Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1523034
MD5:50aba0aa8a80d890ef49c27a76476169
SHA1:e3d112aeff03dc896e1836aa1c9cb680874e0aa6
SHA256:fd740a847216805b96292d5f3030de5a5daf46203dc04b11bb3e8beba9fd363b
Tags:exeuser-Bitsight
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection

Classification

  • System is w10x64
  • file.exe (PID: 6228 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 50ABA0AA8A80D890EF49C27A76476169)
    • chrome.exe (PID: 5552 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --app="https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-features=CrashRecovery MD5: 5BBFA6CBDF4C254EB368D534F9E23C92)
      • chrome.exe (PID: 6836 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=2032,i,7930574530814096516,14453764649597155510,262144 --disable-features=CrashRecovery /prefetch:8 MD5: 5BBFA6CBDF4C254EB368D534F9E23C92)
      • chrome.exe (PID: 7876 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5444 --field-trial-handle=2032,i,7930574530814096516,14453764649597155510,262144 --disable-features=CrashRecovery /prefetch:8 MD5: 5BBFA6CBDF4C254EB368D534F9E23C92)
      • chrome.exe (PID: 7884 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5552 --field-trial-handle=2032,i,7930574530814096516,14453764649597155510,262144 --disable-features=CrashRecovery /prefetch:8 MD5: 5BBFA6CBDF4C254EB368D534F9E23C92)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
Source: file.exeJoe Sandbox ML: detected
Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: unknownHTTPS traffic detected: 173.222.162.64:443 -> 192.168.2.6:49762 version: TLS 1.0
Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:49718 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.6:49727 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.6:49732 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:49749 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.6:49759 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:49765 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.3.187.198:443 -> 192.168.2.6:65083 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.6:65084 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.6:65085 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.6:65086 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:65090 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:65093 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:65100 version: TLS 1.2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E1DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00E1DBBE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DEC2A2 FindFirstFileExW,0_2_00DEC2A2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E268EE FindFirstFileW,FindClose,0_2_00E268EE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E2698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00E2698F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E1D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00E1D076
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E1D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00E1D3A9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E29642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00E29642
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E2979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00E2979D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E29B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00E29B2B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E25C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00E25C97
Source: global trafficTCP traffic: 192.168.2.6:65082 -> 162.159.36.2:53
Source: Joe Sandbox ViewIP Address: 239.255.255.250 239.255.255.250
Source: Joe Sandbox ViewJA3 fingerprint: 1138de370e523e824bbca92d049a3777
Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownHTTPS traffic detected: 173.222.162.64:443 -> 192.168.2.6:49762 version: TLS 1.0
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E2CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_00E2CE44
Source: global trafficHTTP traffic detected: GET /account?=https://accounts.google.com/v3/signin/challenge/pwd HTTP/1.1Host: youtube.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIkqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd HTTP/1.1Host: www.youtube.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIkqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentsec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
Source: global trafficHTTP traffic detected: GET /accounts/CheckConnection?pmpo=https%3A%2F%2Faccounts.google.com&v=1836720642&timestamp=1727735944416 HTTP/1.1Host: accounts.youtube.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-full-version: "117.0.5938.134"sec-ch-ua-arch: "x86"sec-ch-ua-platform: "Windows"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-model: ""sec-ch-ua-bitness: "64"sec-ch-ua-wow64: ?0sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIkqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=Sec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: iframeReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Host: www.google.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-arch: "x86"sec-ch-ua-full-version: "117.0.5938.134"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIkqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=Sec-Fetch-Site: same-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: NID=518=OMQleyhhuYM7kr9HKnn1q0gOh11OFo2jBZbhER2FvOmnbnUdpBRWtBmFDK_cwdTReBe9RK1qq9FQOGQU_AN3ml2HG6IgsXLb-EFcg1BSytR40-gAJ4mKUyRiazG3hA9VmxYleWkzuwjnbxSnVYwV6CNX5dGlGZEfXfzJicBBjSPK3lL-_Q
Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=tG9AfCOEA46PAs2&MD=hgtoDYkz HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: global trafficHTTP traffic detected: GET /clientwebservice/ping HTTP/1.1Connection: Keep-AliveUser-Agent: DNS resiliency checker/1.0Host: fe3cr.delivery.mp.microsoft.com
Source: global trafficHTTP traffic detected: GET /sls/ping HTTP/1.1Connection: Keep-AliveUser-Agent: DNS resiliency checker/1.0Host: slscr.update.microsoft.com
Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=tG9AfCOEA46PAs2&MD=hgtoDYkz HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: global trafficHTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=tG9AfCOEA46PAs2&MD=hgtoDYkz HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: chromecache_85.4.drString found in binary or memory: _.iq(p)+"/familylink/privacy/notice/embedded?langCountry="+_.iq(p);break;case "PuZJUb":a+="https://www.youtube.com/t/terms?chromeless=1&hl="+_.iq(m);break;case "fxTQxb":a+="https://youtube.com/t/terms?gl="+_.iq(_.rq(c))+"&hl="+_.iq(d)+"&override_hl=1"+(f?"&linkless=1":"");break;case "prAmvd":a+="https://www.google.com/intl/"+_.iq(m)+"/chromebook/termsofservice.html?languageCode="+_.iq(d)+"&regionCode="+_.iq(c);break;case "NfnTze":a+="https://policies.google.com/privacy/google-partners"+(f?"/embedded": equals www.youtube.com (Youtube)
Source: global trafficDNS traffic detected: DNS query: youtube.com
Source: global trafficDNS traffic detected: DNS query: www.youtube.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: accounts.youtube.com
Source: global trafficDNS traffic detected: DNS query: play.google.com
Source: global trafficDNS traffic detected: DNS query: 198.187.3.20.in-addr.arpa
Source: unknownHTTP traffic detected: POST /log?format=json&hasfast=true&authuser=0 HTTP/1.1Host: play.google.comConnection: keep-aliveContent-Length: 519sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-arch: "x86"Content-Type: application/x-www-form-urlencoded;charset=UTF-8sec-ch-ua-full-version: "117.0.5938.134"sec-ch-ua-platform-version: "10.0.0"X-Goog-AuthUser: 0sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: */*Origin: https://accounts.google.comX-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIkqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: chromecache_85.4.drString found in binary or memory: https://accounts.google.com
Source: chromecache_85.4.drString found in binary or memory: https://accounts.google.com/TOS?loc=
Source: chromecache_90.4.drString found in binary or memory: https://apis.google.com/js/api.js
Source: chromecache_85.4.drString found in binary or memory: https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessage
Source: chromecache_85.4.drString found in binary or memory: https://families.google.com/intl/
Source: chromecache_90.4.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/drive_2020q4/v10/192px.svg
Source: chromecache_90.4.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/gmail_2020q4/v10/web-48dp/logo_gmail_2020q4_color_2x_web_
Source: chromecache_90.4.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/maps/v7/192px.svg
Source: chromecache_85.4.drString found in binary or memory: https://g.co/recover
Source: chromecache_85.4.drString found in binary or memory: https://play.google.com/log?format=json&hasfast=true
Source: chromecache_85.4.drString found in binary or memory: https://play.google.com/work/enroll?identifier=
Source: chromecache_85.4.drString found in binary or memory: https://play.google/intl/
Source: chromecache_85.4.drString found in binary or memory: https://policies.google.com/privacy
Source: chromecache_85.4.drString found in binary or memory: https://policies.google.com/privacy/additional
Source: chromecache_85.4.drString found in binary or memory: https://policies.google.com/privacy/google-partners
Source: chromecache_85.4.drString found in binary or memory: https://policies.google.com/technologies/cookies
Source: chromecache_85.4.drString found in binary or memory: https://policies.google.com/technologies/location-data
Source: chromecache_85.4.drString found in binary or memory: https://policies.google.com/terms
Source: chromecache_85.4.drString found in binary or memory: https://policies.google.com/terms/location
Source: chromecache_85.4.drString found in binary or memory: https://policies.google.com/terms/service-specific
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-email-pin.gif
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-password.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-sms-or-voice-pin.gif
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-sms-pin.gif
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-stop-go-landing-page_1x.png
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/animation/
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/ble_device.png
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/ble_pin.png
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync.png
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_1x.png
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_2x.png
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_darkmode_1x.png
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/continue_on_your_phone.png
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_phone_number_verification.png
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_silent_tap_yes_darkmode.gif
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_tap_yes.gif
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_tap_yes_darkmode.gif
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kid_success.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kid_success_darkmode.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_dark_v2.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_updated.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_updated_darkmode.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_v2.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_not_ready.png
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_stick_around_1.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_stick_around_dark_1.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_account_1.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_account_darkmode_1.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_privacy_1.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_privacy_darkmode_1.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_created.png
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_double_device.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_double_device_darkmode.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_full_house.png
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_link_accounts_1.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_link_accounts_darkmode_1.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_app_decision.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_app_decision_darkmode.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_supervision_1.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_supervision_darkmode_1.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_respect_others_1.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_respect_others_darkmode_1.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_single_device.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_single_device_darkmode.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_stop.png
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/personalization_reminders.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/phone_number_sign_in_2x.png
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/return_to_desktop.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/return_to_desktop_darkmode.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key.gif
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_ios_center.png
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_laptop.gif
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_nfc_discovered.gif
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_nfc_discovered_darkmode.gif
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_phone.gif
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_googleapp_ios.gif
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_googleapp_pulldown.gif
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_tapyes.gif
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/smart_lock_2x.png
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/usb_key.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/web_and_app_activity.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/who_will_be_using_this_device.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/you_tube_history.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/feature_not_available.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/feature_not_available_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/gmail_ios_authzen.gif
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/paaskey.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_challenge.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_challenge_darkmode.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_darkmode.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_cross_device.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_cross_device_darkmode.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_darkmode.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_error.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_error_darkmode.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_reauth.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_reauth_darkmode.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_success.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_success_darkmode.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkeyerror.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkeyerror_darkmode.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/red_globe_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/red_globe_light.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/screenlock.png
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_ipad.gif
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone.gif
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone_nfc.gif
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone_usb.gif
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_phone.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_keys.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/success_checkmark_2.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/success_checkmark_2_darkmode.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/loading_spinner_gm.gif
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/progress_spinner_color_20dp_4x.gif
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/success-gm-default_2x.png
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/apps/signup/resources/custom-email-address.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/images/hpp/shield_security_checkup_green_2x_web_96dp.png
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/account_setup_chapter_dark_1.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/account_setup_chapter_v1.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/device_setup_chapter_dark_v1.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/device_setup_chapter_v1.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/parental_control_chapter_dark_v1.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/parental_control_chapter_v1.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_accountslinked.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_accountslinked_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_childneedshelp.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_childneedshelp_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_nextstepsforparents.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_nextstepsforparents_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_allset.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_allset_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_apps_devices.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_apps_devices_darkmode.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_areyousurekid.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_areyousurekid_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_birthdayemail.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_birthdayemail_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_choose_apps.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_choose_apps_darkmode.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_confirmation.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_exploremore.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_exploremore_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_intro.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_intro_darkmode.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacy_terms_a18.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacy_terms_a18_darkmode.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacyterms.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacyterms_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_review_settings.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_review_settings_darkmode.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_safe_search.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_safe_search_darkmode.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_unchanged_a18.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_unchanged_a18_darkmode.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_update_a18.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_update_a18_darkmode.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_a18.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_a18_darkmode.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_darkmode.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervisiongrad.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervisiongrad_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/guardianlinking/linking_complete_0.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/guardianlinking/linking_complete_dark_0.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/ads_personalization.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/ads_personalization_darkmode.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/confirmation.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/confirmation_darkmode.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/eligibility_error.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/eligibility_error_darkmode.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/fork.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/fork_darkmode.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/intro.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/intro_darkmode.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/personal_results.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/personal_results_darkmode.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/safe_search.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/safe_search_darkmode.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/check_notifications.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/check_notifications_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_installing_family_link_2.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_installing_family_link_dark_2.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_location_sharing_2.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_location_sharing_dark_2.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_parental_controls_2.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_parental_controls_dark_2.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_school_time_2.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_school_time_dark_2.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/location_sharing_enabled_2.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/location_sharing_enabled_dark_3.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/parent_sign_in_prologue_1.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/parent_sign_in_prologue_dark_1.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_complete_1.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_complete_dark_1.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_contacts_2.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_contacts_dark_2.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_boy_1.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_boy_dark_1.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_girl_2.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_girl_dark_2.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/ulp_continue_without_gmail_dark_v2.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/ulp_continue_without_gmail_v2.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/all_set.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/all_set_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/are_you_sure_parent.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/are_you_sure_parent_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/content_restriction.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/content_restriction_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/error.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/error_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/how_controls_work.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/how_controls_work_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/next_steps.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/next_steps_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/setup_controls.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/setup_controls_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_parent.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_parent_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_teen.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_teen_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teentoadultgraduation/supervision_choice.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teentoadultgraduation/supervision_choice_darkmode.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/kid_setup_parent_escalation.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/kid_setup_parent_escalation_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/send_email_confirmation.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/send_email_confirmation_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/success_sent_email.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/success_sent_email_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulpupgrade/kidprofileupgrade_all_set.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulpupgrade/kidprofileupgrade_all_set_darkmode.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/all_set.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/all_set_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/almost_done_kids_space_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/almost_done_kids_space_v2.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_tablet_v2.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_tablet_v2_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_v2.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_v2_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/emailinstallfamilylink.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/emailinstallfamilylink_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/familylinkinstalling.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/familylinkinstalling_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/hand_over_device_dark_v2.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/hand_over_device_v2.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/linking_accounts_v2.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/linking_accounts_v2_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/locationsetup.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/locationsetup_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email_v2.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email_v2_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_v2.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_v2_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/open_family_link_v2.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/open_family_link_v2_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/parents_help.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/parents_help_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/set_up_kids_space.png
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/set_up_kids_space_dark.png
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setupcontrol.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setupcontrol_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuplocation.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuplocation_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuptimelimits.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuptimelimits_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/supervision_ready_v2.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/supervision_ready_v2_dark.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/youtubeaccess.svg
Source: chromecache_90.4.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/youtubeaccess_dark.svg
Source: chromecache_85.4.drString found in binary or memory: https://support.google.com/accounts?hl=
Source: chromecache_85.4.drString found in binary or memory: https://support.google.com/accounts?p=new-si-ui
Source: chromecache_85.4.drString found in binary or memory: https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072
Source: chromecache_90.4.drString found in binary or memory: https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=
Source: chromecache_85.4.drString found in binary or memory: https://www.google.com
Source: chromecache_85.4.drString found in binary or memory: https://www.google.com/intl/
Source: chromecache_90.4.drString found in binary or memory: https://www.gstatic.com/accounts/speedbump/authzen_optin_illustration.gif
Source: chromecache_90.4.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/chrome_48dp.png
Source: chromecache_90.4.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/googleg_48dp.png
Source: chromecache_90.4.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/gsa_48dp.png
Source: chromecache_90.4.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/play_prism_48dp.png
Source: chromecache_90.4.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/youtube_48dp.png
Source: chromecache_85.4.drString found in binary or memory: https://www.gstatic.com/images/branding/productlogos/googleg/v6/36px.svg
Source: chromecache_85.4.drString found in binary or memory: https://www.youtube.com/t/terms?chromeless=1&hl=
Source: file.exe, 00000000.00000003.2118894450.0000000001027000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2118153265.0000000000924000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2118851120.0000000001025000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2120073777.0000000001028000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
Source: file.exe, 00000000.00000002.2119974355.0000000000FF8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdcp_win.dllP
Source: chromecache_85.4.drString found in binary or memory: https://youtube.com/t/terms?gl=
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 65101 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 65086 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 65092 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 65096 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 65083 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 65103
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 65101
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 65102
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 65084
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 65085
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 65083
Source: unknownNetwork traffic detected: HTTP traffic on port 65089 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 65100 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 65088
Source: unknownNetwork traffic detected: HTTP traffic on port 65085 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 65089
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 65086
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 65087
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 65084 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 65103 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 65096
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 65093
Source: unknownNetwork traffic detected: HTTP traffic on port 65088 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 65097
Source: unknownNetwork traffic detected: HTTP traffic on port 65090 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 65092
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 65090
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 65102 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
Source: unknownNetwork traffic detected: HTTP traffic on port 65087 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 65093 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 65100
Source: unknownNetwork traffic detected: HTTP traffic on port 65097 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:49718 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.6:49727 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.6:49732 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:49749 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.6:49759 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.113.110.67:443 -> 192.168.2.6:49765 version: TLS 1.2
Source: unknownHTTPS traffic detected: 20.3.187.198:443 -> 192.168.2.6:65083 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.6:65084 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.6:65085 version: TLS 1.2
Source: unknownHTTPS traffic detected: 4.245.163.56:443 -> 192.168.2.6:65086 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:65090 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:65093 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.115.3.253:443 -> 192.168.2.6:65100 version: TLS 1.2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E2EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00E2EAFF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E2ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00E2ED6A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E2EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00E2EAFF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E1AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_00E1AA57
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E49576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00E49576

System Summary

barindex
Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.
