
                                                          • GetForegroundWindow.USER32 ref: 00A20968
                                                          • GetDC.USER32(00000000), ref: 00A209A4
                                                          • GetPixel.GDI32(00000000,?,00000003), ref: 00A209B0
                                                          • ReleaseDC.USER32(00000000,00000003), ref: 00A209E8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ForegroundPixelRelease
                                                          • String ID:
                                                          • API String ID: 4156661090-0
                                                          • Opcode ID: 4e969d04fcef567ae4229846b9544a358398b4b58297c826cbdef7b71fd56bc1
                                                          • Instruction ID: d868ab9d11f2c7e81495611eb60bc7c91fca67740ee2d014b2d67988ddbf4940
                                                          • Opcode Fuzzy Hash: 4e969d04fcef567ae4229846b9544a358398b4b58297c826cbdef7b71fd56bc1
                                                          • Instruction Fuzzy Hash: 82218435600214AFD704EFA9DD85AAEB7F5EF45710F048068F856A7762CB30AC45CB90
                                                          APIs
                                                          • GetEnvironmentStringsW.KERNEL32 ref: 009DCDC6
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 009DCDE9
                                                            • Part of subcall function 009D3820: RtlAllocateHeap.NTDLL(00000000,?,00A71444,?,009BFDF5,?,?,009AA976,00000010,00A71440,009A13FC,?,009A13C6,?,009A1129), ref: 009D3852
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 009DCE0F
                                                          • _free.LIBCMT ref: 009DCE22
                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 009DCE31
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                          • String ID:
                                                          • API String ID: 336800556-0
                                                          • Opcode ID: ee3c936274124f3213197124c23beb868edecf1f83d3aa80dea98086fe237cc3
                                                          • Instruction ID: dedf3e8b7b251ac8d0bf0262f649b6c3832065f666801864fc710f4778a316fb
                                                          • Opcode Fuzzy Hash: ee3c936274124f3213197124c23beb868edecf1f83d3aa80dea98086fe237cc3
                                                          • Instruction Fuzzy Hash: C101D4F26412167F632156BA6C88D7BBB6DDEC6BA1315812BF905D7300EA608D02D2B0
                                                          APIs
                                                          • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 009B9693
                                                          • SelectObject.GDI32(?,00000000), ref: 009B96A2
                                                          • BeginPath.GDI32(?), ref: 009B96B9
                                                          • SelectObject.GDI32(?,00000000), ref: 009B96E2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ObjectSelect$BeginCreatePath
                                                          • String ID:
                                                          • API String ID: 3225163088-0
                                                          • Opcode ID: 5e500a3a80cd2bf15fcf4f1afacd78f78c6e2f2c2e2429037b686b3d454f5813
                                                          • Instruction ID: 84a27ab8e1ca5ed18bd70c9b53a28ce1936d4bf72ee64990de7fba68650dad0c
                                                          • Opcode Fuzzy Hash: 5e500a3a80cd2bf15fcf4f1afacd78f78c6e2f2c2e2429037b686b3d454f5813
                                                          • Instruction Fuzzy Hash: B4218031812305EBDB11DFA8ED197E97BF8BB50335F108216F618A61B0D3705893CB90
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: _memcmp
                                                          • String ID:
                                                          • API String ID: 2931989736-0
                                                          • Opcode ID: f19ab5c7df81f99e0d631a53a44c93f17b1a2374d54259002114872e7f337662
                                                          • Instruction ID: c3346d9b32b2fcc14c6976abefe404ef03cf6ab53533c9b63b064bc3f52a32b7
                                                          • Opcode Fuzzy Hash: f19ab5c7df81f99e0d631a53a44c93f17b1a2374d54259002114872e7f337662
                                                          • Instruction Fuzzy Hash: B201B9B1E8160DBFD7185620EE42FBB735CAF61398F004824FD04AA2C2F760ED1096A5
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,?,009CF2DE,009D3863,00A71444,?,009BFDF5,?,?,009AA976,00000010,00A71440,009A13FC,?,009A13C6), ref: 009D2DFD
                                                          • _free.LIBCMT ref: 009D2E32
                                                          • _free.LIBCMT ref: 009D2E59
                                                          • SetLastError.KERNEL32(00000000,009A1129), ref: 009D2E66
                                                          • SetLastError.KERNEL32(00000000,009A1129), ref: 009D2E6F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_free
                                                          • String ID:
                                                          • API String ID: 3170660625-0
                                                          • Opcode ID: 4eda9037ef07ac3e8824f007fd3db40b33ccb4d8bbfd57b24e012067b291be3a
                                                          • Instruction ID: 566f6217ab5971d05ebc98f54e4e4c214c6298b395ed52d790ad00287310a768
                                                          • Opcode Fuzzy Hash: 4eda9037ef07ac3e8824f007fd3db40b33ccb4d8bbfd57b24e012067b291be3a
                                                          • Instruction Fuzzy Hash: EC01F9365C56006BC61267B46C45E2B276DABF13B2725C927F465A3392EA74CC024130
                                                          APIs
                                                          • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,009FFF41,80070057,?,?,?,00A0035E), ref: 00A0002B
                                                          • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,009FFF41,80070057,?,?), ref: 00A00046
                                                          • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,009FFF41,80070057,?,?), ref: 00A00054
                                                          • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,009FFF41,80070057,?), ref: 00A00064
                                                          • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,009FFF41,80070057,?,?), ref: 00A00070
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: From$Prog$FreeStringTasklstrcmpi
                                                          • String ID:
                                                          • API String ID: 3897988419-0
                                                          • Opcode ID: c92ceeab9a5d94345068a1e9671d3aeaf8d1c83d09d5b708201bc23927b21e30
                                                          • Instruction ID: a67310d6545aac5416381102b46f8dbb0f9181ed5bc1a7204836b0d85b6b3824
                                                          • Opcode Fuzzy Hash: c92ceeab9a5d94345068a1e9671d3aeaf8d1c83d09d5b708201bc23927b21e30
                                                          • Instruction Fuzzy Hash: 9C01A276600208BFDB108FA8EC48FAA7EFDEF44762F144124F905E6250EB71DE418BA0
                                                          APIs
                                                          • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00A01114
                                                          • GetLastError.KERNEL32(?,00000000,00000000,?,?,00A00B9B,?,?,?), ref: 00A01120
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00A00B9B,?,?,?), ref: 00A0112F
                                                          • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00A00B9B,?,?,?), ref: 00A01136
                                                          • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00A0114D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 842720411-0
                                                          • Opcode ID: b6114168e067481358b25bfbe815d901f72d0e0c731f93760255480da0999105
                                                          • Instruction ID: 215ec4bcc160a3a03188c730747444aceb355de487d995ff12a6f2ecf3123a2e
                                                          • Opcode Fuzzy Hash: b6114168e067481358b25bfbe815d901f72d0e0c731f93760255480da0999105
                                                          • Instruction Fuzzy Hash: 82016D75500215BFDB158FA4EC49AAA3B6EEF85364B100418FA41D7350DA31DC019B60
                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00A00FCA
                                                          • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00A00FD6
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00A00FE5
                                                          • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00A00FEC
                                                          • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00A01002
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: c16ffcd53ed580b2cdb7334635977aea0269aa82f4ab66758dc29ba95463b61d
                                                          • Instruction ID: 822eec13bcb32f91cfddb3452de56a504175e9170193b964728dafcbac03a15e
                                                          • Opcode Fuzzy Hash: c16ffcd53ed580b2cdb7334635977aea0269aa82f4ab66758dc29ba95463b61d
                                                          • Instruction Fuzzy Hash: F9F06235200315EBD7218FE4EC4DF963B6DEF8A761F104414F946D7291CA70DC518B60
                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00A0102A
                                                          • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00A01036
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A01045
                                                          • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00A0104C
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A01062
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: 01dbe958461581b16f29648c590600a477fb5d1c0851ffbfb1675835394a9dad
                                                          • Instruction ID: 08f0555776a67740a8fbf4f1dd087d11813d7e8984e807a67127a782e7c94ce3
                                                          • Opcode Fuzzy Hash: 01dbe958461581b16f29648c590600a477fb5d1c0851ffbfb1675835394a9dad
                                                          • Instruction Fuzzy Hash: C6F06D35200315EBDB219FE4EC49F963BADEF8A761F500424FA85E7290CA70D8518B60
                                                          APIs
                                                          • CloseHandle.KERNEL32(?,?,?,?,00A1017D,?,00A132FC,?,00000001,009E2592,?), ref: 00A10324
                                                          • CloseHandle.KERNEL32(?,?,?,?,00A1017D,?,00A132FC,?,00000001,009E2592,?), ref: 00A10331
                                                          • CloseHandle.KERNEL32(?,?,?,?,00A1017D,?,00A132FC,?,00000001,009E2592,?), ref: 00A1033E
                                                          • CloseHandle.KERNEL32(?,?,?,?,00A1017D,?,00A132FC,?,00000001,009E2592,?), ref: 00A1034B
                                                          • CloseHandle.KERNEL32(?,?,?,?,00A1017D,?,00A132FC,?,00000001,009E2592,?), ref: 00A10358
                                                          • CloseHandle.KERNEL32(?,?,?,?,00A1017D,?,00A132FC,?,00000001,009E2592,?), ref: 00A10365
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseHandle
                                                          • String ID:
                                                          • API String ID: 2962429428-0
                                                          • Opcode ID: fee9a078a1e7f0cc81891a872d6d8bfbd109c7becec7cd422b2b348aa07a0c8d
                                                          • Instruction ID: a9c38ad2ee644f4cf43ecd23981cdd3615aea5953d6fc16d2080ba475a1eb64f
                                                          • Opcode Fuzzy Hash: fee9a078a1e7f0cc81891a872d6d8bfbd109c7becec7cd422b2b348aa07a0c8d
                                                          • Instruction Fuzzy Hash: C401AA72800B159FCB30AF66D880852FBF9BF603153158A3FD1A696931C3B1A999DF80
                                                          APIs
                                                          • _free.LIBCMT ref: 009DD752
                                                            • Part of subcall function 009D29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,009DD7D1,00000000,00000000,00000000,00000000,?,009DD7F8,00000000,00000007,00000000,?,009DDBF5,00000000), ref: 009D29DE
                                                            • Part of subcall function 009D29C8: GetLastError.KERNEL32(00000000,?,009DD7D1,00000000,00000000,00000000,00000000,?,009DD7F8,00000000,00000007,00000000,?,009DDBF5,00000000,00000000), ref: 009D29F0
                                                          • _free.LIBCMT ref: 009DD764
                                                          • _free.LIBCMT ref: 009DD776
                                                          • _free.LIBCMT ref: 009DD788
                                                          • _free.LIBCMT ref: 009DD79A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: 0cdb25cad5272556cd0bf3d69eb1197ddde68222a8c3be1531adb5231634c20e
                                                          • Instruction ID: c9981ad142ae399655108d943a524061fa9745504828107521025b1475c6b173
                                                          • Opcode Fuzzy Hash: 0cdb25cad5272556cd0bf3d69eb1197ddde68222a8c3be1531adb5231634c20e
                                                          • Instruction Fuzzy Hash: ACF036725C5204ABC625EBA4FAC5D2677EDBB94760B948C47F098E7701C774FC808A64