Source: file.exe, 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_31c2c761-d
Source: file.exe, 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_4f9f0417-f
Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_e36d8b29-f
Source: file.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_0ce4c107-3
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E1D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_00E1D5EB
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E11201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00E11201
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E1E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00E1E8F6
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DBBF400_2_00DBBF40
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E220460_2_00E22046
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DB80600_2_00DB8060
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E182980_2_00E18298
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DEE4FF0_2_00DEE4FF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DE676B0_2_00DE676B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E448730_2_00E44873
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DBCAF00_2_00DBCAF0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DDCAA00_2_00DDCAA0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DCCC390_2_00DCCC39
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DE6DD90_2_00DE6DD9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DB91C00_2_00DB91C0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DCB1190_2_00DCB119
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DD13940_2_00DD1394
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DD781B0_2_00DD781B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DC997D0_2_00DC997D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DB79200_2_00DB7920
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DD7A4A0_2_00DD7A4A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DD7CA70_2_00DD7CA7
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DE9EEE0_2_00DE9EEE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E3BE440_2_00E3BE44
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00DB9CB3 appears 31 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00DCF9F2 appears 40 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00DD0A30 appears 46 times
Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: classification engineClassification label: mal56.evad.winEXE@37/30@14/8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E237B5 GetLastError,FormatMessageW,0_2_00E237B5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E110BF AdjustTokenPrivileges,CloseHandle,0_2_00E110BF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E116C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00E116C3
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E251CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00E251CD
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E1D4DC CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00E1D4DC
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E2648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_00E2648E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DB42A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00DB42A2
Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --app="https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-features=CrashRecovery
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=2032,i,7930574530814096516,14453764649597155510,262144 --disable-features=CrashRecovery /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5444 --field-trial-handle=2032,i,7930574530814096516,14453764649597155510,262144 --disable-features=CrashRecovery /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5552 --field-trial-handle=2032,i,7930574530814096516,14453764649597155510,262144 --disable-features=CrashRecovery /prefetch:8
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --app="https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-features=CrashRecoveryJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=2032,i,7930574530814096516,14453764649597155510,262144 --disable-features=CrashRecovery /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5444 --field-trial-handle=2032,i,7930574530814096516,14453764649597155510,262144 --disable-features=CrashRecovery /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5552 --field-trial-handle=2032,i,7930574530814096516,14453764649597155510,262144 --disable-features=CrashRecovery /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DB42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00DB42DE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DD0A76 push ecx; ret 0_2_00DD0A89
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DCF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00DCF98E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E41C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00E41C41
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\file.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-94252
Source: C:\Users\user\Desktop\file.exeAPI coverage: 3.2 %
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E1DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00E1DBBE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DEC2A2 FindFirstFileExW,0_2_00DEC2A2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E268EE FindFirstFileW,FindClose,0_2_00E268EE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E2698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00E2698F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E1D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00E1D076
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E1D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00E1D3A9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E29642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00E29642
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E2979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00E2979D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E29B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00E29B2B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E25C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00E25C97
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DB42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00DB42DE
Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E2EAA2 BlockInput,0_2_00E2EAA2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DE2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00DE2622
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DB42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00DB42DE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DD4CE8 mov eax, dword ptr fs:[00000030h]0_2_00DD4CE8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E10B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00E10B62
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DE2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00DE2622
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DD083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00DD083F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DD09D5 SetUnhandledExceptionFilter,0_2_00DD09D5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DD0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00DD0C21
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E11201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00E11201
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DF2BA5 KiUserCallbackDispatcher,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00DF2BA5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E1B226 SendInput,keybd_event,0_2_00E1B226
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E322DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_00E322DA
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E10B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00E10B62
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E11663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00E11663
Source: file.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
Source: file.exeBinary or memory string: Shell_TrayWnd
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DD0698 cpuid 0_2_00DD0698
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E28195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00E28195
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E0D27A GetUserNameW,0_2_00E0D27A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DEB952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_00DEB952
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DB42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00DB42DE
Source: file.exeBinary or memory string: WIN_81
Source: file.exeBinary or memory string: WIN_XP
Source: file.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
Source: file.exeBinary or memory string: WIN_XPe
Source: file.exeBinary or memory string: WIN_VISTA
Source: file.exeBinary or memory string: WIN_7
Source: file.exeBinary or memory string: WIN_8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E31204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00E31204
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E31806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00E31806
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure2
Valid Accounts
1
Native API
1
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Disable or Modify Tools
21
Input Capture
2
System Time Discovery
Remote Services1
Archive Collected Data
2
Ingress Tool Transfer
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/Job2
Valid Accounts
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory1
Account Discovery
Remote Desktop Protocol21
Input Capture
11
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
Valid Accounts
2
Obfuscated Files or Information
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin Shares3
Clipboard Data
3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
Access Token Manipulation
1
DLL Side-Loading
NTDS15
System Information Discovery
Distributed Component Object ModelInput Capture4
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script2
Process Injection
2
Valid Accounts
LSA Secrets12
Security Software Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Virtualization/Sandbox Evasion
Cached Domain Credentials1
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
Access Token Manipulation
DCSync3
Process Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
Process Injection
Proc Filesystem1
Application Window Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
System Owner/User Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://play.google/intl/0%URL Reputationsafe
https://families.google.com/intl/0%URL Reputationsafe
https://policies.google.com/technologies/location-data0%URL Reputationsafe
https://apis.google.com/js/api.js0%URL Reputationsafe
https://policies.google.com/privacy/google-partners0%URL Reputationsafe
https://policies.google.com/terms/service-specific0%URL Reputationsafe
https://g.co/recover0%URL Reputationsafe
https://policies.google.com/privacy/additional0%URL Reputationsafe
https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=32850720%URL Reputationsafe
https://policies.google.com/technologies/cookies0%URL Reputationsafe
https://policies.google.com/terms0%URL Reputationsafe
https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=0%URL Reputationsafe
https://support.google.com/accounts?hl=0%URL Reputationsafe
https://policies.google.com/terms/location0%URL Reputationsafe
https://policies.google.com/privacy0%URL Reputationsafe
https://support.google.com/accounts?p=new-si-ui0%URL Reputationsafe
https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessage0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
youtube-ui.l.google.com
142.250.185.238
truefalse
    unknown
    www3.l.google.com
    172.217.16.206
    truefalse
      unknown
      play.google.com
      172.217.16.142
      truefalse
        unknown
        www.google.com
        142.250.186.36
        truefalse
          unknown
          youtube.com
          142.250.185.238
          truefalse
            unknown
            accounts.youtube.com
            unknown
            unknownfalse
              unknown
              www.youtube.com
              unknown
              unknownfalse
                unknown
                198.187.3.20.in-addr.arpa
                unknown
                unknownfalse
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  https://play.google.com/log?format=json&hasfast=true&authuser=0false
                    unknown
                    https://www.google.com/favicon.icofalse
                      unknown
                      https://play.google.com/log?hasfast=true&authuser=0&format=jsonfalse
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://play.google/intl/chromecache_85.4.drfalse
                        • URL Reputation: safe
                        unknown
                        https://families.google.com/intl/chromecache_85.4.drfalse
                        • URL Reputation: safe
                        unknown
                        https://youtube.com/t/terms?gl=chromecache_85.4.drfalse
                          unknown
                          https://policies.google.com/technologies/location-datachromecache_85.4.drfalse
                          • URL Reputation: safe
                          unknown
                          https://www.google.com/intl/chromecache_85.4.drfalse
                            unknown
                            https://apis.google.com/js/api.jschromecache_90.4.drfalse
                            • URL Reputation: safe
                            unknown
                            https://policies.google.com/privacy/google-partnerschromecache_85.4.drfalse
                            • URL Reputation: safe
                            unknown
                            https://play.google.com/work/enroll?identifier=chromecache_85.4.drfalse
                              unknown
                              https://policies.google.com/terms/service-specificchromecache_85.4.drfalse
                              • URL Reputation: safe
                              unknown
                              https://g.co/recoverchromecache_85.4.drfalse
                              • URL Reputation: safe
                              unknown
                              https://policies.google.com/privacy/additionalchromecache_85.4.drfalse
                              • URL Reputation: safe
                              unknown
                              https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072chromecache_85.4.drfalse
                              • URL Reputation: safe
                              unknown
                              https://policies.google.com/technologies/cookieschromecache_85.4.drfalse
                              • URL Reputation: safe
                              unknown
                              https://policies.google.com/termschromecache_85.4.drfalse
                              • URL Reputation: safe
                              unknown
                              https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=chromecache_90.4.drfalse
                              • URL Reputation: safe
                              unknown
                              https://www.google.comchromecache_85.4.drfalse
                                unknown
                                https://play.google.com/log?format=json&hasfast=truechromecache_85.4.drfalse
                                  unknown
                                  https://www.youtube.com/t/terms?chromeless=1&hl=chromecache_85.4.drfalse
                                    unknown
                                    https://support.google.com/accounts?hl=chromecache_85.4.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://policies.google.com/terms/locationchromecache_85.4.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://policies.google.com/privacychromecache_85.4.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://support.google.com/accounts?p=new-si-uichromecache_85.4.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessagechromecache_85.4.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    142.250.186.36
                                    www.google.comUnited States
                                    15169GOOGLEUSfalse
                                    172.217.16.206
                                    www3.l.google.comUnited States
                                    15169GOOGLEUSfalse
                                    142.250.185.238
                                    youtube-ui.l.google.comUnited States
                                    15169GOOGLEUSfalse
                                    239.255.255.250
                                    unknownReserved
                                    unknownunknownfalse
                                    142.250.184.228
                                    unknownUnited States
                                    15169GOOGLEUSfalse
                                    172.217.16.142
                                    play.google.comUnited States
                                    15169GOOGLEUSfalse
                                    IP
                                    192.168.2.7
                                    192.168.2.6
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1523034
                                    Start date and time:2024-10-01 00:38:05 +02:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 4m 52s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:11
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:file.exe
                                    Detection:MAL
                                    Classification:mal56.evad.winEXE@37/30@14/8
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:
                                    • Successful, ratio: 96%
                                    • Number of executed functions: 36
                                    • Number of non-executed functions: 313
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                    • Excluded IPs from analysis (whitelisted): 142.250.184.227, 142.250.186.142, 66.102.1.84, 34.104.35.123, 142.250.186.35, 142.250.186.106, 142.250.186.42, 142.250.181.234, 142.250.184.202, 142.250.186.74, 172.217.16.202, 142.250.186.138, 142.250.186.170, 216.58.206.42, 216.58.206.74, 216.58.212.138, 172.217.18.106, 216.58.212.170, 172.217.16.138, 172.217.18.10, 172.217.23.106, 142.250.185.67, 142.250.184.234, 142.250.74.202, 142.250.185.202, 142.250.185.234, 192.229.221.95, 88.221.110.91, 64.233.167.84, 93.184.221.240, 142.250.185.110
                                    • Excluded domains from analysis (whitelisted): clients1.google.com, client.wns.windows.com, fs.microsoft.com, accounts.google.com, content-autofill.googleapis.com, slscr.update.microsoft.com, fonts.gstatic.com, ctldl.windowsupdate.com, clientservices.googleapis.com, fe3cr.delivery.mp.microsoft.com, clients2.google.com, ocsp.digicert.com, edgedl.me.gvt1.com, update.googleapis.com, clients.l.google.com, www.gstatic.com, optimizationguide-pa.googleapis.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                    • VT rate limit hit for: file.exe
                                    No simulations
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    239.255.255.250http://customervoice.microsoft.com/Pages/ResponsePage.aspx?id=rCxHFZLdZUGNvhn9cgWChLhuCDtpfZJDs2F6orjCzx1UQTZXSUlaNE5INzZVSkgxRlBKR1RMSTVRTi4uGet hashmaliciousHTMLPhisherBrowse
                                      file.exeGet hashmaliciousUnknownBrowse
                                        https://wtm.ventes-privees-du-jour.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Get hashmaliciousUnknownBrowse
                                          file.exeGet hashmaliciousUnknownBrowse
                                            http://azgop.org/Get hashmaliciousUnknownBrowse
                                              file.exeGet hashmaliciousUnknownBrowse
                                                file.exeGet hashmaliciousUnknownBrowse
                                                  file.exeGet hashmaliciousUnknownBrowse
                                                    file.exeGet hashmaliciousUnknownBrowse
                                                      file.exeGet hashmaliciousUnknownBrowse
                                                        No context
                                                        No context
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        1138de370e523e824bbca92d049a3777http://customervoice.microsoft.com/Pages/ResponsePage.aspx?id=rCxHFZLdZUGNvhn9cgWChLhuCDtpfZJDs2F6orjCzx1UQTZXSUlaNE5INzZVSkgxRlBKR1RMSTVRTi4uGet hashmaliciousHTMLPhisherBrowse
                                                        • 173.222.162.64
                                                        file.exeGet hashmaliciousUnknownBrowse
                                                        • 173.222.162.64
                                                        https://taplink.cc/universalgrcGet hashmaliciousUnknownBrowse
                                                        • 173.222.162.64
                                                        file.exeGet hashmaliciousUnknownBrowse
                                                        • 173.222.162.64
                                                        American-equity Updated Employee sheet .odtGet hashmaliciousHTMLPhisherBrowse
                                                        • 173.222.162.64
                                                        jKSjtQ8W7O.lnkGet hashmaliciousPureLog Stealer, zgRATBrowse
                                                        • 173.222.162.64
                                                        https://formacionadieste.com.de/Vrvz/Get hashmaliciousHTMLPhisherBrowse
                                                        • 173.222.162.64
                                                        https://vh.gskoffihoura.com/okta.vailhealth.org/oauth2/v1/authorize&client_id=okta-2b1959c8-bcc0-56ebGet hashmaliciousUnknownBrowse
                                                        • 173.222.162.64
                                                        https://timetraveltv.com/actions/cart_update.php?currency=GBP&return_url=https://blog.acelyaokcu.com/m/?c3Y9bzM2NV8xX29uZSZyYW5kPVdrcFNRMHM9JnVpZD1VU0VSMDkwOTIwMjRVMTIwOTA5MDE=N0123N%5BEMAILGet hashmaliciousUnknownBrowse
                                                        • 173.222.162.64
                                                        https://ck.storematch.jp/bc?d=11044D9580EY4W1C2FD019VB3VD27BCW862C0351F9E0EA8-cdlaq4&B=a4f71fd1c235a114f94297e8a0a36c6e&sc_i=shp_pc_promo_mdRMBP_disp_mcad&rd=//interglobalcargoexpress.com/yuuuii#aW5mb0B2b3NzbG9oLmNvbQ==Get hashmaliciousHTMLPhisherBrowse
                                                        • 173.222.162.64
                                                        28a2c9bd18a11de089ef85a160da29e4http://customervoice.microsoft.com/Pages/ResponsePage.aspx?id=rCxHFZLdZUGNvhn9cgWChLhuCDtpfZJDs2F6orjCzx1UQTZXSUlaNE5INzZVSkgxRlBKR1RMSTVRTi4uGet hashmaliciousHTMLPhisherBrowse
                                                        • 4.245.163.56
                                                        • 184.28.90.27
                                                        • 20.3.187.198
                                                        • 52.165.165.26
                                                        file.exeGet hashmaliciousUnknownBrowse
                                                        • 4.245.163.56
                                                        • 184.28.90.27
                                                        • 20.3.187.198
                                                        • 52.165.165.26
                                                        https://wtm.ventes-privees-du-jour.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Get hashmaliciousUnknownBrowse
                                                        • 4.245.163.56
                                                        • 184.28.90.27
                                                        • 20.3.187.198
                                                        • 52.165.165.26
                                                        file.exeGet hashmaliciousUnknownBrowse
                                                        • 4.245.163.56
                                                        • 184.28.90.27
                                                        • 20.3.187.198
                                                        • 52.165.165.26
                                                        http://azgop.org/Get hashmaliciousUnknownBrowse
                                                        • 4.245.163.56
                                                        • 184.28.90.27
                                                        • 20.3.187.198
                                                        • 52.165.165.26
                                                        file.exeGet hashmaliciousUnknownBrowse
                                                        • 4.245.163.56