                                                          APIs
                                                          • GetDlgItem.USER32(?,000003E9), ref: 00A05C58
                                                          • GetWindowTextW.USER32(00000000,?,00000100), ref: 00A05C6F
                                                          • MessageBeep.USER32(00000000), ref: 00A05C87
                                                          • KillTimer.USER32(?,0000040A), ref: 00A05CA3
                                                          • EndDialog.USER32(?,00000001), ref: 00A05CBD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                          • String ID:
                                                          • API String ID: 3741023627-0
                                                          • Opcode ID: 2e929e17738f625ef51fc9912800ea5a0c69a0ceac842e157eedd209843af4b8
                                                          • Instruction ID: 88455242aad572428b48efd5564458eec9a81cf7571af11aa67225d65cda4847
                                                          • Opcode Fuzzy Hash: 2e929e17738f625ef51fc9912800ea5a0c69a0ceac842e157eedd209843af4b8
                                                          • Instruction Fuzzy Hash: AF018631900B08ABFB259B60ED4FFA67BB8BB01B05F041559B583B10E1DBF4A9858F90
                                                          APIs
                                                          • _free.LIBCMT ref: 009D22BE
                                                            • Part of subcall function 009D29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,009DD7D1,00000000,00000000,00000000,00000000,?,009DD7F8,00000000,00000007,00000000,?,009DDBF5,00000000), ref: 009D29DE
                                                            • Part of subcall function 009D29C8: GetLastError.KERNEL32(00000000,?,009DD7D1,00000000,00000000,00000000,00000000,?,009DD7F8,00000000,00000007,00000000,?,009DDBF5,00000000,00000000), ref: 009D29F0
                                                          • _free.LIBCMT ref: 009D22D0
                                                          • _free.LIBCMT ref: 009D22E3
                                                          • _free.LIBCMT ref: 009D22F4
                                                          • _free.LIBCMT ref: 009D2305
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: 602240bd574ed9c4afe9374410e1172243924708debc51e22e842135fffd9ae7
                                                          • Instruction ID: 309898fa5a297164436dee78f3d5aa69daf2a8a480364d0db7c5fb43bcbd541b
                                                          • Opcode Fuzzy Hash: 602240bd574ed9c4afe9374410e1172243924708debc51e22e842135fffd9ae7
                                                          • Instruction Fuzzy Hash: 35F03A748801208BC622EFE8BD11D583BA8B728760700C55BF418D33B2CB700893BFE4
                                                          APIs
                                                          • EndPath.GDI32(?), ref: 009B95D4
                                                          • StrokeAndFillPath.GDI32(?,?,009F71F7,00000000,?,?,?), ref: 009B95F0
                                                          • SelectObject.GDI32(?,00000000), ref: 009B9603
                                                          • DeleteObject.GDI32 ref: 009B9616
                                                          • StrokePath.GDI32(?), ref: 009B9631
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Path$ObjectStroke$DeleteFillSelect
                                                          • String ID:
                                                          • API String ID: 2625713937-0
                                                          • Opcode ID: f5543266ba166829042c9a8d0e8c91188d50496e38cb194015e5827e0153f8f2
                                                          • Instruction ID: 16d8d1a1df1a00ccd540e56ed1fb810847f8d951a015410a961a9dbe9b8a826e
                                                          • Opcode Fuzzy Hash: f5543266ba166829042c9a8d0e8c91188d50496e38cb194015e5827e0153f8f2
                                                          • Instruction Fuzzy Hash: 6BF0B631015244EBDB26DFE9EE297A43BA5AB01332F44C214F669650F0C7748997DF20
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: __freea$_free
                                                          • String ID: a/p$am/pm
                                                          • API String ID: 3432400110-3206640213
                                                          • Opcode ID: fc493d1b7e0be8222d9613f3795d9340e4dc010d1addb4381e7251ea417ea8f9
                                                          • Instruction ID: a32fa2da4d11fc53734c1c5843cc35171fb0a22b673c8af1e52bfdda30790793
                                                          • Opcode Fuzzy Hash: fc493d1b7e0be8222d9613f3795d9340e4dc010d1addb4381e7251ea417ea8f9
                                                          • Instruction Fuzzy Hash: EAD1F137984206EADB289F68C845BBEB7B9EF05300F24C51BE6119B751D3359D80CB91
                                                          APIs
                                                            • Part of subcall function 009C0242: EnterCriticalSection.KERNEL32(00A7070C,00A71884,?,?,009B198B,00A72518,?,?,?,009A12F9,00000000), ref: 009C024D
                                                            • Part of subcall function 009C0242: LeaveCriticalSection.KERNEL32(00A7070C,?,009B198B,00A72518,?,?,?,009A12F9,00000000), ref: 009C028A
                                                            • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                            • Part of subcall function 009C00A3: __onexit.LIBCMT ref: 009C00A9
                                                          • __Init_thread_footer.LIBCMT ref: 00A27BFB
                                                            • Part of subcall function 009C01F8: EnterCriticalSection.KERNEL32(00A7070C,?,?,009B8747,00A72514), ref: 009C0202
                                                            • Part of subcall function 009C01F8: LeaveCriticalSection.KERNEL32(00A7070C,?,009B8747,00A72514), ref: 009C0235
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                          • String ID: 5$G$Variable must be of type 'Object'.
                                                          • API String ID: 535116098-3733170431
                                                          • Opcode ID: 049201ed544fd39a8ba39603a4f2c3ee316da5dcfd9c6ae9609a58434a853bb2
                                                          • Instruction ID: 030b6635df73f56c2ac320f72ec73bb57eb5abcc65685216f3dbbeedd44a8837
                                                          • Opcode Fuzzy Hash: 049201ed544fd39a8ba39603a4f2c3ee316da5dcfd9c6ae9609a58434a853bb2
                                                          • Instruction Fuzzy Hash: 56917D71A04219EFCB14EF58E991EBDB7B1FF45304F148069F8066B292DB71AE41CB51
                                                          APIs
                                                            • Part of subcall function 00A0B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00A021D0,?,?,00000034,00000800,?,00000034), ref: 00A0B42D
                                                          • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00A02760
                                                            • Part of subcall function 00A0B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00A021FF,?,?,00000800,?,00001073,00000000,?,?), ref: 00A0B3F8
                                                            • Part of subcall function 00A0B32A: GetWindowThreadProcessId.USER32(?,?), ref: 00A0B355
                                                            • Part of subcall function 00A0B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00A02194,00000034,?,?,00001004,00000000,00000000), ref: 00A0B365
                                                            • Part of subcall function 00A0B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00A02194,00000034,?,?,00001004,00000000,00000000), ref: 00A0B37B
                                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00A027CD
                                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00A0281A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                          • String ID: @
                                                          • API String ID: 4150878124-2766056989
                                                          • Opcode ID: 1fc249acea4da01aef632581538f4edc57156e682a7b177b019fcb079ec33459
                                                          • Instruction ID: 956ddbffe3b70bd0a5db16cf3e642efc0172b739872d43375e5707eb05268641
                                                          • Opcode Fuzzy Hash: 1fc249acea4da01aef632581538f4edc57156e682a7b177b019fcb079ec33459
                                                          • Instruction Fuzzy Hash: E8413B7690021CAFDB10DFA4DD46BEEBBB8AF09300F108095FA55B7181DB716E45CBA1
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\file.exe,00000104), ref: 009D1769
                                                          • _free.LIBCMT ref: 009D1834
                                                          • _free.LIBCMT ref: 009D183E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$FileModuleName
                                                          • String ID: C:\Users\user\Desktop\file.exe
                                                          • API String ID: 2506810119-1957095476
                                                          • Opcode ID: 7bdb8edf2d3902e9bb6e15fa8e47ee2bd50f42c23671186feb98b5947e763d09
                                                          • Instruction ID: 0ff1c4b8854db5f77014f41562b23c140505f09acc616ad4fd3a8afc814e2b6d
                                                          • Opcode Fuzzy Hash: 7bdb8edf2d3902e9bb6e15fa8e47ee2bd50f42c23671186feb98b5947e763d09
                                                          • Instruction Fuzzy Hash: B7315E76A80258BBDB21DB99DC85E9EBBFCEB95310B148167F804D7321D6708E81DB90
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00A0C306
                                                          • DeleteMenu.USER32(?,00000007,00000000), ref: 00A0C34C
                                                          • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00A71990,01466F20), ref: 00A0C395
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$Delete$InfoItem
                                                          • String ID: 0
                                                          • API String ID: 135850232-4108050209
                                                          • Opcode ID: 7b0f7bc74a1935438c8f1969f955a3d1432b40950031e76025d0aeb2a7a9d57c
                                                          • Instruction ID: 22e6226735c862f5d0d45892d4ea439c1e5ba036879840512e62bd32f7d03ce5
                                                          • Opcode Fuzzy Hash: 7b0f7bc74a1935438c8f1969f955a3d1432b40950031e76025d0aeb2a7a9d57c
                                                          • Instruction Fuzzy Hash: 8C418D712143059FDB20DF25E884B5ABBE4AF85320F148B1DF9A59B2D1D730A904CB62
                                                          APIs
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00A3CC08,00000000,?,?,?,?), ref: 00A344AA
                                                          • GetWindowLongW.USER32 ref: 00A344C7
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00A344D7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Long
                                                          • String ID: SysTreeView32
                                                          • API String ID: 847901565-1698111956
                                                          • Opcode ID: 9b9216c7d077ad221c14d9852800c3930ef6ac89d5bf7ab4105e44da77ddb6f1
                                                          • Instruction ID: 7aa0b98e65ab126d8184fddd336255a3b23c4b82b737f6b26eb1b99bf8119fff
                                                          • Opcode Fuzzy Hash: 9b9216c7d077ad221c14d9852800c3930ef6ac89d5bf7ab4105e44da77ddb6f1
                                                          • Instruction Fuzzy Hash: F0319A32210605AFDB209F78DC46BEA7BA9EB49334F208725F979A21E1D770EC519B50
                                                          APIs
                                                            • Part of subcall function 00A2335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00A23077,?,?), ref: 00A23378
                                                          • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00A2307A
                                                          • _wcslen.LIBCMT ref: 00A2309B
                                                          • htons.WSOCK32(00000000,?,?,00000000), ref: 00A23106
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                          • String ID: 255.255.255.255
                                                          • API String ID: 946324512-2422070025
                                                          • Opcode ID: 3137d8357e0aff7de3c20bdeca9ef0e46e356942f5d3c4be49cd0bd53ea10ded
                                                          • Instruction ID: c6b53737a23c3490b37c3009a204bb2941ac37c66ce114c77e55c8237a4b5bd5
                                                          • Opcode Fuzzy Hash: 3137d8357e0aff7de3c20bdeca9ef0e46e356942f5d3c4be49cd0bd53ea10ded
                                                          • Instruction Fuzzy Hash: C631C1362042219FCF10CF6CD985EA977A0EF56318F248169E9158B392CB39DE41C760
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00A33F40
                                                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00A33F54
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00A33F78
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window
                                                          • String ID: SysMonthCal32
                                                          • API String ID: 2326795674-1439706946