                                                        • 184.28.90.27
                                                        • 20.3.187.198
                                                        • 52.165.165.26
                                                        file.exeGet hashmaliciousUnknownBrowse
                                                        • 4.245.163.56
                                                        • 184.28.90.27
                                                        • 20.3.187.198
                                                        • 52.165.165.26
                                                        file.exeGet hashmaliciousUnknownBrowse
                                                        • 4.245.163.56
                                                        • 184.28.90.27
                                                        • 20.3.187.198
                                                        • 52.165.165.26
                                                        file.exeGet hashmaliciousUnknownBrowse
                                                        • 4.245.163.56
                                                        • 184.28.90.27
                                                        • 20.3.187.198
                                                        • 52.165.165.26
                                                        file.exeGet hashmaliciousUnknownBrowse
                                                        • 4.245.163.56
                                                        • 184.28.90.27
                                                        • 20.3.187.198
                                                        • 52.165.165.26
                                                        3b5074b1b5d032e5620f69f9f700ff0efile.exeGet hashmaliciousUnknownBrowse
                                                        • 40.113.110.67
                                                        • 40.115.3.253
                                                        file.exeGet hashmaliciousUnknownBrowse
                                                        • 40.113.110.67
                                                        • 40.115.3.253
                                                        file.exeGet hashmaliciousUnknownBrowse
                                                        • 40.113.110.67
                                                        • 40.115.3.253
                                                        file.exeGet hashmaliciousUnknownBrowse
                                                        • 40.113.110.67
                                                        • 40.115.3.253
                                                        SecuriteInfo.com.Win32.CrypterX-gen.16913.10158.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        • 40.113.110.67
                                                        • 40.115.3.253
                                                        Printable_Copy.jsGet hashmaliciousUnknownBrowse
                                                        • 40.113.110.67
                                                        • 40.115.3.253
                                                        Printable_Copy.jsGet hashmaliciousUnknownBrowse
                                                        • 40.113.110.67
                                                        • 40.115.3.253
                                                        OuaJzAFCTk.exeGet hashmaliciousDCRatBrowse
                                                        • 40.113.110.67
                                                        • 40.115.3.253
                                                        DRAFT_PO.vbsGet hashmaliciousUnknownBrowse
                                                        • 40.113.110.67
                                                        • 40.115.3.253
                                                        https://submit.ideasquarelab.com/emailverify/bg230/49PqKw0n3EoTcrbGFwfdUNGet hashmaliciousHTMLPhisherBrowse
                                                        • 40.113.110.67
                                                        • 40.115.3.253
                                                        No context
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (522)
                                                        Category:downloaded
                                                        Size (bytes):5049
                                                        Entropy (8bit):5.317800104741948
                                                        Encrypted:false
                                                        SSDEEP:96:oHX9gPiPrfnHhsB0TR6kg1oDPJzLmM18Vh1z2fEZ54TZtnqj6w:EtEAr6BmPZtOeEvW/ncP
                                                        MD5:CE53EF566B68CCF2D62FA044CFB0D138
                                                        SHA1:F48EC60289F2B55E8B388601206888F8295B1EB1
                                                        SHA-256:E6CC5114D92811D5DE0663266D4B63F367834AFA0FC3BAFA54F707038C59D010
                                                        SHA-512:20B434881DE971E263669E6096C01665D4D35B0FBFF47D312A4A442645EE962A8CE6AD7E68246D4EE9691BD30D9B1DDCF7059226492E1B58CD3191B63B001E4D
                                                        Malicious:false
                                                        Reputation:moderate, very likely benign file
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,iAskyc,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziXSP,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHcuwDoV1_a7sThPZwbu2Ah9zAL5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=wg1P6b"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.$Ma=_.y("wg1P6b",[_.OA,_.Fn,_.Rn]);._.k("wg1P6b");.var M5a;M5a=_.oh(["aria-"]);._.mJ=function(a){_.Y.call(this,a.Fa);this.Ja=this.ta=this.aa=this.viewportElement=this.La=null;this.Tc=a.Ea.qf;this.ab=a.Ea.focus;this.Lc=a.Ea.Lc;this.ea=this.Ei();a=-1*parseInt(_.Fo(this.Ei().el(),"marginTop")||"0",10);var b=parseInt(_.Fo(this.Ei().el(),"marginBottom")||"0",10);this.Ta={top:a,right:0,bottom:b,left:0};a=_.gf(this.getData("isMenuDynamic"),!1);b=_.gf(this.getData("isMenuHoisted"),!1);this.Ga=a?1:b?2:0;this.ka=!1;this.Ca=1;this.Ga!==1&&(this.aa=this.Sa("U0exHf").children().Sc(0),_.fu(this,.N5a(this,this.aa.el())));_.mF(this.oa())&&(a=this.oa().el(),b=this.De.bind(this),a.__soy_skip_handler=b)};_.J(_.mJ,_.Y);_.mJ.Ba=function(){return{Ea:{qf:_.SE,focus:_.BE,Lc:_.mu}}};_.mJ.prototype.pF=function(a){var b=a.source;this.La=b;var c;((c=a.data)==null?0:c.Jy)?(a=a.data.Jy,this.Ca=a==="MOUS
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (5693)
                                                        Category:downloaded
                                                        Size (bytes):697429
                                                        Entropy (8bit):5.593310312179182
                                                        Encrypted:false
                                                        SSDEEP:6144:TYNlxfbDTYDhzCTNoygVWyJb5eGpbL2Mp15gI8seqfh53p+rrvV7i:T25bDTYB+qeGB+Nu
                                                        MD5:92F0F5E28355D863ACB77313F1E675DE
                                                        SHA1:8AD6F9B535D5B8952A4ADCCC57E4A4E0723F1E8D
                                                        SHA-256:F903AE346609A2872554A3D8FFBDB1836CB5C8B7AAAED4C3F8296B887E03D833
                                                        SHA-512:0C81A6CD850C6ACDBE9CCCBA00BBA34CDE1E09E8572814AE8E55DBED3C2B56F0B020359841F8217843B3403847DF46FA1C82229684F762A73C8110CE45898DAF
                                                        Malicious:false
                                                        Reputation:moderate, very likely benign file
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=LEikZe,_b,_tp,byfTOb,lsjVmc/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHcuwDoV1_a7sThPZwbu2Ah9zAL5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=n73qwf,SCuOPb,IZT63,vfuNJf,UUJqVe,ws9Tlc,siKnQd,XVq9Qb,STuCOe,njlZCf,m9oV,vjKJJ,y5vRwf,iyZMqd,NTMZac,mzzZzc,rCcCxc,vvMGie,K1ZKnb,ziZ8Mc,b3kMqb,mvkUhe,CMcBD,Fndnac,t2srLd,EN3i8d,z0u0L,xiZRqc,NOeYWe,O6y8ed,L9OGUe,PrPYRd,MpJwZc,qPfo0c,cYShmd,hc6Ubd,Rkm0ef,KUM7Z,oLggrd,inNHtf,L1AAkb,WpP9Yc,lwddkf,gJzDyc,SpsfSb,aC1iue,tUnxGc,aW3pY,ZakeSe,EFQ78c,xQtZb,I6YDgd,zbML3c,zr1jrb,vHEMJe,YHI3We,YTxL4,bSspM,Uas9Hd,zy0vNb,K0PMbc,AvtSve,qmdT9,MY7mZe,xBaz7b,GwYlN,eVCnO,EIOG1e,LDQI"
                                                        Preview:"use strict";_F_installCss(".r4WGQb{position:relative}.Dl08I>:first-child{margin-top:0}.Dl08I>:last-child{margin-bottom:0}.IzwVE{color:#1f1f1f;color:var(--gm3-sys-color-on-surface,#1f1f1f);font-family:\"Google Sans\",roboto,\"Noto Sans Myanmar UI\",arial,sans-serif;font-size:1.25rem;font-weight:400;letter-spacing:0rem;line-height:1.2}.l5PPKe{color:#1f1f1f;color:var(--gm3-sys-color-on-surface,#1f1f1f);font-size:1rem}.l5PPKe .dMNVAe{margin:0;padding:0}.l5PPKe>:first-child{margin-top:0;padding-top:0}.l5PPKe>:last-child{margin-bottom:0;padding-bottom:0}.Dl08I{margin:0;padding:0;position:relative}.Dl08I>.SmR8:only-child{padding-top:1px}.Dl08I>.SmR8:only-child::before{top:0}.Dl08I>.SmR8:not(first-child){padding-bottom:1px}.Dl08I>.SmR8::after{bottom:0}.Dl08I>.SmR8:only-child::before,.Dl08I>.SmR8::after{border-bottom:1px solid #c4c7c5;border-bottom:1px solid var(--gm3-sys-color-outline-variant,#c4c7c5);content:\"\";height:0;left:0;position:absolute;width:100%}.aZvCDf{margin-top:8px;margin-left
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (468)
                                                        Category:downloaded
                                                        Size (bytes):1858
                                                        Entropy (8bit):5.253939888205379
                                                        Encrypted:false
                                                        SSDEEP:48:o7BNJfeFb8L3A6FHqIy5Z+d70OCzSfvi/3fM/r8ZQzRrw:oFuILhFHrVCz0vLZz9w
                                                        MD5:10FF6F99E3228E96AFD6E2C30EF97C0A
                                                        SHA1:4AE3DCB8D1F5A0C302D5BAD9DFF5050A7A5E8130
                                                        SHA-256:95E5546E1C7F311D07BB5050CC456A973E43BCC4777BA6014757376016537679
                                                        SHA-512:116C0B1CAC98A27044100005545AB66BE5F4801D75DC259093A9F145B3A4ACD8DC1C360AF525F6DC8421CD54B675A78023D2ED8B57F5946A3969543758C673C9
                                                        Malicious:false
                                                        Reputation:moderate, very likely benign file
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHcuwDoV1_a7sThPZwbu2Ah9zAL5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=iAskyc,ziXSP"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("iAskyc");._.$Z=function(a){_.X.call(this,a.Fa);this.window=a.Ea.window.get();this.Mc=a.Ea.Mc};_.J(_.$Z,_.X);_.$Z.Ba=function(){return{Ea:{window:_.lu,Mc:_.vE}}};_.$Z.prototype.Mo=function(){};_.$Z.prototype.addEncryptionRecoveryMethod=function(){};_.a_=function(a){return(a==null?void 0:a.Go)||function(){}};_.b_=function(a){return(a==null?void 0:a.N2)||function(){}};_.OOb=function(a){return(a==null?void 0:a.Mp)||function(){}};._.POb=function(a){return new Map(Array.from(a,function(b){var c=_.n(b);b=c.next().value;c=c.next().value;return[b,c.map(function(d){return{epoch:d.epoch,key:new Uint8Array(d.key)}})]}))};_.QOb=function(a){setTimeout(function(){throw a;},0)};_.$Z.prototype.WN=function(){return!0};_.iu(_.Dn,_.$Z);._.l();._.k("ziXSP");.var t_=function(a){_.$Z.call(this,a.Fa)};_.J(t_,_.$Z);t_.Ba=_.$Z.Ba;t_.prototype.Mo=function(a,b,c){var d;if((d=this.window.chrome)==nu
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (3346)
                                                        Category:downloaded
                                                        Size (bytes):22827
                                                        Entropy (8bit):5.420322672717721
                                                        Encrypted:false
                                                        SSDEEP:384:/jqdWXWfyA20UUjDE8BSUxDJs16KHvSN34kaHaN+587SaXD2mLR0H:/jqdWXAUUjDE84Wi6KPSKjHaN+58+0J2
                                                        MD5:2B29741A316862EE788996DD29116DD5
                                                        SHA1:9D5551916D4452E977C39B8D69CF88DF2AAA462B
                                                        SHA-256:62955C853976B722EFBB4C116A10DB3FF54580EDD7495D280177550B8F4289AB
                                                        SHA-512:6E37C3258F07F29909763728DADE0CD40A3602D55D9099F78B37756926FCF2A50008B82876B518FEAF3E56617F0F7D1D37A73C346A99A58E6AD8BCD6689E9B15
                                                        Malicious:false
                                                        Reputation:moderate, very likely benign file
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,Rkm0ef,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHcuwDoV1_a7sThPZwbu2Ah9zAL5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=RqjULd"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.pu.prototype.da=_.ca(38,function(){return _.vj(this,3)});_.Vy=function(a,b){this.key=a;this.defaultValue=!1;this.flagName=b};_.Vy.prototype.ctor=function(a){return typeof a==="boolean"?a:this.defaultValue};_.Wy=function(){this.ka=!0;var a=_.Bj(_.jk(_.Fe("TSDtV",window),_.pya),_.pu,1,_.uj())[0];if(a){var b={};for(var c=_.n(_.Bj(a,_.qya,2,_.uj())),d=c.next();!d.done;d=c.next()){d=d.value;var e=_.Nj(d,1).toString();switch(_.xj(d,_.qu)){case 3:b[e]=_.Lj(d,_.pj(d,_.qu,3));break;case 2:b[e]=_.Nj(d,_.pj(d,_.qu,2));break;case 4:b[e]=_.Oj(d,_.pj(d,_.qu,4));break;case 5:b[e]=_.L(d,_.pj(d,_.qu,5));break;case 6:b[e]=_.Sj(d,_.kf,6,_.qu);break;default:throw Error("id`"+_.xj(d,_.qu));}}}else b={};this.ea=b;this.token=.a?a.da():null};_.Wy.prototype.aa=function(a){if(!this.ka||a.key in this.ea)a=a.ctor(this.ea[a.key]);else if(_.Fe("nQyAE",window)){var b=_.sya(a.flagName);if(b===null)a=a.def
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:HTML document, ASCII text, with very long lines (681)
                                                        Category:downloaded
                                                        Size (bytes):4070
                                                        Entropy (8bit):5.362700670482359
                                                        Encrypted:false
                                                        SSDEEP:96:GUpT+TmXtdW1qsHFcn7t7CnyWYvNTcLaQOw:lpT+qXW1PFcn7tGnyWY1TGb
                                                        MD5:ED368A20CB303C0E7C6A3E6E43C2E14F
                                                        SHA1:429A5C538B45221F80405163D1F87912DD73C05A
                                                        SHA-256:93BA77AD4B11E0A70C0D36576F0DF24E27F50001EA02BAA6D357E034532D97F2
                                                        SHA-512:DE74BBADE910475DD245FFEFD4E1FD10137DE710B1C920D33BA52554911496E1339EF3C1F6D9D315CBC98A60ABE5687A3E7D8BEE483708E18D25722E794BDBE9
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHcuwDoV1_a7sThPZwbu2Ah9zAL5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=sOXFj,q0xTif,ZZ4WUe"
                                                        Preview:"use strict";_F_installCss(".N7rBcd{overflow-x:auto}sentinel{}");.this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.zg(_.dqa);._.k("sOXFj");.var ou=function(a){_.X.call(this,a.Fa)};_.J(ou,_.X);ou.Ba=_.X.Ba;ou.prototype.aa=function(a){return a()};_.iu(_.cqa,ou);._.l();._.k("oGtAuc");._.oya=new _.uf(_.dqa);._.l();._.k("q0xTif");.var iza=function(a){var b=function(d){_.Zn(d)&&(_.Zn(d).Gc=null,_.yu(d,null));d.XyHi9&&(d.XyHi9=null)};b(a);a=a.querySelectorAll("[c-wiz]");for(var c=0;c<a.length;c++)b(a[c])},Ku=function(a){_.et.call(this,a.Fa);this.Qa=this.dom=null;if(this.Vk()){var b=_.Jm(this.Mg(),[_.Om,_.Nm]);b=_.ri([b[_.Om],b[_.Nm]]).then(function(c){this.Qa=c[0];this.dom=c[1]},null,this);_.cu(this,b)}this.Ra=a.Xl.Hda};_.J(Ku,_.et);Ku.Ba=function(){return{Xl:{Hda:function(a){return _.Ye(a)}}}};Ku.prototype.yp=function(a){return this.Ra.yp(a)};.Ku.prototype.getData=function(a){return this.Ra.getData(a)};Ku.prototype.vp=function(){_.Ft(this.d
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                                                        Category:downloaded
                                                        Size (bytes):5430
                                                        Entropy (8bit):3.6534652184263736
                                                        Encrypted:false
                                                        SSDEEP:48:wIJct3xIAxG/7nvWDtZcdYLtX7B6QXL3aqG8Q:wIJct+A47v+rcqlBPG9B
                                                        MD5:F3418A443E7D841097C714D69EC4BCB8
                                                        SHA1:49263695F6B0CDD72F45CF1B775E660FDC36C606
                                                        SHA-256:6DA5620880159634213E197FAFCA1DDE0272153BE3E4590818533FAB8D040770
                                                        SHA-512:82D017C4B7EC8E0C46E8B75DA0CA6A52FD8BCE7FCF4E556CBDF16B49FC81BE9953FE7E25A05F63ECD41C7272E8BB0A9FD9AEDF0AC06CB6032330B096B3702563
                                                        Malicious:false
                                                        URL:https://www.google.com/favicon.ico
                                                        Preview:............ .h...&... .... .........(....... ..... ............................................0...................................................................................................................................v.].X.:.X.:.r.Y........................................q.X.S.4.S.4.S.4.S.4.S.4.S.4...X....................0........q.W.S.4.X.:.................J...A...g.........................K.H.V.8..........................F..B.....................,.......................................B..............................................B..B..B..B..B...u..........................................B..B..B..B..B...{.................5.......k...........................................................7R..8F.................................................2........Vb..5C..;I..................R^.....................0................Xc..5C..5C..5C..5C..5C..5C..lv..........................................]i..<J..:G..Zf....................................................
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (553)
                                                        Category:downloaded
                                                        Size (bytes):603951
                                                        Entropy (8bit):5.789948381047936
                                                        Encrypted:false
                                                        SSDEEP:3072:W0pApkygA62bwwdnO2YflNYhFGOizdGj008PpVVM96C5bMEPQUhts6FV8eKqtVAT:WlgNmwwdnOsF98oNGuQRAYqXsI1+
                                                        MD5:A97373CC3F8795654F3C8C6B57066AE7
                                                        SHA1:F7BECFDDE230EF537E8745B598DCED737C490C3C
                                                        SHA-256:A1B0568D555DC4B4AF4CC5A6C41E838B702816445C04FF002C8A13058387F311
                                                        SHA-512:47C76D26F4F9F206F93186800E06D3DBE1FDD0A1BA23FB9A3556390DE7F86C1FFB2C78FE307FB944C690475BFBAE9738C38233E00FDDFA9775A3B2030081D7F1
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/excm=_b,_tp,identifierview/ed=1/dg=0/wt=2/ujg=1/rs=AOaEmlEQAz5EZnBR6fK6LIn1v8ILsATM3g/m=_b,_tp"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._._F_toggles_initialize=function(a){(typeof globalThis!=="undefined"?globalThis:typeof self!=="undefined"?self:this)._F_toggles=a||[]};(0,_._F_toggles_initialize)([0x286081c4, 0x2046d860, 0x1ce13c40, 0x51407a0, 0x1908, 0x0, 0x1b400000, 0x19a00000, 0x0, ]);./*.. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright Google LLC. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright 2024 Google, Inc. SPDX-License-Identifier: MIT.*/./*. SPDX-License-Identifier: Apache-2.0.*/./*. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/.var baa,daa,Na,Ua,gaa,iaa,lb,qaa,xaa,Daa,Iaa,Laa,Mb,Maa,Rb,Vb,Wb,Naa,Oaa,Xb,Paa,Qaa,Raa,ac,Waa,Yaa,ic,jc,kc,cba,dba,hba,kba,mba,nba,rba,uba,oba,tba,sba,qba,pba,vba,zba,Dba,Eba,Bba,Kc,Lc,Hba,Jba,Nba,Oba,Pba,Qba,Mba,Rba,Tba,gd,Vba,Wba,Yba,$ba,Zba,bca,cca,dca,eca,gca,fca,ica,jca,kca,lca,oca,r
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (533)
                                                        Category:downloaded
                                                        Size (bytes):9210
                                                        Entropy (8bit):5.3872171131917925
                                                        Encrypted:false
                                                        SSDEEP:192:FK/pAzN7GZ068Hqhqu6DQaVapzYjgKItwdiwUsYRTi1j1t9bRl9:FqI7GZ04dRYjghtgisYYbt9ll9
                                                        MD5:AB70454DE18E1CE16E61EAC290FC304D
                                                        SHA1:68532B5E8B262D7E14B8F4507AA69A61146B3C18
                                                        SHA-256:B32D746867CC4FA21FD39437502F401D952D0A3E8DC708DFB7D58B85F256C0F1
                                                        SHA-512:A123C517380BEF0B47F23A5A6E1D16650FE39D9C701F9FA5ADD79294973C118E8EA3A7BA32CB63C3DFC0CE0F843FB86BFFCAA2AAE987629E7DFF84F176DEBB98
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=AvtSve,CMcBD,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PrPYRd,Rkm0ef,SCuOPb,STuCOe,SpsfSb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,byfTOb,cYShmd,eVCnO,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,qPfo0c,qmdT9,rCcCxc,siKnQd,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHcuwDoV1_a7sThPZwbu2Ah9zAL5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=ltDFwf,SD8Jgb,rmumx,E87wgc,qPYxq,Tbb4sb,pxq3x,f8Gu1e,soHxf,YgOFye,yRXbo,bTi8wc,ywOR5c,PHUIyb"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.gNa=_.y("SD8Jgb",[]);._.QX=function(a,b){if(typeof b==="string")a.Nc(b);else if(b instanceof _.Ip&&b.ia&&b.ia===_.B)b=_.$a(b.ww()),a.empty().append(b);else if(b instanceof _.Wa)b=_.$a(b),a.empty().append(b);else if(b instanceof Node)a.empty().append(b);else throw Error("Vf");};_.RX=function(a){var b=_.Lo(a,"[jsslot]");if(b.size()>0)return b;b=new _.Jo([_.Qk("span")]);_.Mo(b,"jsslot","");a.empty().append(b);return b};_.TKb=function(a){return a===null||typeof a==="string"&&_.Ki(a)};._.k("SD8Jgb");._.WX=function(a){_.Y.call(this,a.Fa);this.Ua=a.controller.Ua;this.kd=a.controllers.kd[0]||null;this.header=a.controller.header;this.nav=a.controller.nav;var b;(b=this.oa().find("button:not([type])").el())==null||b.setAttribute("type","button")};_.J(_.WX,_.Y);_.WX.Ba=function(){return{controller:{Ua:{jsname:"n7vHCb",ctor:_.hv},header:{jsname:"tJHJj",ctor:_.hv},nav:{jsname:"DH6Rkf",ct
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:Web Open Font Format (Version 2), TrueType, length 52280, version 1.0
                                                        Category:downloaded
                                                        Size (bytes):52280
                                                        Entropy (8bit):7.995413196679271
                                                        Encrypted:true
                                                        SSDEEP:1536:1rvqtK8DZilXxwJ8mMwAZy7phqsFLdG3B4d:xytBZits8bw4wzbFxG3B4d
                                                        MD5:F61F0D4D0F968D5BBA39A84C76277E1A
                                                        SHA1:AA3693EA140ECA418B4B2A30F6A68F6F43B4BEB2
                                                        SHA-256:57147F08949ABABE7DEEF611435AE418475A693E3823769A25C2A39B6EAD9CCC
                                                        SHA-512:6C3BD90F709BCF9151C9ED9FFEA55C4F6883E7FDA2A4E26BF018C83FE1CFBE4F4AA0DB080D6D024070D53B2257472C399C8AC44EEFD38B9445640EFA85D5C487
                                                        Malicious:false
                                                        URL:https://fonts.gstatic.com/s/googlesans/v58/4UaRrENHsxJlGDuGo1OIlJfC6l_24rlCK1Yo_Iq2vgCI.woff2
                                                        Preview:wOF2.......8.....................................^...$..4?HVAR..?MVAR9.`?STAT.*',..J/.......`..(..Z.0..R.6.$.... .....K..[..q..c..T.....>.P.j.`.w..#...%......N.".....$..3.0.6......... .L.rX/r[j.y.|*(.4.%#.....2.v.m..-..%.....;-.Y.{..&..O=#l@...k..7g..ZI...#.Z./+T..r7...M..3).Z%.x....s..sL..[A!.5*1w'/.8V..2Z..%.X.h.o.).]..9..Q`.$.....7..kZ.~O........d..g.n.d.Rw+&....Cz..uy#..fz,(.J....v.%..`..9.....h...?O..:...c%.....6s....xl..#...5..._......1.>.)"U.4 W....?%......6//!$...!.n9C@n...........!""^.....W..Z<.7.x.."UT.T....E.."R>.R..t.....H d..e_.K../.+8.Q.P.ZQ....;...U....]......._.e*......71.?.7.ORv.?...l...G|.P...|:...I.X..2.,.L........d.g.]}W#uW]QnuP-s.;.-Y.....].......C..j_.M0...y.......J..........NY..@A...,....-.F......'..w./j5g.vUS...U..0.&...y7.LP.....%.....Y......Y..D. e.A..G.?.$.......6...eaK.n5.m...N...,...+BCl..L> .E9~.b[.w.x....6<...}.e...%V....O.......*.?...a..#[eE.4..p..$...].....%......o._......N.._~..El....b..A.0.r8.....|..D.d..