                                                          • Opcode ID: 2d52a27027940c1ccd35ebab0b545c20611717c013f31b2f609c9d51d82024d3
                                                          • Instruction ID: acffb15bc8519911832c5109de8236cf5bcbe25c00a0b8713fb168b72bae2401
                                                          • Opcode Fuzzy Hash: 2d52a27027940c1ccd35ebab0b545c20611717c013f31b2f609c9d51d82024d3
                                                          • Instruction Fuzzy Hash: BB21BC33600219BFDF21CF90DC46FEA3BB9EF88724F110214FA15AB1D0D6B5A8918B90
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00A34705
                                                          • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00A34713
                                                          • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00A3471A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$DestroyWindow
                                                          • String ID: msctls_updown32
                                                          • API String ID: 4014797782-2298589950
                                                          • Opcode ID: d3cbec2fe70636ed7996862dfb63456526507d5d8545955c59e762f358d4d1e8
                                                          • Instruction ID: cd44a381dd7452bd261ee4432e4ba586446cc05d66639d3f3f1c1f1dba8d4626
                                                          • Opcode Fuzzy Hash: d3cbec2fe70636ed7996862dfb63456526507d5d8545955c59e762f358d4d1e8
                                                          • Instruction Fuzzy Hash: B0215EB5600208AFEB11DF68DC81DA737ADEB8A3A4B040059FA049B251DB74FC52CA60
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                          • API String ID: 176396367-2734436370
                                                          • Opcode ID: 493586c3f40712d61b33fb191cb0695dc5e56491abd76533baa6cfb68d51e6f7
                                                          • Instruction ID: 34a41e4c3ed5698c328cc05459d4dbf83e5ea26d0858fea7cd0aa411740b54e4
                                                          • Opcode Fuzzy Hash: 493586c3f40712d61b33fb191cb0695dc5e56491abd76533baa6cfb68d51e6f7
                                                          • Instruction Fuzzy Hash: 1A215B72A045156AD331BB25AC03FB7B3E8AF91310F50442AF949970C3EB52AD45C2D6
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00A33840
                                                          • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00A33850
                                                          • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00A33876
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$MoveWindow
                                                          • String ID: Listbox
                                                          • API String ID: 3315199576-2633736733
                                                          • Opcode ID: 2cf53d65aee9f6c5523b2e9ec0a2d7c055f22881e06bbaff20edcb9a54440e13
                                                          • Instruction ID: 100a19af3575e713339707f978febcd0764a0a8744b5d30956aff3ec4d680c0f
                                                          • Opcode Fuzzy Hash: 2cf53d65aee9f6c5523b2e9ec0a2d7c055f22881e06bbaff20edcb9a54440e13
                                                          • Instruction Fuzzy Hash: BC219F72614218BBEF21CF95DC85FBB376EEF89764F118124F9049B190CA75DC5287A0
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 00A14A08
                                                          • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00A14A5C
                                                          • SetErrorMode.KERNEL32(00000000,?,?,00A3CC08), ref: 00A14AD0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$InformationVolume
                                                          • String ID: %lu
                                                          • API String ID: 2507767853-685833217
                                                          • Opcode ID: e79aefcfb8b3e627672c1a0c69bbab262c3ad86886f9897bbe0b2c7feee52b18
                                                          • Instruction ID: 61f55d90850828ceebbe1355922a21aee458739f6dc42824f84a5cab1bd25d87
                                                          • Opcode Fuzzy Hash: e79aefcfb8b3e627672c1a0c69bbab262c3ad86886f9897bbe0b2c7feee52b18
                                                          • Instruction Fuzzy Hash: 07319375A00108AFDB10DF98C881EAABBF8FF49314F148094F509DB252D771ED45CBA1
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00A3424F
                                                          • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00A34264
                                                          • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00A34271
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: msctls_trackbar32
                                                          • API String ID: 3850602802-1010561917
                                                          • Opcode ID: a623dfe4f16b9c54ca3f54b8e8e9038ace9c541df30518d3e6b9f99943aca717
                                                          • Instruction ID: c5cf33e9d88ea0cc2267f2beb504a0c888b2d3d9f9c28105d334c4fbe5da924f
                                                          • Opcode Fuzzy Hash: a623dfe4f16b9c54ca3f54b8e8e9038ace9c541df30518d3e6b9f99943aca717
                                                          • Instruction Fuzzy Hash: 6511C671240248BFEF209F69CC46FEB3BACEF99B64F110614FA55E60A0D671EC519B50
                                                          APIs
                                                            • Part of subcall function 009A6B57: _wcslen.LIBCMT ref: 009A6B6A
                                                            • Part of subcall function 00A02DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00A02DC5
                                                            • Part of subcall function 00A02DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00A02DD6
                                                            • Part of subcall function 00A02DA7: GetCurrentThreadId.KERNEL32 ref: 00A02DDD
                                                            • Part of subcall function 00A02DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00A02DE4
                                                          • GetFocus.USER32 ref: 00A02F78
                                                            • Part of subcall function 00A02DEE: GetParent.USER32(00000000), ref: 00A02DF9
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 00A02FC3
                                                          • EnumChildWindows.USER32(?,00A0303B), ref: 00A02FEB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                          • String ID: %s%d
                                                          • API String ID: 1272988791-1110647743
                                                          • Opcode ID: 460d0f41779b0fc0a208610d5a35257760769fc2b04131787b3afc556df4da9e
                                                          • Instruction ID: f035b9e6ede07a8b5b0dfb9aae152ad13ee15052985d2fe60f9da398683ab2ad
                                                          • Opcode Fuzzy Hash: 460d0f41779b0fc0a208610d5a35257760769fc2b04131787b3afc556df4da9e
                                                          • Instruction Fuzzy Hash: 5E11A2726002096BCF15BFB0AD9AFED776AAF84314F049075B909AB192DF309A458B70
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00A358C1
                                                          • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00A358EE
                                                          • DrawMenuBar.USER32(?), ref: 00A358FD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$InfoItem$Draw
                                                          • String ID: 0
                                                          • API String ID: 3227129158-4108050209
                                                          • Opcode ID: 875541ac3e35340b4ad7e54df8d0881c9a66c075be5858f562ad4e4ac12b0335
                                                          • Instruction ID: a872f296a3e3d8d31224a4b2db0f91581eb51c73f9415c4a45e4ae3e8252784b
                                                          • Opcode Fuzzy Hash: 875541ac3e35340b4ad7e54df8d0881c9a66c075be5858f562ad4e4ac12b0335
                                                          • Instruction Fuzzy Hash: BD016932900218EFDB219F65DC45BEEBBB5FB85360F1080A9F849E6151DB308A94EF21
                                                          APIs
                                                          • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 009FD3BF
                                                          • FreeLibrary.KERNEL32 ref: 009FD3E5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: AddressFreeLibraryProc
                                                          • String ID: GetSystemWow64DirectoryW$X64
                                                          • API String ID: 3013587201-2590602151
                                                          • Opcode ID: 4692f45794c50cc1a52ad0fd9945526b76797a783e0219237232a3059addc98d
                                                          • Instruction ID: e11880a7633f3cc0fb58d04a1d5b7904d8871579336c15dbcfffc329b65628cb
                                                          • Opcode Fuzzy Hash: 4692f45794c50cc1a52ad0fd9945526b76797a783e0219237232a3059addc98d
                                                          • Instruction Fuzzy Hash: F8F055318077289BE73097208C489BD732ABF00B20B50CA49F326F5098E7B4C840EBC3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: cad787da2e9dd8943c59a43af7a1b709dd09c55d7ae7ab8fc72afafe512fa00c
                                                          • Instruction ID: afc4480c20c54bdc36b731e2c45d4260f9408e4d1778a8d16185e1188c3eea31
                                                          • Opcode Fuzzy Hash: cad787da2e9dd8943c59a43af7a1b709dd09c55d7ae7ab8fc72afafe512fa00c
                                                          • Instruction Fuzzy Hash: 09C13975A0020AAFDB15CFA8D894FAEB7B5FF48304F118598E505EB291D731EE41DB90
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: __alldvrm$_strrchr
                                                          • String ID:
                                                          • API String ID: 1036877536-0
                                                          • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                          • Instruction ID: 33038cf06460334401a512373d31b5f9a1c29c259da2d0f0339d7f9394041c15
                                                          • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                          • Instruction Fuzzy Hash: 2AA12771D843869FEB25CF18C8917AEBBE9EF61350F18C16EE5859B381C2388D81C751
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInitInitializeUninitialize
                                                          • String ID:
                                                          • API String ID: 1998397398-0
                                                          • Opcode ID: 85a1f59f658546684376ed920d4c5911d3ed08756f26783f29320dfde82b17c5
                                                          • Instruction ID: 22da6fb93fe601b14081b8a8d9b1d70f4b93771fbc5643c5076be32ef2cbe0e8
                                                          • Opcode Fuzzy Hash: 85a1f59f658546684376ed920d4c5911d3ed08756f26783f29320dfde82b17c5
                                                          • Instruction Fuzzy Hash: 3AA13E756043109FCB10EF68D985A2AB7E5FF89714F04885DF98A9B362DB34EE01CB91
                                                          APIs
                                                          • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00A3FC08,?), ref: 00A005F0
                                                          • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00A3FC08,?), ref: 00A00608
                                                          • CLSIDFromProgID.OLE32(?,?,00000000,00A3CC40,000000FF,?,00000000,00000800,00000000,?,00A3FC08,?), ref: 00A0062D
                                                          • _memcmp.LIBVCRUNTIME ref: 00A0064E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: FromProg$FreeTask_memcmp
                                                          • String ID:
                                                          • API String ID: 314563124-0
                                                          • Opcode ID: fe890c93b4058a5058b7b7a24cd2b596e60ebae9e4de11e02a632f430207b4e2
                                                          • Instruction ID: b4cc2244f21bbd79c9286a40e7e0254f78e89aa1d5ebe5be59c4844ec2619115
                                                          • Opcode Fuzzy Hash: fe890c93b4058a5058b7b7a24cd2b596e60ebae9e4de11e02a632f430207b4e2
                                                          • Instruction Fuzzy Hash: 8381EB75A00109EFCB04DF94D984EEEB7B9FF89315F208558F516AB290DB71AE06CB60
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID:
                                                          • API String ID: 269201875-0
                                                          • Opcode ID: 787932f02a0c7757614504293ad9e7b95821416ff60ca50ce82ce00c6f403b74
                                                          • Instruction ID: 20f2c20ab818698f4bfe70569b5bfc5818aa8749b9f7ff4ee98c0ec45d356f40
                                                          • Opcode Fuzzy Hash: 787932f02a0c7757614504293ad9e7b95821416ff60ca50ce82ce00c6f403b74
                                                          • Instruction Fuzzy Hash: A0413031A005516BDB277BBA8C45BBE3BA9EF81370F144626F415D63E2F6344C419762
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 00A362E2
                                                          • ScreenToClient.USER32(?,?), ref: 00A36315
                                                          • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00A36382
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientMoveRectScreen
                                                          • String ID:
                                                          • API String ID: 3880355969-0
                                                          • Opcode ID: 4729a2b09823804314bcba89a6e1fea8d6bfa8facf8d2a5d8dba855c8b6605ee
                                                          • Instruction ID: f11855e96db07c97d8279ed463a9abac02fb31e0cbf08d390765295a311239ca
                                                          • Opcode Fuzzy Hash: 4729a2b09823804314bcba89a6e1fea8d6bfa8facf8d2a5d8dba855c8b6605ee
                                                          • Instruction Fuzzy Hash: 86512B75A00209EFDF10DFA8D981AAE7BB5FF45360F108169F9659B2A0D730ED81CB90
                                                          APIs
                                                          • socket.WSOCK32(00000002,00000002,00000011), ref: 00A21AFD
                                                          • WSAGetLastError.WSOCK32 ref: 00A21B0B
                                                          • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00A21B8A
                                                          • WSAGetLastError.WSOCK32 ref: 00A21B94
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$socket
                                                          • String ID:
                                                          • API String ID: 1881357543-0
                                                          • Opcode ID: f8ae0ec94605e4923173e8952d363369cdbdc8780b9fb206f1d021487570f525
                                                          • Instruction ID: 6586e5f621468d118077859c3c06351ff38aa5cd86490fe14ccc1e41f46b4d7d
                                                          • Opcode Fuzzy Hash: f8ae0ec94605e4923173e8952d363369cdbdc8780b9fb206f1d021487570f525
                                                          • Instruction Fuzzy Hash: 8241B074600210AFE720AF24D886F6A77E5AB85718F548458F91A9F3D3E772ED428BD0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: aa00ff6118487f0e2d21d38d254a1f238b96919b4665741e4105f45fcbb0c3c9
                                                          • Instruction ID: f4f75795613d3803d7f4e58e09e77b047142313fa68715e845347d3e853df2e8
                                                          • Opcode Fuzzy Hash: aa00ff6118487f0e2d21d38d254a1f238b96919b4665741e4105f45fcbb0c3c9
                                                          • Instruction Fuzzy Hash: A741E275A80344EFE724DF38C841BAABBA9EBC8710F11852FF156DB792D771A9018790
                                                          APIs
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00A15783
                                                          • GetLastError.KERNEL32(?,00000000), ref: 00A157A9
                                                          • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00A157CE
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00A157FA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateHardLink$DeleteErrorFileLast
                                                          • String ID:
                                                          • API String ID: 3321077145-0
                                                          • Opcode ID: 728158b55d94baaed9d9c22ef638c51ea473f026c0fdc2c16d769f42760c733c
                                                          • Instruction ID: 7e2634c32c66d188f1501ffcd347ac045d5de630a45164e645bc05b5ab3e22f1
                                                          • Opcode Fuzzy Hash: 728158b55d94baaed9d9c22ef638c51ea473f026c0fdc2c16d769f42760c733c
                                                          • Instruction Fuzzy Hash: B341DE35A00610DFCB11EF55C945A5EBBE2AF89720B198888F94A6B362CB34FD41DBD1
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,009C6D71,00000000,00000000,009C82D9,?,009C82D9,?,00000001,009C6D71,8BE85006,00000001,009C82D9,009C82D9), ref: 009DD910
                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 009DD999
                                                          • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 009DD9AB
                                                          • __freea.LIBCMT ref: 009DD9B4
                                                            • Part of subcall function 009D3820: RtlAllocateHeap.NTDLL(00000000,?,00A71444,?,009BFDF5,?,?,009AA976,00000010,00A71440,009A13FC,?,009A13C6,?,009A1129), ref: 009D3852
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                          • String ID:
                                                          • API String ID: 2652629310-0
                                                          • Opcode ID: df5067c4ef9ea75415b1de4273d2a7d49efb212e2477c7e1a13c6ecf5cafaa13
                                                          • Instruction ID: 1b57fe07809b53d784b693ea57b0e22363322d8ddad7c8aa1ca7c6dfe9e04ac0
                                                          • Opcode Fuzzy Hash: df5067c4ef9ea75415b1de4273d2a7d49efb212e2477c7e1a13c6ecf5cafaa13
                                                          • Instruction Fuzzy Hash: 7B31F472A0220AABDF25CFA5DC91EAE7BA9EF40710F058169FC04D7250EB36DD50CB90
                                                          APIs
                                                          • SendMessageW.USER32(?,00001024,00000000,?), ref: 00A35352
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00A35375
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00A35382
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00A353A8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: LongWindow$InvalidateMessageRectSend
                                                          • String ID:
                                                          • API String ID: 3340791633-0
                                                          • Opcode ID: 474560ceba9f62f58981c0bc85b56fbeb19116e6d6594c4178fc199e53779547
                                                          • Instruction ID: 6c13475179f74850d04ad5a65386909b42460b202a4a7f0ef91b081ad06a25c1
                                                          • Opcode Fuzzy Hash: 474560ceba9f62f58981c0bc85b56fbeb19116e6d6594c4178fc199e53779547
                                                          • Instruction Fuzzy Hash: 6631C434E95A08EFEB349B7CCC26BE877A5EB05390F584101FA109E1E1C7B49981EB41
                                                          APIs
                                                          • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00A0ABF1
                                                          • SetKeyboardState.USER32(00000080,?,00008000), ref: 00A0AC0D
                                                          • PostMessageW.USER32(00000000,00000101,00000000), ref: 00A0AC74
                                                          • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00A0ACC6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: d27b1975354786b47d076395a7a99410373be50005ea17d0a1aec5e565c50f36
                                                          • Instruction ID: 33707b71d978b0bd824aab8b399801f8cddbfcf22dacc7f88a26f3a37508fa4e
                                                          • Opcode Fuzzy Hash: d27b1975354786b47d076395a7a99410373be50005ea17d0a1aec5e565c50f36
                                                          • Instruction Fuzzy Hash: 0D312430A0471CAFFF35CBA4AC097FE7BB5ABA9320F05431AE485961D1C37489818792
                                                          APIs
                                                          • ClientToScreen.USER32(?,?), ref: 00A3769A
                                                          • GetWindowRect.USER32(?,?), ref: 00A37710
                                                          • PtInRect.USER32(?,?,00A38B89), ref: 00A37720
                                                          • MessageBeep.USER32(00000000), ref: 00A3778C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Rect$BeepClientMessageScreenWindow
                                                          • String ID:
                                                          • API String ID: 1352109105-0
                                                          • Opcode ID: cf2d0b910d06085f9fa35703427753dd36e07dcaa68ebf4734a54800b5160a5d
                                                          • Instruction ID: 1b7c8f25038900c389b00826f0e0493244cb497825c539ac115a53e370163879
                                                          • Opcode Fuzzy Hash: cf2d0b910d06085f9fa35703427753dd36e07dcaa68ebf4734a54800b5160a5d
                                                          • Instruction Fuzzy Hash: 2C416DB4A05214EFCB21CF98CC95EADB7F5FB49314F1581A8F5159B261D730A942CF90
                                                          APIs
                                                          • GetForegroundWindow.USER32 ref: 00A316EB
                                                            • Part of subcall function 00A03A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00A03A57
                                                            • Part of subcall function 00A03A3D: GetCurrentThreadId.KERNEL32 ref: 00A03A5E
                                                            • Part of subcall function 00A03A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00A025B3), ref: 00A03A65
                                                          • GetCaretPos.USER32(?), ref: 00A316FF
                                                          • ClientToScreen.USER32(00000000,?), ref: 00A3174C
                                                          • GetForegroundWindow.USER32 ref: 00A31752
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                          • String ID:
                                                          • API String ID: 2759813231-0
                                                          • Opcode ID: 52004387f8b8df15981384a083d4aa5ba72e9da06044c9cccab9e656ea7a62fc
                                                          • Instruction ID: 730d72020f40287c48de1a8ffc73a1083d6c5157e8c334e1b59fc3c0a7fa4331
                                                          • Opcode Fuzzy Hash: 52004387f8b8df15981384a083d4aa5ba72e9da06044c9cccab9e656ea7a62fc
                                                          • Instruction Fuzzy Hash: 23313071E00149AFCB00DFA9C885DAEB7F9EF89304B5480A9F415E7211D6319E45CBA0
                                                          APIs
                                                            • Part of subcall function 009A7620: _wcslen.LIBCMT ref: 009A7625
                                                          • _wcslen.LIBCMT ref: 00A0DFCB
                                                          • _wcslen.LIBCMT ref: 00A0DFE2
                                                          • _wcslen.LIBCMT ref: 00A0E00D
                                                          • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00A0E018
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$ExtentPoint32Text
                                                          • String ID:
                                                          • API String ID: 3763101759-0
                                                          • Opcode ID: 3454b4b6d74ada7ae9e8af6acfe2564c7dbce8f3ea7b35f450f312c50337c1a1
                                                          • Instruction ID: 50d432b5a09d175ab31b9f95756169e730edf351b9ff01f5e04cf2c578e4a45c
                                                          • Opcode Fuzzy Hash: 3454b4b6d74ada7ae9e8af6acfe2564c7dbce8f3ea7b35f450f312c50337c1a1
                                                          • Instruction Fuzzy Hash: CE219775D40218AFCB20DFA8DD81BAEB7F8EF85750F144069E805BF285D6709E41CBA1
                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 00A0D501
                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 00A0D50F
                                                          • Process32NextW.KERNEL32(00000000,?), ref: 00A0D52F
                                                          • CloseHandle.KERNEL32(00000000), ref: 00A0D5DC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                          • String ID:
                                                          • API String ID: 420147892-0
                                                          • Opcode ID: bbb0a67b52dfadf6b08a4680b4a36080394c19f3f0f8df79e845932c84321d4d
                                                          • Instruction ID: 1fc6cdd7804aaf7fc8d2fb1d65846b5d8163bdb8352edcc59f430d41edac075c
                                                          • Opcode Fuzzy Hash: bbb0a67b52dfadf6b08a4680b4a36080394c19f3f0f8df79e845932c84321d4d
                                                          • Instruction Fuzzy Hash: 55317E721082049FD300EF94DC85BAFBBE8EFDA354F14092DF585961A1EB71A945CB92
                                                          APIs
                                                            • Part of subcall function 009B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 009B9BB2
                                                          • GetCursorPos.USER32(?), ref: 00A39001
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,009F7711,?,?,?,?,?), ref: 00A39016
                                                          • GetCursorPos.USER32(?), ref: 00A3905E
                                                          • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,009F7711,?,?,?), ref: 00A39094
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                          • String ID:
                                                          • API String ID: 2864067406-0
                                                          • Opcode ID: ae9296355900fed63e339390fe0d2b338a1ab15b8d354226f4ff4c641707f715
                                                          • Instruction ID: cbd3d25ecb52b6a7d15cdcfc00e0022ef27fc21bd85aa446379ecb05bc80cef1
                                                          • Opcode Fuzzy Hash: ae9296355900fed63e339390fe0d2b338a1ab15b8d354226f4ff4c641707f715
                                                          • Instruction Fuzzy Hash: 8C21BF35600118EFCB29CFA8CC58EEB3BB9EB8A360F008055F90557261C3719991DB61