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (1694)
                                                        Category:downloaded
                                                        Size (bytes):32499
                                                        Entropy (8bit):5.361345284201954
                                                        Encrypted:false
                                                        SSDEEP:768:mLX1O+aL6fgyIiREM4RKmh90toLoTswtF3ATcbDR6kIsnJd9DPyMv/FI:U2M4oltoLoTswtFoc/tIsnXFLI
                                                        MD5:D5C3FB8EAE24AB7E40009338B5078496
                                                        SHA1:5638BF5986A6445A88CD79A9B690B744B126BEC2
                                                        SHA-256:597C14D360D690BCFDC2B8D315E6BB8879AEF33DE6C30D274743079BDB63C6B0
                                                        SHA-512:6AE434850D473BEF15AA694AB4862596982CDDA6BD3991991D3ADD8F4A5F61DFBF8756D0DA98B72EF083909D68CF7B6B148A6488E9381F92FBF15CCB20176A0E
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=_b,_tp/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHcuwDoV1_a7sThPZwbu2Ah9zAL5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=byfTOb,lsjVmc,LEikZe"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{.var qua=function(a,b){this.da=a;this.ea=b;if(!c){var c=new _.gp("//www.google.com/images/cleardot.gif");_.rp(c)}this.ka=c};_.h=qua.prototype;_.h.Vc=null;_.h.QY=1E4;_.h.Iz=!1;_.h.TP=0;_.h.qJ=null;_.h.DU=null;_.h.setTimeout=function(a){this.QY=a};_.h.start=function(){if(this.Iz)throw Error("dc");this.Iz=!0;this.TP=0;rua(this)};_.h.stop=function(){sua(this);this.Iz=!1};.var rua=function(a){a.TP++;navigator!==null&&"onLine"in navigator&&!navigator.onLine?_.om((0,_.eg)(a.JG,a,!1),0):(a.aa=new Image,a.aa.onload=(0,_.eg)(a.Xia,a),a.aa.onerror=(0,_.eg)(a.Wia,a),a.aa.onabort=(0,_.eg)(a.Via,a),a.qJ=_.om(a.Yia,a.QY,a),a.aa.src=String(a.ka))};_.h=qua.prototype;_.h.Xia=function(){this.JG(!0)};_.h.Wia=function(){this.JG(!1)};_.h.Via=function(){this.JG(!1)};_.h.Yia=function(){this.JG(!1)};._.h.JG=function(a){sua(this);a?(this.Iz=!1,this.da.call(this.ea,!0)):this.TP<=0?rua(this):(this.Iz=!1,
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (683)
                                                        Category:downloaded
                                                        Size (bytes):3131
                                                        Entropy (8bit):5.3750044852869046
                                                        Encrypted:false
                                                        SSDEEP:48:o7zfN/cD498xdg+Y5jNQ8js6npwk0OmNAEZbpMzR4EQBcW5QcHj9KWfGAeFKRrw:oCD9dA5jOEGh+EFqR4rhqUhzff9w
                                                        MD5:39693D34EE3D1829DBB1627C4FC6687B
                                                        SHA1:A03303C2F027F3749B48D5134D1F8FB3E495C6E9
                                                        SHA-256:03B0C1B4E402E0BCF75D530DD9085B25357EEFD09E238453DE1F3A042542C076
                                                        SHA-512:AC0749EDC33DA0EC0E40470388DD797B6528AD08B8FAC1C2AC42F85198131052BA1B533E90409D35DA237607E8B07D591FA6BA580B6A90B0D0AB2282A01F7585
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHcuwDoV1_a7sThPZwbu2Ah9zAL5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=ZwDk9d,RMhBfe"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("ZwDk9d");.var bA=function(a){_.X.call(this,a.Fa)};_.J(bA,_.X);bA.Ba=_.X.Ba;bA.prototype.wR=function(a){return _.af(this,{Wa:{HS:_.ol}}).then(function(b){var c=window._wjdd,d=window._wjdc;return!c&&d?new _.oi(function(e){window._wjdc=function(f){d(f);e(PJa(f,b,a))}}):PJa(c,b,a)})};var PJa=function(a,b,c){return(a=a&&a[c])?a:b.Wa.HS.wR(c)};.bA.prototype.aa=function(a,b){var c=_.csa(b).Gj;if(c.startsWith("$")){var d=_.jm.get(a);_.xq[b]&&(d||(d={},_.jm.set(a,d)),d[c]=_.xq[b],delete _.xq[b],_.yq--);if(d)if(a=d[c])b=_.ef(a);else throw Error("Jb`"+b);else b=null}else b=null;return b};_.iu(_.Mfa,bA);._.l();._.k("SNUn3");._.OJa=new _.uf(_.Ag);._.l();._.k("RMhBfe");.var QJa=function(a){var b=_.wq(a);return b?new _.oi(function(c,d){var e=function(){b=_.wq(a);var f=_.Tfa(a,b);f?c(f.getAttribute("jsdata")):window.document.readyState=="complete"?(f=["Unable to find deferred jsdata wit
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (569)
                                                        Category:downloaded
                                                        Size (bytes):3471
                                                        Entropy (8bit):5.5174491302699495
                                                        Encrypted:false
                                                        SSDEEP:96:ojAmjTJ/fJgpIcB7Fd2tilGBEMO/A6VxV08w:vUTJpgDJXM0ApJ
                                                        MD5:2D999C87DD54C7FE6400D267C33FBB23
                                                        SHA1:414C3A329C2760325EDBACBD7A221D7F8DBFEEE8
                                                        SHA-256:76D55A1AFC1D39CB04D60EB04E45A538A0E75EE2871561C84CC89B1C13596BCC
                                                        SHA-512:72D923BB71DD147139962FF8E2BD0E336E0F6409C212AC2F25387D0F3B4FC9365F5A6D40E2980BB1065534888362C97D6B7663E362D29166B5915D2A9DA7D238
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=A7fCU,AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,iAskyc,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,wg1P6b,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziXSP,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHcuwDoV1_a7sThPZwbu2Ah9zAL5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=Wt6vjf,hhhU8,FCpbqb,WhJNk"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("Wt6vjf");.var Txa=function(){var a=_.Ke();return _.L(a,1)},Tt=function(a){this.Da=_.t(a,0,Tt.messageId)};_.J(Tt,_.w);Tt.prototype.Ha=function(){return _.Hj(this,1)};Tt.prototype.Va=function(a){return _.Yj(this,1,a)};Tt.messageId="f.bo";var Ut=function(){_.km.call(this)};_.J(Ut,_.km);Ut.prototype.ud=function(){this.jT=!1;Uxa(this);_.km.prototype.ud.call(this)};Ut.prototype.aa=function(){Vxa(this);if(this.hC)return Wxa(this),!1;if(!this.sV)return Vt(this),!0;this.dispatchEvent("p");if(!this.fP)return Vt(this),!0;this.jM?(this.dispatchEvent("r"),Vt(this)):Wxa(this);return!1};.var Xxa=function(a){var b=new _.gp(a.z4);a.WP!=null&&_.Mn(b,"authuser",a.WP);return b},Wxa=function(a){a.hC=!0;var b=Xxa(a),c="rt=r&f_uid="+_.sk(a.fP);_.fn(b,(0,_.eg)(a.ea,a),"POST",c)};.Ut.prototype.ea=function(a){a=a.target;Vxa(this);if(_.jn(a)){this.RJ=0;if(this.jM)this.hC=!1,this.dispatchEvent("r")
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (395)
                                                        Category:downloaded
                                                        Size (bytes):1608
                                                        Entropy (8bit):5.280977407061266
                                                        Encrypted:false
                                                        SSDEEP:48:o7YNJvl3WlENrpB3stYCIgMxILNH/wf7DVTBpdQrw:oApB8iDwYlGw
                                                        MD5:4FB66582D37D04933F00E49C2FBA34D4
                                                        SHA1:3DB09C53BBEB1EEB045A001356E498D8EF30915D
                                                        SHA-256:A97DAC01ABFE3EB75C7C97D504E21BDDDADDB6EBE0B56B6A9A10CD3700CAB41B
                                                        SHA-512:2AEB3A6CFFBF6EFA626EBDC9E11ACBAC04BFE986F98FBC050B2501898B289C67D392ED195D16ACC9565EF8784401ADA1E88188CDE3A7AB12D98BB5ED7D8A5711
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHcuwDoV1_a7sThPZwbu2Ah9zAL5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=w9hDv,ZDZcre,A7fCU"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("w9hDv");._.zg(_.Kla);_.$z=function(a){_.X.call(this,a.Fa);this.aa=a.Wa.cache};_.J(_.$z,_.X);_.$z.Ba=function(){return{Wa:{cache:_.Zs}}};_.$z.prototype.execute=function(a){_.Gb(a,function(b){var c;_.df(b)&&(c=b.eb.jc(b.jb));c&&this.aa.oG(c)},this);return{}};_.iu(_.Qla,_.$z);._.l();._.k("ZDZcre");.var ZG=function(a){_.X.call(this,a.Fa);this.Nl=a.Ea.Nl;this.G3=a.Ea.metadata;this.aa=a.Ea.Ws};_.J(ZG,_.X);ZG.Ba=function(){return{Ea:{Nl:_.DG,metadata:_.HZa,Ws:_.AG}}};ZG.prototype.execute=function(a){var b=this;a=this.aa.create(a);return _.Gb(a,function(c){var d=b.G3.getType(c.Md())===2?b.Nl.Pb(c):b.Nl.fetch(c);return _.Jl(c,_.EG)?d.then(function(e){return _.Jd(e)}):d},this)};_.iu(_.Vla,ZG);._.l();._.k("K5nYTd");._.GZa=new _.uf(_.Rla);._.l();._.k("sP4Vbe");.._.l();._.k("kMFpHd");.._.l();._.k("A7fCU");.var GG=function(a){_.X.call(this,a.Fa);this.aa=a.Ea.ZP};_.J(GG,_.X);GG.Ba=func
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:downloaded
                                                        Size (bytes):84
                                                        Entropy (8bit):4.875266466142591
                                                        Encrypted:false
                                                        SSDEEP:3:DZFJu0+WVTBCq2Bjdw2KsJJuYHSKnZ:lFJuuVTBudw29nu4SKZ
                                                        MD5:87B6333E98B7620EA1FF98D1A837A39E
                                                        SHA1:105DE6815B0885357DE1414BFC0D77FCC9E924EF
                                                        SHA-256:DCD3C133C5C40BECD4100BBE6EDAE84C9735E778E4234A5E8395C56FF8A733BA
                                                        SHA-512:867D7943D813685FAA76394E53199750C55817E836FD19C933F74D11E9657CE66719A6D6B2E39EE1DE62358BCE364E38A55F4E138DF92337DE6985DDCD5D0994
                                                        Malicious:false
                                                        URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzQSHgmA6QC9dWevzxIFDRkBE_oSBQ3oIX6GEgUN05ioBw==?alt=proto
                                                        Preview:Cj0KBw0ZARP6GgAKKQ3oIX6GGgQISxgCKhwIClIYCg5AIS4jJF8qLSY/Ky8lLBABGP////8PCgcN05ioBxoA
                                                        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        File Type:ASCII text, with very long lines (755)
                                                        Category:downloaded
                                                        Size (bytes):1460
                                                        Entropy (8bit):5.316515499943097
                                                        Encrypted:false
                                                        SSDEEP:24:kMYD7DduJqrxsNL90YIzFK/Hb5eNhz1uktdDuvKKKGbLZ99GbSSF/ZR8OkdnprGJ:o7DQJopFN+ASCKKGbF99GbSS3RY7rw
                                                        MD5:D97AB4594FC610665FF2763A650EE6A8
                                                        SHA1:5C7459CA838D27BE45745571D8D96D156F4B9F8D
                                                        SHA-256:767D778369623FD8F5FB98D3BCC3130D05D02CBE0B9B88DD226F43281B14E9AF
                                                        SHA-512:CE4941B41C3A8CC983C1BBCC87EF682823CB9DB24EA7A570E35BBF832046340D433F7D47211384B61FA38F3527CC35C195A6068CCB24B48E1F492C5B4D4192A1
                                                        Malicious:false
                                                        URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,ZwDk9d,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHcuwDoV1_a7sThPZwbu2Ah9zAL5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=P6sQOc"
                                                        Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("lOO0Vd");._.HZa=new _.uf(_.Km);._.l();._.k("P6sQOc");.var MZa=!!(_.Nh[1]&16);var OZa=function(a,b,c,d,e){this.ea=a;this.ta=b;this.ka=c;this.Ca=d;this.Ga=e;this.aa=0;this.da=NZa(this)},PZa=function(a){var b={};_.Ma(a.hS(),function(e){b[e]=!0});var c=a.WR(),d=a.cS();return new OZa(a.XO(),c.aa()*1E3,a.oR(),d.aa()*1E3,b)},NZa=function(a){return Math.random()*Math.min(a.ta*Math.pow(a.ka,a.aa),a.Ca)},HG=function(a,b){return a.aa>=a.ea?!1:b!=null?!!a.Ga[b]:!0};var IG=function(a){_.X.call(this,a.Fa);this.da=a.Ea.mV;this.ea=a.Ea.metadata;a=a.Ea.lga;this.fetch=a.fetch.bind(a)};_.J(IG,_.X);IG.Ba=function(){return{Ea:{mV:_.KZa,metadata:_.HZa,lga:_.AZa}}};IG.prototype.aa=function(a,b){if(this.ea.getType(a.Md())!==1)return _.Vm(a);var c=this.da.JU;return(c=c?PZa(c):null)&&HG(c)?_.mya(a,QZa(this,a,b,c)):_.Vm(a)};.var QZa=function(a,b,c,d){return c.then(function(e){return e},function(e)
                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Entropy (8bit):6.579782426504288
                                                        TrID:
                                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                        • DOS Executable Generic (2002/1) 0.02%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:file.exe
                                                        File size:917'504 bytes
                                                        MD5:50aba0aa8a80d890ef49c27a76476169
                                                        SHA1:e3d112aeff03dc896e1836aa1c9cb680874e0aa6
                                                        SHA256:fd740a847216805b96292d5f3030de5a5daf46203dc04b11bb3e8beba9fd363b
                                                        SHA512:d6cc6bedd0ee6ea654868bd1e00735a50de3b7428292a2d2433a9674c864b8a58f734a2514030379aa13013db39916b683cd30b204b98c2d77ef64cd4d43d8bf
                                                        SSDEEP:12288:TqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDgaUTu:TqDEvCTbMWu7rQYlBQcBiT6rprG8a0u
                                                        TLSH:D5159E0273D1C062FFAB92334B5AF6515BBC69260123E61F13981DB9BE701B1563E7A3
                                                        File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                        Icon Hash:aaf3e3e3938382a0
                                                        Entrypoint:0x420577
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                        DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x66FB2806 [Mon Sep 30 22:36:54 2024 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:5
                                                        OS Version Minor:1
                                                        File Version Major:5
                                                        File Version Minor:1
                                                        Subsystem Version Major:5
                                                        Subsystem Version Minor:1
                                                        Import Hash:948cc502fe9226992dce9417f952fce3
                                                        Instruction
                                                        call 00007FF9ECCE8A23h
                                                        jmp 00007FF9ECCE832Fh
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        push dword ptr [ebp+08h]
                                                        mov esi, ecx
                                                        call 00007FF9ECCE850Dh
                                                        mov dword ptr [esi], 0049FDF0h
                                                        mov eax, esi
                                                        pop esi
                                                        pop ebp
                                                        retn 0004h
                                                        and dword ptr [ecx+04h], 00000000h
                                                        mov eax, ecx
                                                        and dword ptr [ecx+08h], 00000000h
                                                        mov dword ptr [ecx+04h], 0049FDF8h
                                                        mov dword ptr [ecx], 0049FDF0h
                                                        ret
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        push dword ptr [ebp+08h]
                                                        mov esi, ecx
                                                        call 00007FF9ECCE84DAh
                                                        mov dword ptr [esi], 0049FE0Ch
                                                        mov eax, esi
                                                        pop esi
                                                        pop ebp
                                                        retn 0004h
                                                        and dword ptr [ecx+04h], 00000000h
                                                        mov eax, ecx
                                                        and dword ptr [ecx+08h], 00000000h
                                                        mov dword ptr [ecx+04h], 0049FE14h
                                                        mov dword ptr [ecx], 0049FE0Ch
                                                        ret
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        mov esi, ecx
                                                        lea eax, dword ptr [esi+04h]
                                                        mov dword ptr [esi], 0049FDD0h
                                                        and dword ptr [eax], 00000000h
                                                        and dword ptr [eax+04h], 00000000h
                                                        push eax
                                                        mov eax, dword ptr [ebp+08h]
                                                        add eax, 04h
                                                        push eax
                                                        call 00007FF9ECCEB0CDh
                                                        pop ecx
                                                        pop ecx
                                                        mov eax, esi
                                                        pop esi
                                                        pop ebp
                                                        retn 0004h
                                                        lea eax, dword ptr [ecx+04h]
                                                        mov dword ptr [ecx], 0049FDD0h
                                                        push eax
                                                        call 00007FF9ECCEB118h
                                                        pop ecx
                                                        ret
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        mov esi, ecx
                                                        lea eax, dword ptr [esi+04h]
                                                        mov dword ptr [esi], 0049FDD0h
                                                        push eax
                                                        call 00007FF9ECCEB101h
                                                        test byte ptr [ebp+08h], 00000001h
                                                        pop ecx
                                                        Programming Language:
                                                        • [ C ] VS2008 SP1 build 30729
                                                        • [IMP] VS2008 SP1 build 30729
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x9590.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xde0000x7594.reloc
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .rsrc0xd40000x95900x96007cccd64978c028c3a601732b12f204dcFalse0.2852604166666667data5.167247015993855IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .reloc0xde0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                        RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                        RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                        RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                        RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                        RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                        RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                        RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                        RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                        RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                        RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                        RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                                        RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                                        RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                                        RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                                        RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                        RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                        RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                        RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                        RT_RCDATA0xdc7b80x858data1.0051498127340823
                                                        RT_GROUP_ICON0xdd0100x76dataEnglishGreat Britain0.6610169491525424
                                                        RT_GROUP_ICON0xdd0880x14dataEnglishGreat Britain1.25
                                                        RT_GROUP_ICON0xdd09c0x14dataEnglishGreat Britain1.15
                                                        RT_GROUP_ICON0xdd0b00x14dataEnglishGreat Britain1.25
                                                        RT_VERSION0xdd0c40xdcdataEnglishGreat Britain0.6181818181818182
                                                        RT_MANIFEST0xdd1a00x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                        DLLImport
                                                        WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                        VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                        WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                        COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                        MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                        WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                        PSAPI.DLLGetProcessMemoryInfo
                                                        IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                        USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                        UxTheme.dllIsThemeActive
                                                        KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                        USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                        GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                        COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                        ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                        SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                        ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                        OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                        Language of compilation systemCountry where language is spokenMap
                                                        EnglishGreat Britain
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Oct 1, 2024 00:38:51.386344910 CEST49674443192.168.2.6173.222.162.64
                                                        Oct 1, 2024 00:38:51.386344910 CEST49673443192.168.2.6173.222.162.64
                                                        Oct 1, 2024 00:38:51.698857069 CEST49672443192.168.2.6173.222.162.64
                                                        Oct 1, 2024 00:38:56.865798950 CEST49712443192.168.2.6142.250.185.238
                                                        Oct 1, 2024 00:38:56.865817070 CEST44349712142.250.185.238192.168.2.6
                                                        Oct 1, 2024 00:38:56.865863085 CEST49712443192.168.2.6142.250.185.238
                                                        Oct 1, 2024 00:38:56.867460012 CEST49712443192.168.2.6142.250.185.238
                                                        Oct 1, 2024 00:38:56.867474079 CEST44349712142.250.185.238192.168.2.6
                                                        Oct 1, 2024 00:38:57.503067970 CEST44349712142.250.185.238192.168.2.6
                                                        Oct 1, 2024 00:38:57.549375057 CEST49712443192.168.2.6142.250.185.238
                                                        Oct 1, 2024 00:38:57.587277889 CEST49712443192.168.2.6142.250.185.238
                                                        Oct 1, 2024 00:38:57.587289095 CEST44349712142.250.185.238192.168.2.6
                                                        Oct 1, 2024 00:38:57.588135004 CEST44349712142.250.185.238192.168.2.6
                                                        Oct 1, 2024 00:38:57.588187933 CEST49712443192.168.2.6142.250.185.238
                                                        Oct 1, 2024 00:38:57.588804007 CEST44349712142.250.185.238192.168.2.6
                                                        Oct 1, 2024 00:38:57.588848114 CEST49712443192.168.2.6142.250.185.238
                                                        Oct 1, 2024 00:38:57.611488104 CEST49712443192.168.2.6142.250.185.238
                                                        Oct 1, 2024 00:38:57.611566067 CEST44349712142.250.185.238192.168.2.6
                                                        Oct 1, 2024 00:38:57.612147093 CEST49712443192.168.2.6142.250.185.238
                                                        Oct 1, 2024 00:38:57.612160921 CEST44349712142.250.185.238192.168.2.6
                                                        Oct 1, 2024 00:38:57.658821106 CEST49712443192.168.2.6142.250.185.238
                                                        Oct 1, 2024 00:38:57.812194109 CEST44349712142.250.185.238192.168.2.6
                                                        Oct 1, 2024 00:38:57.812767982 CEST44349712142.250.185.238192.168.2.6
                                                        Oct 1, 2024 00:38:57.812841892 CEST49712443192.168.2.6142.250.185.238
                                                        Oct 1, 2024 00:38:57.814810991 CEST49712443192.168.2.6142.250.185.238
                                                        Oct 1, 2024 00:38:57.814829111 CEST44349712142.250.185.238192.168.2.6
                                                        Oct 1, 2024 00:38:57.826550007 CEST49714443192.168.2.6142.250.185.238
                                                        Oct 1, 2024 00:38:57.826596022 CEST44349714142.250.185.238192.168.2.6
                                                        Oct 1, 2024 00:38:57.826658964 CEST49714443192.168.2.6142.250.185.238
                                                        Oct 1, 2024 00:38:57.827030897 CEST49714443192.168.2.6142.250.185.238
                                                        Oct 1, 2024 00:38:57.827044010 CEST44349714142.250.185.238192.168.2.6
                                                        Oct 1, 2024 00:38:58.473912001 CEST44349714142.250.185.238192.168.2.6
                                                        Oct 1, 2024 00:38:58.474312067 CEST49714443192.168.2.6142.250.185.238
                                                        Oct 1, 2024 00:38:58.474328041 CEST44349714142.250.185.238192.168.2.6
                                                        Oct 1, 2024 00:38:58.474716902 CEST44349714142.250.185.238192.168.2.6
                                                        Oct 1, 2024 00:38:58.475023985 CEST49714443192.168.2.6142.250.185.238
                                                        Oct 1, 2024 00:38:58.475436926 CEST44349714142.250.185.238192.168.2.6
                                                        Oct 1, 2024 00:38:58.475506067 CEST49714443192.168.2.6142.250.185.238
                                                        Oct 1, 2024 00:38:58.476685047 CEST49714443192.168.2.6142.250.185.238
                                                        Oct 1, 2024 00:38:58.476685047 CEST49714443192.168.2.6142.250.185.238
                                                        Oct 1, 2024 00:38:58.476703882 CEST44349714142.250.185.238192.168.2.6
                                                        Oct 1, 2024 00:38:58.476746082 CEST44349714142.250.185.238192.168.2.6
                                                        Oct 1, 2024 00:38:58.519731998 CEST49714443192.168.2.6142.250.185.238
                                                        Oct 1, 2024 00:38:58.519748926 CEST44349714142.250.185.238192.168.2.6
                                                        Oct 1, 2024 00:38:58.566832066 CEST49714443192.168.2.6142.250.185.238
                                                        Oct 1, 2024 00:38:58.782377005 CEST44349714142.250.185.238192.168.2.6
                                                        Oct 1, 2024 00:38:58.782392979 CEST44349714142.250.185.238192.168.2.6
                                                        Oct 1, 2024 00:38:58.782550097 CEST49714443192.168.2.6142.250.185.238
                                                        Oct 1, 2024 00:38:58.782560110 CEST44349714142.250.185.238192.168.2.6
                                                        Oct 1, 2024 00:38:58.782867908 CEST44349714142.250.185.238192.168.2.6
                                                        Oct 1, 2024 00:38:58.785692930 CEST49714443192.168.2.6142.250.185.238
                                                        Oct 1, 2024 00:38:58.785703897 CEST44349714142.250.185.238192.168.2.6
                                                        Oct 1, 2024 00:38:58.785815954 CEST49714443192.168.2.6142.250.185.238
                                                        Oct 1, 2024 00:38:58.785870075 CEST49714443192.168.2.6142.250.185.238
                                                        Oct 1, 2024 00:38:59.507635117 CEST49718443192.168.2.640.113.110.67
                                                        Oct 1, 2024 00:38:59.507678986 CEST4434971840.113.110.67192.168.2.6
                                                        Oct 1, 2024 00:38:59.507755995 CEST49718443192.168.2.640.113.110.67
                                                        Oct 1, 2024 00:38:59.508292913 CEST49718443192.168.2.640.113.110.67
                                                        Oct 1, 2024 00:38:59.508306026 CEST4434971840.113.110.67192.168.2.6
                                                        Oct 1, 2024 00:39:00.302191019 CEST4434971840.113.110.67192.168.2.6
                                                        Oct 1, 2024 00:39:00.302278042 CEST49718443192.168.2.640.113.110.67
                                                        Oct 1, 2024 00:39:00.307949066 CEST49718443192.168.2.640.113.110.67
                                                        Oct 1, 2024 00:39:00.307965040 CEST4434971840.113.110.67192.168.2.6
                                                        Oct 1, 2024 00:39:00.308233976 CEST4434971840.113.110.67192.168.2.6
                                                        Oct 1, 2024 00:39:00.309933901 CEST49718443192.168.2.640.113.110.67
                                                        Oct 1, 2024 00:39:00.310007095 CEST49718443192.168.2.640.113.110.67
                                                        Oct 1, 2024 00:39:00.310009956 CEST4434971840.113.110.67192.168.2.6
                                                        Oct 1, 2024 00:39:00.310167074 CEST49718443192.168.2.640.113.110.67
                                                        Oct 1, 2024 00:39:00.355416059 CEST4434971840.113.110.67192.168.2.6
                                                        Oct 1, 2024 00:39:00.480281115 CEST4434971840.113.110.67192.168.2.6
                                                        Oct 1, 2024 00:39:00.480489016 CEST4434971840.113.110.67192.168.2.6
                                                        Oct 1, 2024 00:39:00.480549097 CEST49718443192.168.2.640.113.110.67
                                                        Oct 1, 2024 00:39:00.481395960 CEST49718443192.168.2.640.113.110.67
                                                        Oct 1, 2024 00:39:00.481405020 CEST4434971840.113.110.67192.168.2.6
                                                        Oct 1, 2024 00:39:00.481420040 CEST49718443192.168.2.640.113.110.67
                                                        Oct 1, 2024 00:39:00.994792938 CEST49674443192.168.2.6173.222.162.64
                                                        Oct 1, 2024 00:39:00.994792938 CEST49673443192.168.2.6173.222.162.64
                                                        Oct 1, 2024 00:39:01.306159019 CEST49672443192.168.2.6173.222.162.64
                                                        Oct 1, 2024 00:39:01.392187119 CEST49723443192.168.2.6142.250.186.36
                                                        Oct 1, 2024 00:39:01.392221928 CEST44349723142.250.186.36192.168.2.6
                                                        Oct 1, 2024 00:39:01.392278910 CEST49723443192.168.2.6142.250.186.36
                                                        Oct 1, 2024 00:39:01.392447948 CEST49723443192.168.2.6142.250.186.36
                                                        Oct 1, 2024 00:39:01.392457962 CEST44349723142.250.186.36192.168.2.6
                                                        Oct 1, 2024 00:39:02.037475109 CEST44349723142.250.186.36192.168.2.6
                                                        Oct 1, 2024 00:39:02.037664890 CEST49723443192.168.2.6142.250.186.36
                                                        Oct 1, 2024 00:39:02.037687063 CEST44349723142.250.186.36192.168.2.6
                                                        Oct 1, 2024 00:39:02.038661957 CEST44349723142.250.186.36192.168.2.6
                                                        Oct 1, 2024 00:39:02.038989067 CEST49723443192.168.2.6142.250.186.36
                                                        Oct 1, 2024 00:39:02.039659023 CEST49723443192.168.2.6142.250.186.36
                                                        Oct 1, 2024 00:39:02.039715052 CEST44349723142.250.186.36192.168.2.6
                                                        Oct 1, 2024 00:39:02.065994024 CEST49727443192.168.2.6184.28.90.27
                                                        Oct 1, 2024 00:39:02.066023111 CEST44349727184.28.90.27192.168.2.6
                                                        Oct 1, 2024 00:39:02.066083908 CEST49727443192.168.2.6184.28.90.27
                                                        Oct 1, 2024 00:39:02.069611073 CEST49727443192.168.2.6184.28.90.27
                                                        Oct 1, 2024 00:39:02.069645882 CEST44349727184.28.90.27192.168.2.6
                                                        Oct 1, 2024 00:39:02.092885017 CEST49723443192.168.2.6142.250.186.36
                                                        Oct 1, 2024 00:39:02.092907906 CEST44349723142.250.186.36192.168.2.6
                                                        Oct 1, 2024 00:39:02.143224001 CEST49723443192.168.2.6142.250.186.36
                                                        Oct 1, 2024 00:39:02.707968950 CEST44349727184.28.90.27192.168.2.6
                                                        Oct 1, 2024 00:39:02.708035946 CEST49727443192.168.2.6184.28.90.27
                                                        Oct 1, 2024 00:39:02.711090088 CEST49727443192.168.2.6184.28.90.27
                                                        Oct 1, 2024 00:39:02.711096048 CEST44349727184.28.90.27192.168.2.6
                                                        Oct 1, 2024 00:39:02.711323023 CEST44349727184.28.90.27192.168.2.6
                                                        Oct 1, 2024 00:39:02.763269901 CEST49727443192.168.2.6184.28.90.27
                                                        Oct 1, 2024 00:39:02.803400040 CEST44349727184.28.90.27192.168.2.6
                                                        Oct 1, 2024 00:39:02.979105949 CEST44349727184.28.90.27192.168.2.6
                                                        Oct 1, 2024 00:39:02.979159117 CEST44349727184.28.90.27192.168.2.6
                                                        Oct 1, 2024 00:39:02.979206085 CEST49727443192.168.2.6184.28.90.27
                                                        Oct 1, 2024 00:39:02.988811970 CEST44349705173.222.162.64192.168.2.6
                                                        Oct 1, 2024 00:39:02.988892078 CEST49705443192.168.2.6173.222.162.64
                                                        Oct 1, 2024 00:39:02.997771978 CEST49727443192.168.2.6184.28.90.27
                                                        Oct 1, 2024 00:39:02.997786045 CEST44349727184.28.90.27192.168.2.6
                                                        Oct 1, 2024 00:39:02.997797966 CEST49727443192.168.2.6184.28.90.27
                                                        Oct 1, 2024 00:39:02.997802973 CEST44349727184.28.90.27192.168.2.6
                                                        Oct 1, 2024 00:39:03.066983938 CEST49732443192.168.2.6184.28.90.27
                                                        Oct 1, 2024 00:39:03.067008018 CEST44349732184.28.90.27192.168.2.6
                                                        Oct 1, 2024 00:39:03.067073107 CEST49732443192.168.2.6184.28.90.27
                                                        Oct 1, 2024 00:39:03.067378998 CEST49732443192.168.2.6184.28.90.27
                                                        Oct 1, 2024 00:39:03.067394018 CEST44349732184.28.90.27192.168.2.6
                                                        Oct 1, 2024 00:39:03.705180883 CEST44349732184.28.90.27192.168.2.6
                                                        Oct 1, 2024 00:39:03.705293894 CEST49732443192.168.2.6184.28.90.27
                                                        Oct 1, 2024 00:39:03.706743956 CEST49732443192.168.2.6184.28.90.27
                                                        Oct 1, 2024 00:39:03.706751108 CEST44349732184.28.90.27192.168.2.6
                                                        Oct 1, 2024 00:39:03.706983089 CEST44349732184.28.90.27192.168.2.6
                                                        Oct 1, 2024 00:39:03.711317062 CEST49732443192.168.2.6184.28.90.27
                                                        Oct 1, 2024 00:39:03.755404949 CEST44349732184.28.90.27192.168.2.6
                                                        Oct 1, 2024 00:39:03.980823994 CEST44349732184.28.90.27192.168.2.6
                                                        Oct 1, 2024 00:39:03.980878115 CEST44349732184.28.90.27192.168.2.6
                                                        Oct 1, 2024 00:39:03.981002092 CEST49732443192.168.2.6184.28.90.27
                                                        Oct 1, 2024 00:39:03.982374907 CEST49732443192.168.2.6184.28.90.27
                                                        Oct 1, 2024 00:39:03.982392073 CEST44349732184.28.90.27192.168.2.6
                                                        Oct 1, 2024 00:39:03.982434034 CEST49732443192.168.2.6184.28.90.27
                                                        Oct 1, 2024 00:39:03.982439995 CEST44349732184.28.90.27192.168.2.6
                                                        Oct 1, 2024 00:39:05.520736933 CEST49742443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:05.520766973 CEST44349742172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:05.521020889 CEST49742443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:05.521339893 CEST49742443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:05.521349907 CEST44349742172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:06.157242060 CEST44349742172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:06.157483101 CEST49742443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:06.157497883 CEST44349742172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:06.157903910 CEST44349742172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:06.157958984 CEST49742443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:06.158638000 CEST44349742172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:06.158688068 CEST49742443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:06.159813881 CEST49742443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:06.159883976 CEST44349742172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:06.160053015 CEST49742443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:06.160060883 CEST44349742172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:06.212860107 CEST49742443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:06.475730896 CEST44349742172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:06.475800991 CEST44349742172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:06.475928068 CEST49742443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:06.475946903 CEST44349742172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:06.475970984 CEST44349742172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:06.475997925 CEST49742443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:06.476006985 CEST44349742172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:06.477202892 CEST49742443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:06.481908083 CEST44349742172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:06.482115984 CEST49742443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:06.489337921 CEST44349742172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:06.489372015 CEST44349742172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:06.489406109 CEST49742443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:06.489415884 CEST44349742172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:06.489559889 CEST49742443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:06.494568110 CEST44349742172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:06.494748116 CEST49742443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:06.500443935 CEST44349742172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:06.500502110 CEST49742443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:06.500544071 CEST44349742172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:06.500597954 CEST49742443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:06.570499897 CEST44349742172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:06.570600033 CEST49742443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:06.570746899 CEST44349742172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:06.570815086 CEST49742443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:06.572609901 CEST44349742172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:06.572729111 CEST49742443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:06.573565006 CEST44349742172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:06.573635101 CEST49742443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:06.573647022 CEST44349742172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:06.573698044 CEST49742443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:06.577740908 CEST44349742172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:06.577791929 CEST49742443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:06.583657026 CEST44349742172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:06.583720922 CEST49742443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:06.583735943 CEST44349742172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:06.588982105 CEST49745443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:06.589014053 CEST44349745172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:06.589999914 CEST44349742172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:06.590106010 CEST49742443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:06.590107918 CEST49745443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:06.590114117 CEST44349742172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:06.591056108 CEST49745443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:06.591065884 CEST44349745172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:06.596723080 CEST44349742172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:06.596846104 CEST44349742172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:06.596924067 CEST49742443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:06.597842932 CEST49742443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:06.597856998 CEST44349742172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:06.661108017 CEST49747443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:06.661153078 CEST44349747172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:06.661212921 CEST49747443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:06.663727999 CEST49747443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:06.663743019 CEST44349747172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:07.244082928 CEST44349745172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:07.294775009 CEST49745443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:07.322206974 CEST44349747172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:07.326129913 CEST49745443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:07.326137066 CEST44349745172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:07.326649904 CEST44349745172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:07.326662064 CEST44349745172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:07.326718092 CEST49745443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:07.327349901 CEST44349745172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:07.327414036 CEST49745443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:07.359241009 CEST49747443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:07.359271049 CEST44349747172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:07.359548092 CEST49745443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:07.359637022 CEST44349745172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:07.359783888 CEST44349747172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:07.359839916 CEST49747443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:07.360410929 CEST49745443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:07.360421896 CEST44349745172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:07.360502958 CEST44349747172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:07.360572100 CEST49747443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:07.368597031 CEST49747443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:07.368675947 CEST44349747172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:07.377208948 CEST49747443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:07.377217054 CEST44349747172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:07.408291101 CEST49745443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:07.418692112 CEST49747443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:07.520195961 CEST49749443192.168.2.640.113.110.67