                                                          APIs
                                                          • GetFileAttributesW.KERNEL32(?,00A3CB68), ref: 00A0D2FB
                                                          • GetLastError.KERNEL32 ref: 00A0D30A
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00A0D319
                                                          • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00A3CB68), ref: 00A0D376
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateDirectory$AttributesErrorFileLast
                                                          • String ID:
                                                          • API String ID: 2267087916-0
                                                          • Opcode ID: 6e3dda962ee39a52aedae99951c9e5984bd84a08271755c2db34c355025166e4
                                                          • Instruction ID: 7625de41dc26c9428f9176be610c8f5e3c72054a785d4a5260900e7f097053d6
                                                          • Opcode Fuzzy Hash: 6e3dda962ee39a52aedae99951c9e5984bd84a08271755c2db34c355025166e4
                                                          • Instruction Fuzzy Hash: 202191715043059FC700EFA8D8814AAB7E4BF96364F104A1DF499DB2E1E730D946CB93
                                                          APIs
                                                            • Part of subcall function 00A01014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00A0102A
                                                            • Part of subcall function 00A01014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00A01036
                                                            • Part of subcall function 00A01014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A01045
                                                            • Part of subcall function 00A01014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00A0104C
                                                            • Part of subcall function 00A01014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A01062
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00A015BE
                                                          • _memcmp.LIBVCRUNTIME ref: 00A015E1
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A01617
                                                          • HeapFree.KERNEL32(00000000), ref: 00A0161E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                          • String ID:
                                                          • API String ID: 1592001646-0
                                                          • Opcode ID: 55c45cbf6e7d32a421d43b449fc08ad5fb0ab92e9d9f2cd0ecfa9866f61433af
                                                          • Instruction ID: 5ff9bf2dc93444a567b8654230e6ce75f5dd88e99c04a3fac5e29fa7a2ce0ee4
                                                          • Opcode Fuzzy Hash: 55c45cbf6e7d32a421d43b449fc08ad5fb0ab92e9d9f2cd0ecfa9866f61433af
                                                          • Instruction Fuzzy Hash: 6321AC32E00108EFDF14DFA4DD45BEEB7B8EF84354F084459E441AB281E731AA45DBA0
                                                          APIs
                                                          • GetWindowLongW.USER32(?,000000EC), ref: 00A3280A
                                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00A32824
                                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00A32832
                                                          • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00A32840
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Long$AttributesLayered
                                                          • String ID:
                                                          • API String ID: 2169480361-0
                                                          • Opcode ID: a8082c36164156ef671a69d59ab0d5d21f5d9c9d88334c425ec44c20ef36422a
                                                          • Instruction ID: 91d86e20637f1ac3a2384c419c13d79a53db9b9ec042a64e603bcd75ea8a077b
                                                          • Opcode Fuzzy Hash: a8082c36164156ef671a69d59ab0d5d21f5d9c9d88334c425ec44c20ef36422a
                                                          • Instruction Fuzzy Hash: D921AF31604611AFD714DB24CC55FAABBA5AF86324F148158F4268B6E2CB71FC82CBD0
                                                          APIs
                                                            • Part of subcall function 00A08D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00A0790A,?,000000FF,?,00A08754,00000000,?,0000001C,?,?), ref: 00A08D8C
                                                            • Part of subcall function 00A08D7D: lstrcpyW.KERNEL32(00000000,?,?,00A0790A,?,000000FF,?,00A08754,00000000,?,0000001C,?,?,00000000), ref: 00A08DB2
                                                            • Part of subcall function 00A08D7D: lstrcmpiW.KERNEL32(00000000,?,00A0790A,?,000000FF,?,00A08754,00000000,?,0000001C,?,?), ref: 00A08DE3
                                                          • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00A08754,00000000,?,0000001C,?,?,00000000), ref: 00A07923
                                                          • lstrcpyW.KERNEL32(00000000,?,?,00A08754,00000000,?,0000001C,?,?,00000000), ref: 00A07949
                                                          • lstrcmpiW.KERNEL32(00000002,cdecl,?,00A08754,00000000,?,0000001C,?,?,00000000), ref: 00A07984
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: lstrcmpilstrcpylstrlen
                                                          • String ID: cdecl
                                                          • API String ID: 4031866154-3896280584
                                                          • Opcode ID: a0ef5a7099ebfed3567b88153cf7ac6b20e10ea193ee8c82711f42928ef3c53c
                                                          • Instruction ID: 8488a9db577268a4d200eeabd37e9d46f99bdf78c9840b38c73617d30874b843
                                                          • Opcode Fuzzy Hash: a0ef5a7099ebfed3567b88153cf7ac6b20e10ea193ee8c82711f42928ef3c53c
                                                          • Instruction Fuzzy Hash: D611D63A200245ABCB159F34EC45E7A77A5FF85390B50412AF946C72A4EB31D811D7A1
                                                          APIs
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00A37D0B
                                                          • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00A37D2A
                                                          • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00A37D42
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00A1B7AD,00000000), ref: 00A37D6B
                                                            • Part of subcall function 009B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 009B9BB2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Long
                                                          • String ID:
                                                          • API String ID: 847901565-0
                                                          • Opcode ID: 52d4f8b2bc5acc5f029ac2c9b46b7f78908d0bac8236577b99ac6bc1ce753860
                                                          • Instruction ID: f95f39209bc38e1ef09e6580b99f9c2cae4771144945138b8e6bab61428ac1ff
                                                          • Opcode Fuzzy Hash: 52d4f8b2bc5acc5f029ac2c9b46b7f78908d0bac8236577b99ac6bc1ce753860
                                                          • Instruction Fuzzy Hash: 5D11DF72214664AFCB20CF68CC04AAA3BA4AF453B0F118324F939D72F0D7308952DB40
                                                          APIs
                                                          • SendMessageW.USER32(?,00001060,?,00000004), ref: 00A356BB
                                                          • _wcslen.LIBCMT ref: 00A356CD
                                                          • _wcslen.LIBCMT ref: 00A356D8
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00A35816
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend_wcslen
                                                          • String ID:
                                                          • API String ID: 455545452-0
                                                          • Opcode ID: beaa2e694dabf683293f8b1d8e4a0e9c1f4bd9254c8676376c48285bb3046ac0
                                                          • Instruction ID: 7d6274ec0e2cabc3eef22bd26fe5ee54497469fb9e46587153a311b6e413c3a6
                                                          • Opcode Fuzzy Hash: beaa2e694dabf683293f8b1d8e4a0e9c1f4bd9254c8676376c48285bb3046ac0
                                                          • Instruction Fuzzy Hash: 1711B471E0061496DB20DFB98C86BEE77BCAF11760F54802AF915D6081E7748A80CB61
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 96dacd87c8bf735dcb87645a010a492f79aab820671c3d9ee3f718100c1d122c
                                                          • Instruction ID: 5f5eddcb75f15ec6bb213828844d63e761f7c2bb449aebd06ea258ec5265ebd4
                                                          • Opcode Fuzzy Hash: 96dacd87c8bf735dcb87645a010a492f79aab820671c3d9ee3f718100c1d122c
                                                          • Instruction Fuzzy Hash: 98018BB72896167FF6212AB86CC0F67661EDF817B8B308327F522A13D2DB608C409160
                                                          APIs
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00A01A47
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00A01A59
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00A01A6F
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00A01A8A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID:
                                                          • API String ID: 3850602802-0
                                                          • Opcode ID: c9778418000054a38d570816bdb211ad9a4425707c095b8749dbd1e08f8aae5e
                                                          • Instruction ID: e99503cb051a2cafe22c3ca3d67b7d8a0cc7984a7701f739214d8a732d49f4d8
                                                          • Opcode Fuzzy Hash: c9778418000054a38d570816bdb211ad9a4425707c095b8749dbd1e08f8aae5e
                                                          • Instruction Fuzzy Hash: E811F73AA01219FFEB11DBA5DD85FEDBB78EB08750F200091EA04B7290D6716E51DB94
                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 00A0E1FD
                                                          • MessageBoxW.USER32(?,?,?,?), ref: 00A0E230
                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00A0E246
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00A0E24D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                          • String ID:
                                                          • API String ID: 2880819207-0
                                                          • Opcode ID: cd1653e46db387e97e6810b5d670b24f4a835c61f3ca6535009ab2823f08de69
                                                          • Instruction ID: ccfc939b136acd7984c02ce45d87b8af702ad80e7e12541f470065eaaebb8f3c
                                                          • Opcode Fuzzy Hash: cd1653e46db387e97e6810b5d670b24f4a835c61f3ca6535009ab2823f08de69
                                                          • Instruction Fuzzy Hash: FE110872D04218BBCB01DBECAC09ADE7FACAB45325F008719F924E72D0D270C90187A0
                                                          APIs
                                                          • CreateThread.KERNEL32(00000000,?,009CCFF9,00000000,00000004,00000000), ref: 009CD218
                                                          • GetLastError.KERNEL32 ref: 009CD224
                                                          • __dosmaperr.LIBCMT ref: 009CD22B
                                                          • ResumeThread.KERNEL32(00000000), ref: 009CD249
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                          • String ID:
                                                          • API String ID: 173952441-0
                                                          • Opcode ID: 0737f74cbe11c1eab17552bf88b3a63c9acc84a24dde029c139eea3f2e7f5a1b
                                                          • Instruction ID: 2fd20045132914c9487ab971eee6c9f95d6317974cd768f5aee23532d0ed5885
                                                          • Opcode Fuzzy Hash: 0737f74cbe11c1eab17552bf88b3a63c9acc84a24dde029c139eea3f2e7f5a1b
                                                          • Instruction Fuzzy Hash: 6C019276C06204BBDB219BA5DC09FAA7A6DDFC1731F20422DF935961D0DB71C901D7A2
                                                          APIs
                                                            • Part of subcall function 009B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 009B9BB2
                                                          • GetClientRect.USER32(?,?), ref: 00A39F31
                                                          • GetCursorPos.USER32(?), ref: 00A39F3B
                                                          • ScreenToClient.USER32(?,?), ref: 00A39F46
                                                          • DefDlgProcW.USER32(?,00000020,?,00000000,?,?,?), ref: 00A39F7A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Client$CursorLongProcRectScreenWindow
                                                          • String ID:
                                                          • API String ID: 4127811313-0
                                                          • Opcode ID: 414f06b8ede03a0fd65ca1ef23ff5fa55a90985d61a6b8ddb5125ac98ac73585
                                                          • Instruction ID: 39e34b5ad86e1c2f6ad40af23e2af4bb3f236a7a97f25b5b5cc01c663e38ee22
                                                          • Opcode Fuzzy Hash: 414f06b8ede03a0fd65ca1ef23ff5fa55a90985d61a6b8ddb5125ac98ac73585