                                                        Oct 1, 2024 00:39:07.520239115 CEST4434974940.113.110.67192.168.2.6
                                                        Oct 1, 2024 00:39:07.520325899 CEST49749443192.168.2.640.113.110.67
                                                        Oct 1, 2024 00:39:07.520919085 CEST49749443192.168.2.640.113.110.67
                                                        Oct 1, 2024 00:39:07.520931005 CEST4434974940.113.110.67192.168.2.6
                                                        Oct 1, 2024 00:39:07.576061010 CEST44349745172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:07.576683998 CEST44349745172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:07.576777935 CEST49745443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:07.577269077 CEST49745443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:07.577291965 CEST44349745172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:07.578229904 CEST49750443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:07.578267097 CEST44349750172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:07.578335047 CEST49750443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:07.578649998 CEST49750443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:07.578661919 CEST44349750172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:07.625335932 CEST44349747172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:07.625972033 CEST44349747172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:07.626043081 CEST49747443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:07.626472950 CEST49747443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:07.626492977 CEST44349747172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:07.627255917 CEST49751443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:07.627299070 CEST44349751172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:07.627371073 CEST49751443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:07.627665997 CEST49751443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:07.627681017 CEST44349751172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:08.229034901 CEST44349750172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:08.229459047 CEST49750443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:08.229481936 CEST44349750172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:08.229854107 CEST44349750172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:08.229916096 CEST49750443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:08.230649948 CEST44349750172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:08.230712891 CEST49750443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:08.230849981 CEST49750443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:08.230912924 CEST44349750172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:08.231206894 CEST49750443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:08.231206894 CEST49750443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:08.231215000 CEST44349750172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:08.267082930 CEST44349751172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:08.267348051 CEST49751443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:08.267365932 CEST44349751172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:08.267779112 CEST44349751172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:08.267837048 CEST49751443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:08.268518925 CEST44349751172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:08.268579006 CEST49751443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:08.268713951 CEST49751443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:08.268776894 CEST44349751172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:08.268877983 CEST49751443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:08.268884897 CEST44349751172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:08.268903017 CEST49751443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:08.271416903 CEST44349750172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:08.275765896 CEST49750443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:08.306029081 CEST4434974940.113.110.67192.168.2.6
                                                        Oct 1, 2024 00:39:08.306098938 CEST49749443192.168.2.640.113.110.67
                                                        Oct 1, 2024 00:39:08.308326960 CEST49749443192.168.2.640.113.110.67
                                                        Oct 1, 2024 00:39:08.308336973 CEST4434974940.113.110.67192.168.2.6
                                                        Oct 1, 2024 00:39:08.308568954 CEST4434974940.113.110.67192.168.2.6
                                                        Oct 1, 2024 00:39:08.310236931 CEST49749443192.168.2.640.113.110.67
                                                        Oct 1, 2024 00:39:08.310301065 CEST49749443192.168.2.640.113.110.67
                                                        Oct 1, 2024 00:39:08.310307026 CEST4434974940.113.110.67192.168.2.6
                                                        Oct 1, 2024 00:39:08.310652018 CEST49749443192.168.2.640.113.110.67
                                                        Oct 1, 2024 00:39:08.315396070 CEST44349751172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:08.322395086 CEST49751443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:08.355417967 CEST4434974940.113.110.67192.168.2.6
                                                        Oct 1, 2024 00:39:08.450705051 CEST44349750172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:08.451805115 CEST44349750172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:08.451867104 CEST49750443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:08.452469110 CEST49750443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:08.452490091 CEST44349750172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:08.488260031 CEST44349751172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:08.489550114 CEST44349751172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:08.489609957 CEST4434974940.113.110.67192.168.2.6
                                                        Oct 1, 2024 00:39:08.489669085 CEST49751443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:08.489679098 CEST4434974940.113.110.67192.168.2.6
                                                        Oct 1, 2024 00:39:08.489727020 CEST49749443192.168.2.640.113.110.67
                                                        Oct 1, 2024 00:39:08.489924908 CEST49749443192.168.2.640.113.110.67
                                                        Oct 1, 2024 00:39:08.489939928 CEST4434974940.113.110.67192.168.2.6
                                                        Oct 1, 2024 00:39:08.491199017 CEST49751443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:08.491210938 CEST44349751172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:08.944869041 CEST49723443192.168.2.6142.250.186.36
                                                        Oct 1, 2024 00:39:08.991398096 CEST44349723142.250.186.36192.168.2.6
                                                        Oct 1, 2024 00:39:09.215513945 CEST44349723142.250.186.36192.168.2.6
                                                        Oct 1, 2024 00:39:09.215574980 CEST44349723142.250.186.36192.168.2.6
                                                        Oct 1, 2024 00:39:09.215604067 CEST44349723142.250.186.36192.168.2.6
                                                        Oct 1, 2024 00:39:09.215615034 CEST49723443192.168.2.6142.250.186.36
                                                        Oct 1, 2024 00:39:09.215636969 CEST44349723142.250.186.36192.168.2.6
                                                        Oct 1, 2024 00:39:09.215677023 CEST49723443192.168.2.6142.250.186.36
                                                        Oct 1, 2024 00:39:09.215687037 CEST44349723142.250.186.36192.168.2.6
                                                        Oct 1, 2024 00:39:09.215765953 CEST44349723142.250.186.36192.168.2.6
                                                        Oct 1, 2024 00:39:09.215826035 CEST49723443192.168.2.6142.250.186.36
                                                        Oct 1, 2024 00:39:09.217442989 CEST49723443192.168.2.6142.250.186.36
                                                        Oct 1, 2024 00:39:09.217463970 CEST44349723142.250.186.36192.168.2.6
                                                        Oct 1, 2024 00:39:11.596198082 CEST49759443192.168.2.652.165.165.26
                                                        Oct 1, 2024 00:39:11.596234083 CEST4434975952.165.165.26192.168.2.6
                                                        Oct 1, 2024 00:39:11.596301079 CEST49759443192.168.2.652.165.165.26
                                                        Oct 1, 2024 00:39:11.598747969 CEST49759443192.168.2.652.165.165.26
                                                        Oct 1, 2024 00:39:11.598759890 CEST4434975952.165.165.26192.168.2.6
                                                        Oct 1, 2024 00:39:12.294011116 CEST4434975952.165.165.26192.168.2.6
                                                        Oct 1, 2024 00:39:12.294127941 CEST49759443192.168.2.652.165.165.26
                                                        Oct 1, 2024 00:39:12.429816008 CEST49759443192.168.2.652.165.165.26
                                                        Oct 1, 2024 00:39:12.429852009 CEST4434975952.165.165.26192.168.2.6
                                                        Oct 1, 2024 00:39:12.430227995 CEST4434975952.165.165.26192.168.2.6
                                                        Oct 1, 2024 00:39:12.481849909 CEST49759443192.168.2.652.165.165.26
                                                        Oct 1, 2024 00:39:12.527844906 CEST49759443192.168.2.652.165.165.26
                                                        Oct 1, 2024 00:39:12.575411081 CEST4434975952.165.165.26192.168.2.6
                                                        Oct 1, 2024 00:39:12.735560894 CEST49705443192.168.2.6173.222.162.64
                                                        Oct 1, 2024 00:39:12.735630989 CEST49705443192.168.2.6173.222.162.64
                                                        Oct 1, 2024 00:39:12.736200094 CEST49762443192.168.2.6173.222.162.64
                                                        Oct 1, 2024 00:39:12.736247063 CEST44349762173.222.162.64192.168.2.6
                                                        Oct 1, 2024 00:39:12.736315012 CEST49762443192.168.2.6173.222.162.64
                                                        Oct 1, 2024 00:39:12.736567020 CEST49762443192.168.2.6173.222.162.64
                                                        Oct 1, 2024 00:39:12.736582994 CEST44349762173.222.162.64192.168.2.6
                                                        Oct 1, 2024 00:39:12.745956898 CEST44349705173.222.162.64192.168.2.6
                                                        Oct 1, 2024 00:39:12.745969057 CEST44349705173.222.162.64192.168.2.6
                                                        Oct 1, 2024 00:39:12.752641916 CEST4434975952.165.165.26192.168.2.6
                                                        Oct 1, 2024 00:39:12.752662897 CEST4434975952.165.165.26192.168.2.6
                                                        Oct 1, 2024 00:39:12.752671003 CEST4434975952.165.165.26192.168.2.6
                                                        Oct 1, 2024 00:39:12.752693892 CEST4434975952.165.165.26192.168.2.6
                                                        Oct 1, 2024 00:39:12.752722025 CEST49759443192.168.2.652.165.165.26
                                                        Oct 1, 2024 00:39:12.752736092 CEST4434975952.165.165.26192.168.2.6
                                                        Oct 1, 2024 00:39:12.752744913 CEST4434975952.165.165.26192.168.2.6
                                                        Oct 1, 2024 00:39:12.752747059 CEST49759443192.168.2.652.165.165.26
                                                        Oct 1, 2024 00:39:12.752757072 CEST4434975952.165.165.26192.168.2.6
                                                        Oct 1, 2024 00:39:12.752778053 CEST49759443192.168.2.652.165.165.26
                                                        Oct 1, 2024 00:39:12.752794981 CEST49759443192.168.2.652.165.165.26
                                                        Oct 1, 2024 00:39:12.763184071 CEST4434975952.165.165.26192.168.2.6
                                                        Oct 1, 2024 00:39:12.763243914 CEST49759443192.168.2.652.165.165.26
                                                        Oct 1, 2024 00:39:12.763259888 CEST4434975952.165.165.26192.168.2.6
                                                        Oct 1, 2024 00:39:12.763284922 CEST4434975952.165.165.26192.168.2.6
                                                        Oct 1, 2024 00:39:12.763330936 CEST49759443192.168.2.652.165.165.26
                                                        Oct 1, 2024 00:39:12.764466047 CEST49759443192.168.2.652.165.165.26
                                                        Oct 1, 2024 00:39:12.764484882 CEST4434975952.165.165.26192.168.2.6
                                                        Oct 1, 2024 00:39:12.764497042 CEST49759443192.168.2.652.165.165.26
                                                        Oct 1, 2024 00:39:12.764502048 CEST4434975952.165.165.26192.168.2.6
                                                        Oct 1, 2024 00:39:13.329914093 CEST44349762173.222.162.64192.168.2.6
                                                        Oct 1, 2024 00:39:13.329989910 CEST49762443192.168.2.6173.222.162.64
                                                        Oct 1, 2024 00:39:14.698791027 CEST49764443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:14.698849916 CEST44349764172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:14.698910952 CEST49764443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:14.705024958 CEST49764443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:14.705039978 CEST44349764172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:16.102327108 CEST44349764172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:16.102989912 CEST49764443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:16.103022099 CEST44349764172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:16.103560925 CEST44349764172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:16.103904009 CEST49764443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:16.103982925 CEST44349764172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:16.104078054 CEST49764443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:16.104110956 CEST49764443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:16.104115009 CEST44349764172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:16.420846939 CEST44349764172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:16.421217918 CEST44349764172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:16.421273947 CEST49764443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:16.422260046 CEST49764443192.168.2.6172.217.16.142
                                                        Oct 1, 2024 00:39:16.422280073 CEST44349764172.217.16.142192.168.2.6
                                                        Oct 1, 2024 00:39:19.585027933 CEST49765443192.168.2.640.113.110.67
                                                        Oct 1, 2024 00:39:19.585094929 CEST4434976540.113.110.67192.168.2.6
                                                        Oct 1, 2024 00:39:19.585192919 CEST49765443192.168.2.640.113.110.67
                                                        Oct 1, 2024 00:39:19.585789919 CEST49765443192.168.2.640.113.110.67
                                                        Oct 1, 2024 00:39:19.585805893 CEST4434976540.113.110.67192.168.2.6
                                                        Oct 1, 2024 00:39:20.495079041 CEST4434976540.113.110.67192.168.2.6
                                                        Oct 1, 2024 00:39:20.495158911 CEST49765443192.168.2.640.113.110.67
                                                        Oct 1, 2024 00:39:20.500804901 CEST49765443192.168.2.640.113.110.67
                                                        Oct 1, 2024 00:39:20.500818014 CEST4434976540.113.110.67192.168.2.6
                                                        Oct 1, 2024 00:39:20.501102924 CEST4434976540.113.110.67192.168.2.6
                                                        Oct 1, 2024 00:39:20.503185987 CEST49765443192.168.2.640.113.110.67
                                                        Oct 1, 2024 00:39:20.503262997 CEST49765443192.168.2.640.113.110.67
                                                        Oct 1, 2024 00:39:20.503273010 CEST4434976540.113.110.67192.168.2.6
                                                        Oct 1, 2024 00:39:20.503402948 CEST49765443192.168.2.640.113.110.67
                                                        Oct 1, 2024 00:39:20.551405907 CEST4434976540.113.110.67192.168.2.6
                                                        Oct 1, 2024 00:39:20.680794001 CEST4434976540.113.110.67192.168.2.6
                                                        Oct 1, 2024 00:39:20.681076050 CEST4434976540.113.110.67192.168.2.6
                                                        Oct 1, 2024 00:39:20.681133986 CEST49765443192.168.2.640.113.110.67
                                                        Oct 1, 2024 00:39:20.681298018 CEST49765443192.168.2.640.113.110.67
                                                        Oct 1, 2024 00:39:20.681318045 CEST4434976540.113.110.67192.168.2.6
                                                        Oct 1, 2024 00:39:20.681328058 CEST49765443192.168.2.640.113.110.67
                                                        Oct 1, 2024 00:39:26.238331079 CEST6508253192.168.2.6162.159.36.2
                                                        Oct 1, 2024 00:39:26.243233919 CEST5365082162.159.36.2192.168.2.6
                                                        Oct 1, 2024 00:39:26.243314028 CEST6508253192.168.2.6162.159.36.2
                                                        Oct 1, 2024 00:39:26.248708010 CEST5365082162.159.36.2192.168.2.6
                                                        Oct 1, 2024 00:39:26.709130049 CEST6508253192.168.2.6162.159.36.2
                                                        Oct 1, 2024 00:39:26.714281082 CEST5365082162.159.36.2192.168.2.6
                                                        Oct 1, 2024 00:39:26.714366913 CEST6508253192.168.2.6162.159.36.2
                                                        Oct 1, 2024 00:39:26.932244062 CEST65083443192.168.2.620.3.187.198
                                                        Oct 1, 2024 00:39:26.932306051 CEST4436508320.3.187.198192.168.2.6
                                                        Oct 1, 2024 00:39:26.932379007 CEST65083443192.168.2.620.3.187.198
                                                        Oct 1, 2024 00:39:26.932806969 CEST65083443192.168.2.620.3.187.198
                                                        Oct 1, 2024 00:39:26.932825089 CEST4436508320.3.187.198192.168.2.6
                                                        Oct 1, 2024 00:39:27.733361959 CEST4436508320.3.187.198192.168.2.6
                                                        Oct 1, 2024 00:39:27.733488083 CEST65083443192.168.2.620.3.187.198
                                                        Oct 1, 2024 00:39:27.735122919 CEST65083443192.168.2.620.3.187.198
                                                        Oct 1, 2024 00:39:27.735136986 CEST4436508320.3.187.198192.168.2.6
                                                        Oct 1, 2024 00:39:27.735393047 CEST4436508320.3.187.198192.168.2.6
                                                        Oct 1, 2024 00:39:27.743717909 CEST65083443192.168.2.620.3.187.198
                                                        Oct 1, 2024 00:39:27.787398100 CEST4436508320.3.187.198192.168.2.6
                                                        Oct 1, 2024 00:39:27.974015951 CEST4436508320.3.187.198192.168.2.6
                                                        Oct 1, 2024 00:39:27.974096060 CEST4436508320.3.187.198192.168.2.6
                                                        Oct 1, 2024 00:39:27.974184990 CEST65083443192.168.2.620.3.187.198
                                                        Oct 1, 2024 00:39:27.974334955 CEST65083443192.168.2.620.3.187.198
                                                        Oct 1, 2024 00:39:27.974358082 CEST4436508320.3.187.198192.168.2.6
                                                        Oct 1, 2024 00:39:27.974369049 CEST65083443192.168.2.620.3.187.198
                                                        Oct 1, 2024 00:39:27.974375010 CEST4436508320.3.187.198192.168.2.6
                                                        Oct 1, 2024 00:39:28.012908936 CEST65084443192.168.2.652.165.165.26
                                                        Oct 1, 2024 00:39:28.012988091 CEST4436508452.165.165.26192.168.2.6
                                                        Oct 1, 2024 00:39:28.013077974 CEST65084443192.168.2.652.165.165.26
                                                        Oct 1, 2024 00:39:28.013380051 CEST65084443192.168.2.652.165.165.26
                                                        Oct 1, 2024 00:39:28.013397932 CEST4436508452.165.165.26192.168.2.6
                                                        Oct 1, 2024 00:39:28.704101086 CEST4436508452.165.165.26192.168.2.6
                                                        Oct 1, 2024 00:39:28.704168081 CEST65084443192.168.2.652.165.165.26
                                                        Oct 1, 2024 00:39:28.705733061 CEST65084443192.168.2.652.165.165.26
                                                        Oct 1, 2024 00:39:28.705746889 CEST4436508452.165.165.26192.168.2.6
                                                        Oct 1, 2024 00:39:28.706011057 CEST4436508452.165.165.26192.168.2.6
                                                        Oct 1, 2024 00:39:28.706906080 CEST65084443192.168.2.652.165.165.26
                                                        Oct 1, 2024 00:39:28.747415066 CEST4436508452.165.165.26192.168.2.6
                                                        Oct 1, 2024 00:39:28.884737015 CEST4436508452.165.165.26192.168.2.6
                                                        Oct 1, 2024 00:39:28.884813070 CEST4436508452.165.165.26192.168.2.6
                                                        Oct 1, 2024 00:39:28.884869099 CEST65084443192.168.2.652.165.165.26
                                                        Oct 1, 2024 00:39:28.884965897 CEST65084443192.168.2.652.165.165.26
                                                        Oct 1, 2024 00:39:28.884985924 CEST4436508452.165.165.26192.168.2.6
                                                        Oct 1, 2024 00:39:29.951682091 CEST65085443192.168.2.64.245.163.56
                                                        Oct 1, 2024 00:39:29.951710939 CEST443650854.245.163.56192.168.2.6
                                                        Oct 1, 2024 00:39:29.951785088 CEST65085443192.168.2.64.245.163.56
                                                        Oct 1, 2024 00:39:29.952219963 CEST65085443192.168.2.64.245.163.56
                                                        Oct 1, 2024 00:39:29.952229023 CEST443650854.245.163.56192.168.2.6
                                                        Oct 1, 2024 00:39:30.717289925 CEST443650854.245.163.56192.168.2.6
                                                        Oct 1, 2024 00:39:30.717497110 CEST65085443192.168.2.64.245.163.56
                                                        Oct 1, 2024 00:39:30.719005108 CEST65085443192.168.2.64.245.163.56
                                                        Oct 1, 2024 00:39:30.719032049 CEST443650854.245.163.56192.168.2.6
                                                        Oct 1, 2024 00:39:30.719239950 CEST443650854.245.163.56192.168.2.6
                                                        Oct 1, 2024 00:39:30.720601082 CEST65085443192.168.2.64.245.163.56
                                                        Oct 1, 2024 00:39:30.763396978 CEST443650854.245.163.56192.168.2.6
                                                        Oct 1, 2024 00:39:31.038443089 CEST443650854.245.163.56192.168.2.6
                                                        Oct 1, 2024 00:39:31.038470030 CEST443650854.245.163.56192.168.2.6
                                                        Oct 1, 2024 00:39:31.038486004 CEST443650854.245.163.56192.168.2.6
                                                        Oct 1, 2024 00:39:31.038536072 CEST65085443192.168.2.64.245.163.56
                                                        Oct 1, 2024 00:39:31.038562059 CEST443650854.245.163.56192.168.2.6
                                                        Oct 1, 2024 00:39:31.038600922 CEST65085443192.168.2.64.245.163.56
                                                        Oct 1, 2024 00:39:31.038644075 CEST65085443192.168.2.64.245.163.56
                                                        Oct 1, 2024 00:39:31.038813114 CEST443650854.245.163.56192.168.2.6
                                                        Oct 1, 2024 00:39:31.038868904 CEST443650854.245.163.56192.168.2.6
                                                        Oct 1, 2024 00:39:31.038922071 CEST65085443192.168.2.64.245.163.56
                                                        Oct 1, 2024 00:39:31.042951107 CEST65085443192.168.2.64.245.163.56
                                                        Oct 1, 2024 00:39:31.042968035 CEST443650854.245.163.56192.168.2.6
                                                        Oct 1, 2024 00:39:31.042990923 CEST65085443192.168.2.64.245.163.56
                                                        Oct 1, 2024 00:39:31.042998075 CEST443650854.245.163.56192.168.2.6
                                                        Oct 1, 2024 00:39:31.153301001 CEST65086443192.168.2.64.245.163.56
                                                        Oct 1, 2024 00:39:31.153352022 CEST443650864.245.163.56192.168.2.6
                                                        Oct 1, 2024 00:39:31.153495073 CEST65086443192.168.2.64.245.163.56
                                                        Oct 1, 2024 00:39:31.153809071 CEST65086443192.168.2.64.245.163.56
                                                        Oct 1, 2024 00:39:31.153821945 CEST443650864.245.163.56192.168.2.6
                                                        Oct 1, 2024 00:39:32.040932894 CEST443650864.245.163.56192.168.2.6
                                                        Oct 1, 2024 00:39:32.041021109 CEST65086443192.168.2.64.245.163.56
                                                        Oct 1, 2024 00:39:32.042237043 CEST65086443192.168.2.64.245.163.56
                                                        Oct 1, 2024 00:39:32.042253971 CEST443650864.245.163.56192.168.2.6
                                                        Oct 1, 2024 00:39:32.042484999 CEST443650864.245.163.56192.168.2.6
                                                        Oct 1, 2024 00:39:32.044213057 CEST65086443192.168.2.64.245.163.56
                                                        Oct 1, 2024 00:39:32.091403008 CEST443650864.245.163.56192.168.2.6
                                                        Oct 1, 2024 00:39:32.363410950 CEST443650864.245.163.56192.168.2.6
                                                        Oct 1, 2024 00:39:32.363436937 CEST443650864.245.163.56192.168.2.6
                                                        Oct 1, 2024 00:39:32.363476992 CEST443650864.245.163.56192.168.2.6
                                                        Oct 1, 2024 00:39:32.363502026 CEST65086443192.168.2.64.245.163.56
                                                        Oct 1, 2024 00:39:32.363523006 CEST443650864.245.163.56192.168.2.6
                                                        Oct 1, 2024 00:39:32.363562107 CEST65086443192.168.2.64.245.163.56
                                                        Oct 1, 2024 00:39:32.363584042 CEST65086443192.168.2.64.245.163.56
                                                        Oct 1, 2024 00:39:32.364983082 CEST443650864.245.163.56192.168.2.6
                                                        Oct 1, 2024 00:39:32.365060091 CEST65086443192.168.2.64.245.163.56
                                                        Oct 1, 2024 00:39:32.365061998 CEST443650864.245.163.56192.168.2.6
                                                        Oct 1, 2024 00:39:32.365108967 CEST443650864.245.163.56192.168.2.6
                                                        Oct 1, 2024 00:39:32.365134954 CEST65086443192.168.2.64.245.163.56
                                                        Oct 1, 2024 00:39:32.365715027 CEST443650864.245.163.56192.168.2.6
                                                        Oct 1, 2024 00:39:32.365871906 CEST65086443192.168.2.64.245.163.56
                                                        Oct 1, 2024 00:39:32.365900040 CEST443650864.245.163.56192.168.2.6
                                                        Oct 1, 2024 00:39:32.365915060 CEST65086443192.168.2.64.245.163.56
                                                        Oct 1, 2024 00:39:32.365931034 CEST443650864.245.163.56192.168.2.6
                                                        Oct 1, 2024 00:39:32.365957022 CEST65086443192.168.2.64.245.163.56
                                                        Oct 1, 2024 00:39:32.365961075 CEST443650864.245.163.56192.168.2.6
                                                        Oct 1, 2024 00:39:32.493443966 CEST44349762173.222.162.64192.168.2.6
                                                        Oct 1, 2024 00:39:32.493505001 CEST49762443192.168.2.6173.222.162.64
                                                        Oct 1, 2024 00:39:36.941694975 CEST65087443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:36.941749096 CEST44365087172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:36.941823959 CEST65087443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:36.942101002 CEST65087443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:36.942118883 CEST44365087172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:37.090822935 CEST65088443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:37.090890884 CEST44365088172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:37.090993881 CEST65088443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:37.091314077 CEST65088443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:37.091325045 CEST44365088172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:37.570092916 CEST44365087172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:37.570394039 CEST65087443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:37.570415020 CEST44365087172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:37.570728064 CEST44365087172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:37.571027994 CEST65087443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:37.571084023 CEST44365087172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:37.571190119 CEST65087443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:37.571202993 CEST65087443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:37.571218967 CEST44365087172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:37.710913897 CEST65089443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:37.710933924 CEST44365089172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:37.711004972 CEST65089443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:37.711293936 CEST65089443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:37.711308002 CEST44365089172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:37.722192049 CEST44365088172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:37.722492933 CEST65088443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:37.722508907 CEST44365088172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:37.722894907 CEST44365088172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:37.723242044 CEST65088443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:37.723306894 CEST44365088172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:37.723428965 CEST65088443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:37.723450899 CEST65088443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:37.723506927 CEST44365088172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:37.869102955 CEST44365087172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:37.870187044 CEST44365087172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:37.870279074 CEST65087443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:37.870474100 CEST65087443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:37.870490074 CEST44365087172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:37.938355923 CEST44365088172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:37.938865900 CEST44365088172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:37.938946962 CEST65088443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:37.939306021 CEST65088443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:37.939321041 CEST44365088172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:38.292346001 CEST65090443192.168.2.640.115.3.253
                                                        Oct 1, 2024 00:39:38.292462111 CEST4436509040.115.3.253192.168.2.6
                                                        Oct 1, 2024 00:39:38.292565107 CEST65090443192.168.2.640.115.3.253
                                                        Oct 1, 2024 00:39:38.293275118 CEST65090443192.168.2.640.115.3.253
                                                        Oct 1, 2024 00:39:38.293311119 CEST4436509040.115.3.253192.168.2.6
                                                        Oct 1, 2024 00:39:38.349119902 CEST44365089172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:38.349456072 CEST65089443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:38.349472046 CEST44365089172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:38.349874973 CEST44365089172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:38.350162983 CEST65089443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:38.350235939 CEST44365089172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:38.350332022 CEST65089443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:38.350351095 CEST65089443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:38.350363970 CEST44365089172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:38.569411993 CEST44365089172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:38.569722891 CEST44365089172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:38.569782019 CEST65089443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:38.569941044 CEST65089443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:39:38.569958925 CEST44365089172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:39:39.108596087 CEST4436509040.115.3.253192.168.2.6
                                                        Oct 1, 2024 00:39:39.108690023 CEST65090443192.168.2.640.115.3.253
                                                        Oct 1, 2024 00:39:39.110444069 CEST65090443192.168.2.640.115.3.253
                                                        Oct 1, 2024 00:39:39.110470057 CEST4436509040.115.3.253192.168.2.6
                                                        Oct 1, 2024 00:39:39.110707045 CEST4436509040.115.3.253192.168.2.6
                                                        Oct 1, 2024 00:39:39.112159014 CEST65090443192.168.2.640.115.3.253
                                                        Oct 1, 2024 00:39:39.112215042 CEST65090443192.168.2.640.115.3.253
                                                        Oct 1, 2024 00:39:39.112243891 CEST4436509040.115.3.253192.168.2.6
                                                        Oct 1, 2024 00:39:39.112375975 CEST65090443192.168.2.640.115.3.253
                                                        Oct 1, 2024 00:39:39.159398079 CEST4436509040.115.3.253192.168.2.6
                                                        Oct 1, 2024 00:39:39.283287048 CEST4436509040.115.3.253192.168.2.6
                                                        Oct 1, 2024 00:39:39.283402920 CEST4436509040.115.3.253192.168.2.6
                                                        Oct 1, 2024 00:39:39.283468962 CEST65090443192.168.2.640.115.3.253
                                                        Oct 1, 2024 00:39:39.345685959 CEST65090443192.168.2.640.115.3.253
                                                        Oct 1, 2024 00:39:39.345716953 CEST4436509040.115.3.253192.168.2.6
                                                        Oct 1, 2024 00:40:01.475984097 CEST65092443192.168.2.6142.250.184.228
                                                        Oct 1, 2024 00:40:01.476031065 CEST44365092142.250.184.228192.168.2.6
                                                        Oct 1, 2024 00:40:01.476116896 CEST65092443192.168.2.6142.250.184.228
                                                        Oct 1, 2024 00:40:01.484162092 CEST65092443192.168.2.6142.250.184.228
                                                        Oct 1, 2024 00:40:01.484175920 CEST44365092142.250.184.228192.168.2.6
                                                        Oct 1, 2024 00:40:02.118705988 CEST44365092142.250.184.228192.168.2.6
                                                        Oct 1, 2024 00:40:02.119065046 CEST65092443192.168.2.6142.250.184.228
                                                        Oct 1, 2024 00:40:02.119090080 CEST44365092142.250.184.228192.168.2.6
                                                        Oct 1, 2024 00:40:02.119431019 CEST44365092142.250.184.228192.168.2.6
                                                        Oct 1, 2024 00:40:02.119748116 CEST65092443192.168.2.6142.250.184.228
                                                        Oct 1, 2024 00:40:02.119822025 CEST44365092142.250.184.228192.168.2.6
                                                        Oct 1, 2024 00:40:02.128084898 CEST65093443192.168.2.640.115.3.253
                                                        Oct 1, 2024 00:40:02.128113031 CEST4436509340.115.3.253192.168.2.6
                                                        Oct 1, 2024 00:40:02.128199100 CEST65093443192.168.2.640.115.3.253
                                                        Oct 1, 2024 00:40:02.128787994 CEST65093443192.168.2.640.115.3.253
                                                        Oct 1, 2024 00:40:02.128806114 CEST4436509340.115.3.253192.168.2.6
                                                        Oct 1, 2024 00:40:02.166141033 CEST65092443192.168.2.6142.250.184.228
                                                        Oct 1, 2024 00:40:02.909877062 CEST4436509340.115.3.253192.168.2.6
                                                        Oct 1, 2024 00:40:02.909965038 CEST65093443192.168.2.640.115.3.253
                                                        Oct 1, 2024 00:40:02.911744118 CEST65093443192.168.2.640.115.3.253
                                                        Oct 1, 2024 00:40:02.911758900 CEST4436509340.115.3.253192.168.2.6
                                                        Oct 1, 2024 00:40:02.912005901 CEST4436509340.115.3.253192.168.2.6
                                                        Oct 1, 2024 00:40:02.914177895 CEST65093443192.168.2.640.115.3.253
                                                        Oct 1, 2024 00:40:02.914177895 CEST65093443192.168.2.640.115.3.253
                                                        Oct 1, 2024 00:40:02.914197922 CEST4436509340.115.3.253192.168.2.6
                                                        Oct 1, 2024 00:40:02.914347887 CEST65093443192.168.2.640.115.3.253
                                                        Oct 1, 2024 00:40:02.959395885 CEST4436509340.115.3.253192.168.2.6
                                                        Oct 1, 2024 00:40:03.088661909 CEST4436509340.115.3.253192.168.2.6
                                                        Oct 1, 2024 00:40:03.088854074 CEST4436509340.115.3.253192.168.2.6
                                                        Oct 1, 2024 00:40:03.088978052 CEST65093443192.168.2.640.115.3.253
                                                        Oct 1, 2024 00:40:03.089133978 CEST65093443192.168.2.640.115.3.253
                                                        Oct 1, 2024 00:40:03.089150906 CEST4436509340.115.3.253192.168.2.6