                                                          • Instruction Fuzzy Hash: CB11273290021AABDB10EFA8DD8ADEF77B9FB45321F104455F912E3150D770BA82CBA1
                                                          APIs
                                                          • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 009A604C
                                                          • GetStockObject.GDI32(00000011), ref: 009A6060
                                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 009A606A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateMessageObjectSendStockWindow
                                                          • String ID:
                                                          • API String ID: 3970641297-0
                                                          • Opcode ID: 97f1c9ae6957a777d8b6de8bb95e28683f5b4fa3beb27f41045b80e383e55d71
                                                          • Instruction ID: 7e6ccbd41d20ea68389ea99a89adc8f412ed999c5a7d4aab48ecdd89238ae162
                                                          • Opcode Fuzzy Hash: 97f1c9ae6957a777d8b6de8bb95e28683f5b4fa3beb27f41045b80e383e55d71
                                                          • Instruction Fuzzy Hash: F5116D72501959BFEF128FA59C44EEABB6DFF093A4F090215FA1462110D7369CA1EBE0
                                                          APIs
                                                          • ___BuildCatchObject.LIBVCRUNTIME ref: 009C3B56
                                                            • Part of subcall function 009C3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 009C3AD2
                                                            • Part of subcall function 009C3AA3: ___AdjustPointer.LIBCMT ref: 009C3AED
                                                          • _UnwindNestedFrames.LIBCMT ref: 009C3B6B
                                                          • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 009C3B7C
                                                          • CallCatchBlock.LIBVCRUNTIME ref: 009C3BA4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                          • String ID:
                                                          • API String ID: 737400349-0
                                                          • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                          • Instruction ID: a54d4fb1c8a85f3e42606a7017217452d97cc85948d3d68efc17c2cbe7b9032d
                                                          • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                          • Instruction Fuzzy Hash: AF01D732900149BBDF129E95CC46FEB7B6DEF98754F048018FE5866121C632E9619BA1
                                                          APIs
                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,009A13C6,00000000,00000000,?,009D301A,009A13C6,00000000,00000000,00000000,?,009D328B,00000006,FlsSetValue), ref: 009D30A5
                                                          • GetLastError.KERNEL32(?,009D301A,009A13C6,00000000,00000000,00000000,?,009D328B,00000006,FlsSetValue,00A42290,FlsSetValue,00000000,00000364,?,009D2E46), ref: 009D30B1
                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,009D301A,009A13C6,00000000,00000000,00000000,?,009D328B,00000006,FlsSetValue,00A42290,FlsSetValue,00000000), ref: 009D30BF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: LibraryLoad$ErrorLast
                                                          • String ID:
                                                          • API String ID: 3177248105-0
                                                          • Opcode ID: 67a019ac47df2390d616066f8284efc3f1837f1f7ee665746446887817348fd9
                                                          • Instruction ID: 244962bc1b7845bbe4ba6da438c41239da634e3410d5d577f3792e0d53be2f64
                                                          • Opcode Fuzzy Hash: 67a019ac47df2390d616066f8284efc3f1837f1f7ee665746446887817348fd9
                                                          • Instruction Fuzzy Hash: 8001D436381222ABCB218BB8EC449577B9CAF45B72B14C621F905F7240C725D902C7E1
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 00A0747F
                                                          • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00A07497
                                                          • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00A074AC
                                                          • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00A074CA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Type$Register$FileLoadModuleNameUser
                                                          • String ID:
                                                          • API String ID: 1352324309-0
                                                          • Opcode ID: 5bde2e0b209e228185ab95509d1e3d7ed821b53ee33b7a7780bd867b8ed822f5
                                                          • Instruction ID: cf664e9e7d7e6ee3714f811c75cff19384d544af0536a8cea7ac3aad8dcdb07a
                                                          • Opcode Fuzzy Hash: 5bde2e0b209e228185ab95509d1e3d7ed821b53ee33b7a7780bd867b8ed822f5
                                                          • Instruction Fuzzy Hash: 1211ADB5A05318ABE720CF58EC08B9A7BFCEB00B10F108569B656E6191D7B2F904DB60
                                                          APIs
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00A0ACD3,?,00008000), ref: 00A0B0C4
                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00A0ACD3,?,00008000), ref: 00A0B0E9
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00A0ACD3,?,00008000), ref: 00A0B0F3
                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00A0ACD3,?,00008000), ref: 00A0B126
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: CounterPerformanceQuerySleep
                                                          • String ID:
                                                          • API String ID: 2875609808-0
                                                          • Opcode ID: 667a5b49148da314d1614ccf068461d31745e3e3d42b910967df3cc60a18d36c
                                                          • Instruction ID: e0b8b6c6567b63e3e652b0c971b1866a67b8ecfeefaf5fcaa46361fc938d3de0
                                                          • Opcode Fuzzy Hash: 667a5b49148da314d1614ccf068461d31745e3e3d42b910967df3cc60a18d36c
                                                          • Instruction Fuzzy Hash: 0C116D31C1152CE7CF00EFE4EE68AEEBB78FF49721F104285E941B2181CB3056619BA1
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 00A37E33
                                                          • ScreenToClient.USER32(?,?), ref: 00A37E4B
                                                          • ScreenToClient.USER32(?,?), ref: 00A37E6F
                                                          • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00A37E8A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ClientRectScreen$InvalidateWindow
                                                          • String ID:
                                                          • API String ID: 357397906-0
                                                          • Opcode ID: e5467e0c9f45dbe75d56fdbfad0c8151a3b2ba9d1f42bdfd7ac85c0e4c7b6d11
                                                          • Instruction ID: c9c5cc840f984fcfcf6f82f07ae7c25b66f8cb546f6c3d0debe3e70931a49a4c
                                                          • Opcode Fuzzy Hash: e5467e0c9f45dbe75d56fdbfad0c8151a3b2ba9d1f42bdfd7ac85c0e4c7b6d11
                                                          • Instruction Fuzzy Hash: 701143B9D0020AAFDB51CF98C8849EEBBF5FB08310F505056E915E2210D735AA55CF50
                                                          APIs
                                                          • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00A02DC5
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 00A02DD6
                                                          • GetCurrentThreadId.KERNEL32 ref: 00A02DDD
                                                          • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00A02DE4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                          • String ID:
                                                          • API String ID: 2710830443-0
                                                          • Opcode ID: 8541f380f3ae5a5158dc4948600ba39f9aa4ece8ba62a5e52ce4adc36a59c524
                                                          • Instruction ID: 47518e6ebbcb6abd3d30e56a0cf1ff44a8ce49c549a9afedaa77c262f3d44230
                                                          • Opcode Fuzzy Hash: 8541f380f3ae5a5158dc4948600ba39f9aa4ece8ba62a5e52ce4adc36a59c524
                                                          • Instruction Fuzzy Hash: 31E06D711013287ADB205BA2AC0EFEB7E6CEB42BB1F001115B105E10809AA0C942C7B0
                                                          APIs
                                                            • Part of subcall function 009B9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 009B9693
                                                            • Part of subcall function 009B9639: SelectObject.GDI32(?,00000000), ref: 009B96A2
                                                            • Part of subcall function 009B9639: BeginPath.GDI32(?), ref: 009B96B9
                                                            • Part of subcall function 009B9639: SelectObject.GDI32(?,00000000), ref: 009B96E2
                                                          • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00A38887
                                                          • LineTo.GDI32(?,?,?), ref: 00A38894
                                                          • EndPath.GDI32(?), ref: 00A388A4
                                                          • StrokePath.GDI32(?), ref: 00A388B2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                          • String ID:
                                                          • API String ID: 1539411459-0
                                                          • Opcode ID: d675fbda64ebaabeb3746dc7fe2f0949c6da9d01938d23213e09da94573391f1
                                                          • Instruction ID: cfaf9acec7528f26a1db28fc48983b0dfda99b6c95a87cf3ac75edba0d21ba95
                                                          • Opcode Fuzzy Hash: d675fbda64ebaabeb3746dc7fe2f0949c6da9d01938d23213e09da94573391f1
                                                          • Instruction Fuzzy Hash: 14F0DA36045659FBDB129FD8AC0AFCA3B69AF06320F448100FB12750E2C7795552DBA5
                                                          APIs
                                                          • GetSysColor.USER32(00000008), ref: 009B98CC
                                                          • SetTextColor.GDI32(?,?), ref: 009B98D6
                                                          • SetBkMode.GDI32(?,00000001), ref: 009B98E9
                                                          • GetStockObject.GDI32(00000005), ref: 009B98F1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Color$ModeObjectStockText
                                                          • String ID:
                                                          • API String ID: 4037423528-0
                                                          • Opcode ID: b5de0dc1feea99d0ff56a46c367bfa0e4b6c2e6b1b6cb7d9e4c0eaf3b42e38dd
                                                          • Instruction ID: f65ad7ae99c51cd6159e7d92b81773d882b23b1c06cb31eaf2aa067e09c5f8b5
                                                          • Opcode Fuzzy Hash: b5de0dc1feea99d0ff56a46c367bfa0e4b6c2e6b1b6cb7d9e4c0eaf3b42e38dd
                                                          • Instruction Fuzzy Hash: A3E09B31244244AEDF219BB4FC09BE87F15EB11335F048319F7F6650E1C37146419B10
                                                          APIs
                                                          • GetCurrentThread.KERNEL32 ref: 00A01634
                                                          • OpenThreadToken.ADVAPI32(00000000,?,?,?,00A011D9), ref: 00A0163B
                                                          • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00A011D9), ref: 00A01648
                                                          • OpenProcessToken.ADVAPI32(00000000,?,?,?,00A011D9), ref: 00A0164F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: CurrentOpenProcessThreadToken
                                                          • String ID:
                                                          • API String ID: 3974789173-0
                                                          • Opcode ID: 06a5772e20ebcabc7758a1afa8876a85d3fd01832d41bc32987f5bda5c532e65
                                                          • Instruction ID: 3a5e05cee55c3fd6be6dc336aa6e5d41d251fb52ce7b52f997ef36ad98e27043
                                                          • Opcode Fuzzy Hash: 06a5772e20ebcabc7758a1afa8876a85d3fd01832d41bc32987f5bda5c532e65
                                                          • Instruction Fuzzy Hash: 59E08C32A02211EBD7206FE0AE0DBC77B7CAF457A6F148808F245E9080E7348546CB60
                                                          APIs
                                                          • GetDesktopWindow.USER32 ref: 009FD858
                                                          • GetDC.USER32(00000000), ref: 009FD862
                                                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 009FD882
                                                          • ReleaseDC.USER32(?), ref: 009FD8A3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: CapsDesktopDeviceReleaseWindow
                                                          • String ID:
                                                          • API String ID: 2889604237-0
                                                          • Opcode ID: 994c86072c158d2058c8c35890560e425a67cafbd41c2e697e6d95b59be9053b
                                                          • Instruction ID: 9f10b5b3fd4e4b65dfb5970775f0bcd522ab27895c297a6399b4b057467df372
                                                          • Opcode Fuzzy Hash: 994c86072c158d2058c8c35890560e425a67cafbd41c2e697e6d95b59be9053b
                                                          • Instruction Fuzzy Hash: 2EE0EEB1800204EFCB41EFE09D09A6DBBB2AB08320F209409F846A7260CB388902AF40
                                                          APIs
                                                          • GetDesktopWindow.USER32 ref: 009FD86C
                                                          • GetDC.USER32(00000000), ref: 009FD876
                                                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 009FD882
                                                          • ReleaseDC.USER32(?), ref: 009FD8A3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: CapsDesktopDeviceReleaseWindow
                                                          • String ID:
                                                          • API String ID: 2889604237-0
                                                          • Opcode ID: 659ea921f270b6a369cb2119b7d36d91a986ecdd7c72ed5b59fab01fb03a10f8
                                                          • Instruction ID: d3800c71161a4cf811821305806ba89080f9f7cca2d64d3cf145ca48f4a921cb
                                                          • Opcode Fuzzy Hash: 659ea921f270b6a369cb2119b7d36d91a986ecdd7c72ed5b59fab01fb03a10f8
                                                          • Instruction Fuzzy Hash: 21E092B5800604EFCB51EFE0DD4D66DBBB5BB48321F149449F94AF7260DB389902AF50
                                                          APIs
                                                            • Part of subcall function 009A7620: _wcslen.LIBCMT ref: 009A7625
                                                          • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00A14ED4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Connection_wcslen
                                                          • String ID: *$LPT
                                                          • API String ID: 1725874428-3443410124
                                                          • Opcode ID: 9f3852b9a9bb15479325d2d6628038330d6b5560274b76ea161bdcdf449a1e90
                                                          • Instruction ID: f80548cbe88d443d89fb14128176240e8d80e18416eded6081e2742f069be359
                                                          • Opcode Fuzzy Hash: 9f3852b9a9bb15479325d2d6628038330d6b5560274b76ea161bdcdf449a1e90
                                                          • Instruction Fuzzy Hash: 1C915075A002049FCB14DF58C494EEABBF5BF49714F198099E80A9F3A2D731ED86CB91
                                                          APIs
                                                          • __startOneArgErrorHandling.LIBCMT ref: 009CE30D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorHandling__start
                                                          • String ID: pow
                                                          • API String ID: 3213639722-2276729525
                                                          • Opcode ID: 96bda0bb87add24831af561b687bfd85ca7f8d54042b68246ee55e33543c127b
                                                          • Instruction ID: 488a04d7b0ef8bf1fff289ee21884279b62b5587b6a8d81a58f77061dbbd2b30
                                                          • Opcode Fuzzy Hash: 96bda0bb87add24831af561b687bfd85ca7f8d54042b68246ee55e33543c127b
                                                          • Instruction Fuzzy Hash: 1B513A65E4C20296CB15B794C901B79BB9C9B80740F70CD5EE097423F9FB398C969A47
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: #
                                                          • API String ID: 0-1885708031
                                                          • Opcode ID: 13741c53d11776e3223d2e13976ccf10bcaf9720cd5592046663e0c6d38bbb94
                                                          • Instruction ID: 25efd1807bac005141d436ae728eaf122d7bb51996439fa8e18d69908fddcec5
                                                          • Opcode Fuzzy Hash: 13741c53d11776e3223d2e13976ccf10bcaf9720cd5592046663e0c6d38bbb94
                                                          • Instruction Fuzzy Hash: 8851277550424ADFDB15EF68C4816FA7BACEF55320F244069FDA19B2E0D7349D42CB90
                                                          APIs
                                                          • Sleep.KERNEL32(00000000), ref: 009BF2A2
                                                          • GlobalMemoryStatusEx.KERNEL32(?), ref: 009BF2BB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: GlobalMemorySleepStatus
                                                          • String ID: @
                                                          • API String ID: 2783356886-2766056989
                                                          • Opcode ID: fbde3a83cc7d6a6eb049fc4a50d390edef7105d894e2c132730b17035497ce3c
                                                          • Instruction ID: b80bd1aee69e15244750c029d73838e35d9e856ff2131b1fe1cfde79fa05f3b7
                                                          • Opcode Fuzzy Hash: fbde3a83cc7d6a6eb049fc4a50d390edef7105d894e2c132730b17035497ce3c
                                                          • Instruction Fuzzy Hash: B85123724087449BD320EF90DC86BABBBF8FBC5300F81885DF199411A5EB708529CBA6
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 00A257E0
                                                          • _wcslen.LIBCMT ref: 00A257EC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper_wcslen
                                                          • String ID: CALLARGARRAY
                                                          • API String ID: 157775604-1150593374
                                                          • Opcode ID: 1cc5d8d7619cf5d2c6b0151117e11078ea287e5676c27f39ed253167a6d80ffa
                                                          • Instruction ID: a104c5902993ff5fc13d7db1f9e575f78fea4de9e7f7a1b1b64a8700297f9451
                                                          • Opcode Fuzzy Hash: 1cc5d8d7619cf5d2c6b0151117e11078ea287e5676c27f39ed253167a6d80ffa
                                                          • Instruction Fuzzy Hash: DE418C31E002199FCB04DFB8D9819AEBBB5FF99324F104029E505AB291E7749D81DBA0
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 00A1D130
                                                          • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00A1D13A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: CrackInternet_wcslen
                                                          • String ID: |
                                                          • API String ID: 596671847-2343686810
                                                          • Opcode ID: 34d388e1395a695c44cc224f6ff36ee341ffde5352bd43657828624880f8faa9
                                                          • Instruction ID: b7e5bb55a4103953d2d819c7ed762d1f385eca872884e36c72e4e451c45178a3
                                                          • Opcode Fuzzy Hash: 34d388e1395a695c44cc224f6ff36ee341ffde5352bd43657828624880f8faa9
                                                          • Instruction Fuzzy Hash: CD312C71D00219ABCF15EFA4CC85AEEBFB9FF46340F100119F815A6161E735AA56CBA0
                                                          APIs
                                                          • DestroyWindow.USER32(?,?,?,?), ref: 00A33621
                                                          • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00A3365C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$DestroyMove
                                                          • String ID: static
                                                          • API String ID: 2139405536-2160076837
                                                          • Opcode ID: e78bd6c9a6b29d129cc8e4f62dd8d088312ac2e0b8f88cd94c119a1dac0774ef
                                                          • Instruction ID: 3e5e987132a07192a9297b672b3bf816ddf884608968a1cdfe40690ec4363c6f
                                                          • Opcode Fuzzy Hash: e78bd6c9a6b29d129cc8e4f62dd8d088312ac2e0b8f88cd94c119a1dac0774ef
                                                          • Instruction Fuzzy Hash: 85318A72110204AEDB20DF68DC81ABB73A9FF88720F009619F8A5D7290DB34AD91C760
                                                          APIs
                                                          • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 00A3461F
                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00A34634
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: '
                                                          • API String ID: 3850602802-1997036262
                                                          • Opcode ID: 250d6b12dc82b2501be352592b07f85176751ee94e30ad84159c49ed36936ea9
                                                          • Instruction ID: 2384c2a73b4d2205a045e5f188d8578e789ebc88c6c89e1fd4b366492fe12dfc
                                                          • Opcode Fuzzy Hash: 250d6b12dc82b2501be352592b07f85176751ee94e30ad84159c49ed36936ea9
                                                          • Instruction Fuzzy Hash: E531F675E0130A9FDB14CFA9C991BDABBB5FF49300F14406AE905AB391E770A942CF90
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00A3327C
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00A33287
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: Combobox
                                                          • API String ID: 3850602802-2096851135
                                                          • Opcode ID: 22fb5defa2770195392bf05b30ef435df8cc673d850e1c3c656fb7475d5db51c
                                                          • Instruction ID: c47fa2ff6280094f214adc997dea12446cf76f89dc2bd8add97355ab712ce3fa
                                                          • Opcode Fuzzy Hash: 22fb5defa2770195392bf05b30ef435df8cc673d850e1c3c656fb7475d5db51c
                                                          • Instruction Fuzzy Hash: 6911B2723042087FEF219F94DC81EFB376AEBA4364F104228F91897290D6759D518760
                                                          APIs
                                                            • Part of subcall function 009A600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 009A604C
                                                            • Part of subcall function 009A600E: GetStockObject.GDI32(00000011), ref: 009A6060
                                                            • Part of subcall function 009A600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 009A606A
                                                          • GetWindowRect.USER32(00000000,?), ref: 00A3377A
                                                          • GetSysColor.USER32(00000012), ref: 00A33794
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                          • String ID: static
                                                          • API String ID: 1983116058-2160076837
                                                          • Opcode ID: 3003477b6ad8755bce8a89a4ad339d8826d36f1cdb784af2312fa5f4018785d1
                                                          • Instruction ID: 39c8064547577dcc868bc20225281ffa12434062e6aa682204e4fe6083cd097f
                                                          • Opcode Fuzzy Hash: 3003477b6ad8755bce8a89a4ad339d8826d36f1cdb784af2312fa5f4018785d1
                                                          • Instruction Fuzzy Hash: 8A1126B2610209AFDF00DFA8CC46AFA7BB8FB08314F004915F956E2250E735E8619B60
                                                          APIs
                                                          • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00A1CD7D
                                                          • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00A1CDA6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Internet$OpenOption
                                                          • String ID: <local>
                                                          • API String ID: 942729171-4266983199
                                                          • Opcode ID: 9a4f2d6bb173b8c25598ad2353c54581c9362af1ee6a5a939d9d1eb2b2b93c57
                                                          • Instruction ID: 3b42440c5410ce552d9f6ecb514cd9dd510dd036df3b014dafc38f43400fad8c
                                                          • Opcode Fuzzy Hash: 9a4f2d6bb173b8c25598ad2353c54581c9362af1ee6a5a939d9d1eb2b2b93c57
                                                          • Instruction Fuzzy Hash: FE11C2B1285631BAD7384B66AC49EE7BEACEF127B4F00422AB54993080D7749981D6F0
                                                          APIs
                                                          • GetWindowTextLengthW.USER32(00000000), ref: 00A334AB
                                                          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00A334BA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: LengthMessageSendTextWindow
                                                          • String ID: edit
                                                          • API String ID: 2978978980-2167791130
                                                          • Opcode ID: f3abb889064e7e0e9a9711cd554e2f9dd7d6af8127b1d8be2da25b8dd5875303
                                                          • Instruction ID: 809ed6003468ebb3bb883710c9bd07a65709ecc22c1e5748a21ba9fc26a87973
                                                          • Opcode Fuzzy Hash: f3abb889064e7e0e9a9711cd554e2f9dd7d6af8127b1d8be2da25b8dd5875303
                                                          • Instruction Fuzzy Hash: 29118C72104208ABEF228FA4DC85ABB37AAEB05775F504724F965A31E0C775DC919B60
                                                          APIs
                                                            • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                          • CharUpperBuffW.USER32(?,?,?), ref: 00A06CB6
                                                          • _wcslen.LIBCMT ref: 00A06CC2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharUpper
                                                          • String ID: STOP
                                                          • API String ID: 1256254125-2411985666
                                                          • Opcode ID: 99c598ee9fdfa282737a0fa0414b5889189678a65d7575ce27e31901905d6446
                                                          • Instruction ID: 3fdb008257f7d697029e6b65802f50aee82800f1630eed0fc864fbc86507a79d
                                                          • Opcode Fuzzy Hash: 99c598ee9fdfa282737a0fa0414b5889189678a65d7575ce27e31901905d6446
                                                          • Instruction Fuzzy Hash: B101D632A0092A8BDB219FFDEC91ABF77B5FBA57187100529E852971D0EB31D960C690
                                                          APIs
                                                            • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                            • Part of subcall function 00A03CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00A03CCA
                                                          • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00A01D4C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 624084870-1403004172
                                                          • Opcode ID: db8fd2fb416157e7a5260c5d32bacb6760f4967df4afba9a3dd71ffe90fe0f20
                                                          • Instruction ID: 39fc679fa66aca5bf8641f7a3f5c4929e5e82975cbd20c01a4c11487c309f367
                                                          • Opcode Fuzzy Hash: db8fd2fb416157e7a5260c5d32bacb6760f4967df4afba9a3dd71ffe90fe0f20
                                                          • Instruction Fuzzy Hash: 2001D471A0122CABCF08EBA4DD55DFE73B8FB47360B044A19F872672C1EA34590887A0
                                                          APIs
                                                            • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                            • Part of subcall function 00A03CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00A03CCA
                                                          • SendMessageW.USER32(?,00000180,00000000,?), ref: 00A01C46
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 624084870-1403004172
                                                          • Opcode ID: 71eca7f1c74f15e1d0d88f4c2a9879b8c2cab378015e67238ae6c500bf8c506e
                                                          • Instruction ID: c956f6855cd5bc49e62afecb2a7636cee3ad3ad13f7c23e6ed91ed2a6f862ac2
                                                          • Opcode Fuzzy Hash: 71eca7f1c74f15e1d0d88f4c2a9879b8c2cab378015e67238ae6c500bf8c506e
                                                          • Instruction Fuzzy Hash: 7301A775A8110C67DF08EBA0DE56AFF77B8AB52340F140019F416772C1EA24DE4C86B1
                                                          APIs
                                                            • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                            • Part of subcall function 00A03CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00A03CCA
                                                          • SendMessageW.USER32(?,00000182,?,00000000), ref: 00A01CC8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 624084870-1403004172
                                                          • Opcode ID: 8ef532227a1a1f7b950b22d370b9097fc72beb7a55bd93ccd4232d22bdb5d8ee
                                                          • Instruction ID: 37442ec40085f1f5e0a2a693d7587f03679ea828e1676a9684569f6a962b4fec
                                                          • Opcode Fuzzy Hash: 8ef532227a1a1f7b950b22d370b9097fc72beb7a55bd93ccd4232d22bdb5d8ee
                                                          • Instruction Fuzzy Hash: 3601D671A8011C67EF04EBA4DF16AFE73BCAB12380F140415B806B32C1EA24DF19C6B1
                                                          APIs
                                                            • Part of subcall function 009A9CB3: _wcslen.LIBCMT ref: 009A9CBD
                                                            • Part of subcall function 00A03CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00A03CCA
                                                          • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00A01DD3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 624084870-1403004172
                                                          • Opcode ID: 754435042075c1fea1ffe5bd4fb9f7c91571a0a6f67dfc8e84004c42f802b8c2
                                                          • Instruction ID: 14f42d660c27e28ed3d146b6f1feb27893584e19502d611ec0be1e1e05d9ad27
                                                          • Opcode Fuzzy Hash: 754435042075c1fea1ffe5bd4fb9f7c91571a0a6f67dfc8e84004c42f802b8c2
                                                          • Instruction Fuzzy Hash: ABF0AF71A4162866DB04E7A4DD56BFE77BCBB42390F040D19F866A72C1EA645A0882A0
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID: 3, 3, 16, 1
                                                          • API String ID: 176396367-3042988571
                                                          • Opcode ID: 4df70f7bafff8832b4edcecbee92ba26067814e17835fa9192afc539637776e7
                                                          • Instruction ID: c2c42f494202c6a5ab03e090a5ad24dc8c9872dfc1ef36adfa5be1fdefcbc609
                                                          • Opcode Fuzzy Hash: 4df70f7bafff8832b4edcecbee92ba26067814e17835fa9192afc539637776e7
                                                          • Instruction Fuzzy Hash: DEE02B02B14230209231337DBDC1FBF568ADFC5B90710183FF981C6266EAA48E9193A2
                                                          APIs
                                                          • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00A00B23
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Message
                                                          • String ID: AutoIt$Error allocating memory.
                                                          • API String ID: 2030045667-4017498283
                                                          • Opcode ID: d678a76dcb8a75a24ee1fcaf7ec4a3b546abda0ab4ac3fd8727936ccda8ee946
                                                          • Instruction ID: ca6018dca44c7d9b0c66cc33204cc6eb96fe4fa9173becec46aa03419f6ef067
                                                          • Opcode Fuzzy Hash: d678a76dcb8a75a24ee1fcaf7ec4a3b546abda0ab4ac3fd8727936ccda8ee946
                                                          • Instruction Fuzzy Hash: B9E04F322843183AD21437947D03FD97A849F46B75F10082AFB98A55C38BE2659047E9
                                                          APIs
                                                            • Part of subcall function 009BF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,009C0D71,?,?,?,009A100A), ref: 009BF7CE
                                                          • IsDebuggerPresent.KERNEL32(?,?,?,009A100A), ref: 009C0D75
                                                          • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,009A100A), ref: 009C0D84
                                                          Strings
                                                          • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 009C0D7F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                          • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                          • API String ID: 55579361-631824599
                                                          • Opcode ID: 2ec4fab30c5d4620144d1f03baf28260596d0cfa594b5156b70cfb41561c4f4e
                                                          • Instruction ID: e9bbd0ed223d0a1179d81af69c3fe3ef68ba3dd53a1e86945bbb0af9973b3663
                                                          • Opcode Fuzzy Hash: 2ec4fab30c5d4620144d1f03baf28260596d0cfa594b5156b70cfb41561c4f4e
                                                          • Instruction Fuzzy Hash: C6E06D706003118FD370EFF8DC047867BE4AB40750F00896DF886C6691DBB4E4458B92
                                                          APIs
                                                          • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 00A1302F
                                                          • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00A13044
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: Temp$FileNamePath
                                                          • String ID: aut
                                                          • API String ID: 3285503233-3010740371
                                                          • Opcode ID: e0592fa4fb369c7ae4e24f19816a86f612fe5cea97caf2db92614aadec32aaed
                                                          • Instruction ID: e7ef5431b158bfc16800b7f597d1234095d056dc00dd32d01e31b57137e0604c
                                                          • Opcode Fuzzy Hash: e0592fa4fb369c7ae4e24f19816a86f612fe5cea97caf2db92614aadec32aaed
                                                          • Instruction Fuzzy Hash: 33D05E7250032877DA20E7E4AC0EFCB3A7CDB04760F0006A1BA55E2091DAB09985CBD0
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: LocalTime
                                                          • String ID: %.3d$X64
                                                          • API String ID: 481472006-1077770165
                                                          • Opcode ID: e36dc4c2fa4639e6f7a70d9c67f7d29f19be65b41891148cb7224b9d24c42bc9
                                                          • Instruction ID: 340813d3d0166bd37de97b7ccf5c570c63359a97349dc7f21b3eaef1ea09154d
                                                          • Opcode Fuzzy Hash: e36dc4c2fa4639e6f7a70d9c67f7d29f19be65b41891148cb7224b9d24c42bc9
                                                          • Instruction Fuzzy Hash: 4CD0126180A11CE9CB50A7D0DD459FAB37DBB08311F608C52FA26A1040E62CC508A7A1
                                                          APIs
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00A3232C
                                                          • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00A3233F
                                                            • Part of subcall function 00A0E97B: Sleep.KERNEL32 ref: 00A0E9F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: FindMessagePostSleepWindow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 529655941-2988720461
                                                          • Opcode ID: 952bbb2469957c43d2be8d7d8ca6d20db0244db97ae271d2d71c61fe1c7a4fca
                                                          • Instruction ID: 0e997119ec73d4ebec36204526116f52660ce8f70d145ab24cbe05e981b68965
                                                          • Opcode Fuzzy Hash: 952bbb2469957c43d2be8d7d8ca6d20db0244db97ae271d2d71c61fe1c7a4fca
                                                          • Instruction Fuzzy Hash: 89D0C936394310B6E664E7B0AC4FFC6BA14AB00B20F0049167645BA1D0C9A4A8028B54
                                                          APIs
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00A3236C
                                                          • PostMessageW.USER32(00000000), ref: 00A32373
                                                            • Part of subcall function 00A0E97B: Sleep.KERNEL32 ref: 00A0E9F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: FindMessagePostSleepWindow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 529655941-2988720461
                                                          • Opcode ID: 958989ba4aaeb5b3768dfed6d65751188062fd2c51d698c569189b3a02b5d79a
                                                          • Instruction ID: d6f18b10ecb7b30ad136d8f697856d017cd23c7bc3c012382ec232865a90d378
                                                          • Opcode Fuzzy Hash: 958989ba4aaeb5b3768dfed6d65751188062fd2c51d698c569189b3a02b5d79a
                                                          • Instruction Fuzzy Hash: 41D0C9323C13107AE664E7B0AC4FFC6B614AB05B20F0049167645BA1D0C9A4A8028B54
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 009DBE93
                                                          • GetLastError.KERNEL32 ref: 009DBEA1
                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 009DBEFC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2935872243.00000000009A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009A0000, based on PE: true
                                                          • Associated: 00000000.00000002.2935838329.00000000009A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2935938313.0000000000A62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936000790.0000000000A6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2936024957.0000000000A74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_9a0000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$ErrorLast
                                                          • String ID:
                                                          • API String ID: 1717984340-0
                                                          • Opcode ID: 1df8e8706a7ecbe33b58e2a4defab32b3108e98706164fb31edcce81db893550
                                                          • Instruction ID: 949e952cee943c3f258aaf9ee341b295629c1645d0cfc1f3b47ca24d470bb8e9
                                                          • Opcode Fuzzy Hash: 1df8e8706a7ecbe33b58e2a4defab32b3108e98706164fb31edcce81db893550
                                                          • Instruction Fuzzy Hash: CF414C34640206EFCF219FA9CC54BBA7BA9DF41320F16C15AF959973A1DB308D01DB60