                                                        Oct 1, 2024 00:40:07.716029882 CEST65096443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:07.716075897 CEST44365096172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:07.716142893 CEST65096443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:07.716687918 CEST65096443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:07.716706038 CEST44365096172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:07.840720892 CEST65097443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:07.840771914 CEST44365097172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:07.840846062 CEST65097443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:07.841162920 CEST65097443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:07.841176033 CEST44365097172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:08.359702110 CEST44365096172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:08.359966040 CEST65096443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:08.359987020 CEST44365096172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:08.360393047 CEST44365096172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:08.361007929 CEST65096443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:08.361100912 CEST44365096172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:08.361177921 CEST65096443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:08.361196995 CEST65096443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:08.361257076 CEST44365096172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:08.478533030 CEST44365097172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:08.478904963 CEST65097443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:08.478923082 CEST44365097172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:08.479285955 CEST44365097172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:08.479895115 CEST65097443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:08.479958057 CEST44365097172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:08.480053902 CEST65097443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:08.480067015 CEST65097443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:08.480077028 CEST44365097172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:08.663680077 CEST44365096172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:08.664417982 CEST44365096172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:08.664499044 CEST65096443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:08.664808035 CEST65096443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:08.664859056 CEST44365096172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:08.783194065 CEST44365097172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:08.784226894 CEST44365097172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:08.784291029 CEST65097443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:08.784387112 CEST65097443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:08.784415960 CEST44365097172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:12.037664890 CEST44365092142.250.184.228192.168.2.6
                                                        Oct 1, 2024 00:40:12.037733078 CEST44365092142.250.184.228192.168.2.6
                                                        Oct 1, 2024 00:40:12.037775993 CEST65092443192.168.2.6142.250.184.228
                                                        Oct 1, 2024 00:40:18.963325977 CEST65092443192.168.2.6142.250.184.228
                                                        Oct 1, 2024 00:40:18.963366032 CEST44365092142.250.184.228192.168.2.6
                                                        Oct 1, 2024 00:40:34.768708944 CEST65100443192.168.2.640.115.3.253
                                                        Oct 1, 2024 00:40:34.768752098 CEST4436510040.115.3.253192.168.2.6
                                                        Oct 1, 2024 00:40:34.768846035 CEST65100443192.168.2.640.115.3.253
                                                        Oct 1, 2024 00:40:34.769485950 CEST65100443192.168.2.640.115.3.253
                                                        Oct 1, 2024 00:40:34.769499063 CEST4436510040.115.3.253192.168.2.6
                                                        Oct 1, 2024 00:40:35.551378012 CEST4436510040.115.3.253192.168.2.6
                                                        Oct 1, 2024 00:40:35.551461935 CEST65100443192.168.2.640.115.3.253
                                                        Oct 1, 2024 00:40:35.555322886 CEST65100443192.168.2.640.115.3.253
                                                        Oct 1, 2024 00:40:35.555334091 CEST4436510040.115.3.253192.168.2.6
                                                        Oct 1, 2024 00:40:35.555605888 CEST4436510040.115.3.253192.168.2.6
                                                        Oct 1, 2024 00:40:35.557615042 CEST65100443192.168.2.640.115.3.253
                                                        Oct 1, 2024 00:40:35.557698011 CEST65100443192.168.2.640.115.3.253
                                                        Oct 1, 2024 00:40:35.557703018 CEST4436510040.115.3.253192.168.2.6
                                                        Oct 1, 2024 00:40:35.557849884 CEST65100443192.168.2.640.115.3.253
                                                        Oct 1, 2024 00:40:35.603413105 CEST4436510040.115.3.253192.168.2.6
                                                        Oct 1, 2024 00:40:35.728847980 CEST4436510040.115.3.253192.168.2.6
                                                        Oct 1, 2024 00:40:35.729028940 CEST4436510040.115.3.253192.168.2.6
                                                        Oct 1, 2024 00:40:35.729115963 CEST65100443192.168.2.640.115.3.253
                                                        Oct 1, 2024 00:40:35.729646921 CEST65100443192.168.2.640.115.3.253
                                                        Oct 1, 2024 00:40:35.729674101 CEST4436510040.115.3.253192.168.2.6
                                                        Oct 1, 2024 00:40:38.312830925 CEST65101443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:38.312886000 CEST44365101172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:38.312962055 CEST65101443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:38.313055038 CEST65102443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:38.313064098 CEST44365102172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:38.313111067 CEST65102443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:38.313286066 CEST65101443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:38.313297987 CEST44365101172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:38.313436985 CEST65102443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:38.313443899 CEST44365102172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:38.942612886 CEST44365102172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:38.943085909 CEST65102443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:38.943118095 CEST44365102172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:38.943538904 CEST44365102172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:38.943718910 CEST44365101172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:38.943835020 CEST65102443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:38.943900108 CEST44365102172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:38.943969965 CEST65101443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:38.943979025 CEST44365101172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:38.944130898 CEST65102443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:38.944147110 CEST65102443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:38.944155931 CEST44365102172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:38.944633007 CEST44365101172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:38.944901943 CEST65101443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:38.944967031 CEST44365101172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:38.944993019 CEST65101443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:38.945031881 CEST65101443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:38.945040941 CEST44365101172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:39.207122087 CEST44365101172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:39.207263947 CEST44365101172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:39.207329988 CEST65101443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:39.207786083 CEST65101443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:39.207803965 CEST44365101172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:39.242428064 CEST44365102172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:39.242813110 CEST44365102172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:40:39.242906094 CEST65102443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:39.243050098 CEST65102443192.168.2.6172.217.16.206
                                                        Oct 1, 2024 00:40:39.243067026 CEST44365102172.217.16.206192.168.2.6
                                                        Oct 1, 2024 00:41:01.520482063 CEST65103443192.168.2.6142.250.185.132
                                                        Oct 1, 2024 00:41:01.520524025 CEST44365103142.250.185.132192.168.2.6
                                                        Oct 1, 2024 00:41:01.520608902 CEST65103443192.168.2.6142.250.185.132
                                                        Oct 1, 2024 00:41:01.520901918 CEST65103443192.168.2.6142.250.185.132
                                                        Oct 1, 2024 00:41:01.520912886 CEST44365103142.250.185.132192.168.2.6
                                                        Oct 1, 2024 00:41:02.158684969 CEST44365103142.250.185.132192.168.2.6
                                                        Oct 1, 2024 00:41:02.212719917 CEST65103443192.168.2.6142.250.185.132
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Oct 1, 2024 00:38:56.741986990 CEST5421553192.168.2.61.1.1.1
                                                        Oct 1, 2024 00:38:56.742110968 CEST5757353192.168.2.61.1.1.1
                                                        Oct 1, 2024 00:38:56.750277996 CEST53590231.1.1.1192.168.2.6
                                                        Oct 1, 2024 00:38:56.750441074 CEST53542151.1.1.1192.168.2.6
                                                        Oct 1, 2024 00:38:56.751630068 CEST53575731.1.1.1192.168.2.6
                                                        Oct 1, 2024 00:38:56.839469910 CEST53551431.1.1.1192.168.2.6
                                                        Oct 1, 2024 00:38:57.819016933 CEST6507653192.168.2.61.1.1.1
                                                        Oct 1, 2024 00:38:57.819180012 CEST6534853192.168.2.61.1.1.1
                                                        Oct 1, 2024 00:38:57.825865984 CEST53653481.1.1.1192.168.2.6
                                                        Oct 1, 2024 00:38:57.825879097 CEST53650761.1.1.1192.168.2.6
                                                        Oct 1, 2024 00:38:57.885138035 CEST53537521.1.1.1192.168.2.6
                                                        Oct 1, 2024 00:39:01.383759022 CEST5924253192.168.2.61.1.1.1
                                                        Oct 1, 2024 00:39:01.383892059 CEST5793653192.168.2.61.1.1.1
                                                        Oct 1, 2024 00:39:01.390444040 CEST53592421.1.1.1192.168.2.6
                                                        Oct 1, 2024 00:39:01.390650988 CEST53579361.1.1.1192.168.2.6
                                                        Oct 1, 2024 00:39:01.564065933 CEST53566261.1.1.1192.168.2.6
                                                        Oct 1, 2024 00:39:03.013132095 CEST53548661.1.1.1192.168.2.6
                                                        Oct 1, 2024 00:39:05.512748957 CEST5818253192.168.2.61.1.1.1
                                                        Oct 1, 2024 00:39:05.512985945 CEST5478453192.168.2.61.1.1.1
                                                        Oct 1, 2024 00:39:05.519844055 CEST53581821.1.1.1192.168.2.6
                                                        Oct 1, 2024 00:39:05.519951105 CEST53547841.1.1.1192.168.2.6
                                                        Oct 1, 2024 00:39:06.578556061 CEST5629853192.168.2.61.1.1.1
                                                        Oct 1, 2024 00:39:06.578713894 CEST5934953192.168.2.61.1.1.1
                                                        Oct 1, 2024 00:39:06.587083101 CEST53562981.1.1.1192.168.2.6
                                                        Oct 1, 2024 00:39:06.587357998 CEST53593491.1.1.1192.168.2.6
                                                        Oct 1, 2024 00:39:14.943376064 CEST53643241.1.1.1192.168.2.6
                                                        Oct 1, 2024 00:39:26.237538099 CEST5352890162.159.36.2192.168.2.6
                                                        Oct 1, 2024 00:39:26.792673111 CEST5956653192.168.2.61.1.1.1
                                                        Oct 1, 2024 00:39:26.799649000 CEST53595661.1.1.1192.168.2.6
                                                        Oct 1, 2024 00:39:36.907588959 CEST5306453192.168.2.61.1.1.1
                                                        Oct 1, 2024 00:39:36.914195061 CEST53530641.1.1.1192.168.2.6
                                                        Oct 1, 2024 00:40:01.451545000 CEST5029553192.168.2.61.1.1.1
                                                        Oct 1, 2024 00:40:01.459719896 CEST53502951.1.1.1192.168.2.6
                                                        Oct 1, 2024 00:41:01.511082888 CEST5817253192.168.2.61.1.1.1
                                                        Oct 1, 2024 00:41:01.519368887 CEST53581721.1.1.1192.168.2.6
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Oct 1, 2024 00:38:56.741986990 CEST192.168.2.61.1.1.10xae40Standard query (0)youtube.comA (IP address)IN (0x0001)false
                                                        Oct 1, 2024 00:38:56.742110968 CEST192.168.2.61.1.1.10xadc5Standard query (0)youtube.com65IN (0x0001)false
                                                        Oct 1, 2024 00:38:57.819016933 CEST192.168.2.61.1.1.10xb973Standard query (0)www.youtube.comA (IP address)IN (0x0001)false
                                                        Oct 1, 2024 00:38:57.819180012 CEST192.168.2.61.1.1.10x91fStandard query (0)www.youtube.com65IN (0x0001)false
                                                        Oct 1, 2024 00:39:01.383759022 CEST192.168.2.61.1.1.10x3350Standard query (0)www.google.comA (IP address)IN (0x0001)false
                                                        Oct 1, 2024 00:39:01.383892059 CEST192.168.2.61.1.1.10x8b48Standard query (0)www.google.com65IN (0x0001)false
                                                        Oct 1, 2024 00:39:05.512748957 CEST192.168.2.61.1.1.10xc89bStandard query (0)accounts.youtube.comA (IP address)IN (0x0001)false
                                                        Oct 1, 2024 00:39:05.512985945 CEST192.168.2.61.1.1.10x2ca4Standard query (0)accounts.youtube.com65IN (0x0001)false
                                                        Oct 1, 2024 00:39:06.578556061 CEST192.168.2.61.1.1.10x9293Standard query (0)play.google.comA (IP address)IN (0x0001)false
                                                        Oct 1, 2024 00:39:06.578713894 CEST192.168.2.61.1.1.10x6629Standard query (0)play.google.com65IN (0x0001)false
                                                        Oct 1, 2024 00:39:26.792673111 CEST192.168.2.61.1.1.10xb745Standard query (0)198.187.3.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                        Oct 1, 2024 00:39:36.907588959 CEST192.168.2.61.1.1.10x8097Standard query (0)play.google.comA (IP address)IN (0x0001)false
                                                        Oct 1, 2024 00:40:01.451545000 CEST192.168.2.61.1.1.10x5754Standard query (0)www.google.comA (IP address)IN (0x0001)false
                                                        Oct 1, 2024 00:41:01.511082888 CEST192.168.2.61.1.1.10xe4abStandard query (0)www.google.comA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Oct 1, 2024 00:38:56.750441074 CEST1.1.1.1192.168.2.60xae40No error (0)youtube.com142.250.185.238A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 00:38:56.751630068 CEST1.1.1.1192.168.2.60xadc5No error (0)youtube.com65IN (0x0001)false
                                                        Oct 1, 2024 00:38:57.825865984 CEST1.1.1.1192.168.2.60x91fNo error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                        Oct 1, 2024 00:38:57.825865984 CEST1.1.1.1192.168.2.60x91fNo error (0)youtube-ui.l.google.com65IN (0x0001)false
                                                        Oct 1, 2024 00:38:57.825879097 CEST1.1.1.1192.168.2.60xb973No error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                        Oct 1, 2024 00:38:57.825879097 CEST1.1.1.1192.168.2.60xb973No error (0)youtube-ui.l.google.com142.250.185.238A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 00:38:57.825879097 CEST1.1.1.1192.168.2.60xb973No error (0)youtube-ui.l.google.com172.217.18.14A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 00:38:57.825879097 CEST1.1.1.1192.168.2.60xb973No error (0)youtube-ui.l.google.com142.250.185.206A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 00:38:57.825879097 CEST1.1.1.1192.168.2.60xb973No error (0)youtube-ui.l.google.com142.250.184.206A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 00:38:57.825879097 CEST1.1.1.1192.168.2.60xb973No error (0)youtube-ui.l.google.com216.58.206.78A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 00:38:57.825879097 CEST1.1.1.1192.168.2.60xb973No error (0)youtube-ui.l.google.com142.250.185.142A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 00:38:57.825879097 CEST1.1.1.1192.168.2.60xb973No error (0)youtube-ui.l.google.com142.250.181.238A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 00:38:57.825879097 CEST1.1.1.1192.168.2.60xb973No error (0)youtube-ui.l.google.com142.250.185.78A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 00:38:57.825879097 CEST1.1.1.1192.168.2.60xb973No error (0)youtube-ui.l.google.com216.58.206.46A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 00:38:57.825879097 CEST1.1.1.1192.168.2.60xb973No error (0)youtube-ui.l.google.com172.217.16.206A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 00:38:57.825879097 CEST1.1.1.1192.168.2.60xb973No error (0)youtube-ui.l.google.com142.250.184.238A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 00:38:57.825879097 CEST1.1.1.1192.168.2.60xb973No error (0)youtube-ui.l.google.com142.250.186.46A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 00:38:57.825879097 CEST1.1.1.1192.168.2.60xb973No error (0)youtube-ui.l.google.com142.250.186.78A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 00:38:57.825879097 CEST1.1.1.1192.168.2.60xb973No error (0)youtube-ui.l.google.com142.250.186.174A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 00:38:57.825879097 CEST1.1.1.1192.168.2.60xb973No error (0)youtube-ui.l.google.com142.250.185.174A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 00:38:57.825879097 CEST1.1.1.1192.168.2.60xb973No error (0)youtube-ui.l.google.com142.250.185.110A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 00:39:01.390444040 CEST1.1.1.1192.168.2.60x3350No error (0)www.google.com142.250.186.36A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 00:39:01.390650988 CEST1.1.1.1192.168.2.60x8b48No error (0)www.google.com65IN (0x0001)false
                                                        Oct 1, 2024 00:39:05.519844055 CEST1.1.1.1192.168.2.60xc89bNo error (0)accounts.youtube.comwww3.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                        Oct 1, 2024 00:39:05.519844055 CEST1.1.1.1192.168.2.60xc89bNo error (0)www3.l.google.com172.217.16.206A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 00:39:05.519951105 CEST1.1.1.1192.168.2.60x2ca4No error (0)accounts.youtube.comwww3.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                        Oct 1, 2024 00:39:06.587083101 CEST1.1.1.1192.168.2.60x9293No error (0)play.google.com172.217.16.142A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 00:39:26.799649000 CEST1.1.1.1192.168.2.60xb745Name error (3)198.187.3.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                                        Oct 1, 2024 00:39:36.914195061 CEST1.1.1.1192.168.2.60x8097No error (0)play.google.com172.217.16.206A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 00:40:01.459719896 CEST1.1.1.1192.168.2.60x5754No error (0)www.google.com142.250.184.228A (IP address)IN (0x0001)false
                                                        Oct 1, 2024 00:41:01.519368887 CEST1.1.1.1192.168.2.60xe4abNo error (0)www.google.com142.250.185.132A (IP address)IN (0x0001)false
                                                        • youtube.com
                                                        • www.youtube.com
                                                        • fs.microsoft.com
                                                        • https:
                                                          • accounts.youtube.com
                                                          • play.google.com
                                                          • www.google.com
                                                        • slscr.update.microsoft.com
                                                        • fe3cr.delivery.mp.microsoft.com
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.649712142.250.185.2384436836C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-30 22:38:57 UTC839OUTGET /account?=https://accounts.google.com/v3/signin/challenge/pwd HTTP/1.1
                                                        Host: youtube.com
                                                        Connection: keep-alive
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Upgrade-Insecure-Requests: 1
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIkqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=
                                                        Sec-Fetch-Site: none
                                                        Sec-Fetch-Mode: navigate
                                                        Sec-Fetch-User: ?1
                                                        Sec-Fetch-Dest: document
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-09-30 22:38:57 UTC1704INHTTP/1.1 301 Moved Permanently
                                                        Content-Type: application/binary
                                                        X-Content-Type-Options: nosniff
                                                        Expires: Mon, 30 Sep 2024 22:38:57 GMT
                                                        Date: Mon, 30 Sep 2024 22:38:57 GMT
                                                        Cache-Control: private, max-age=31536000
                                                        Location: https://www.youtube.com/account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd
                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                        X-Frame-Options: SAMEORIGIN
                                                        Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                        Vary: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                        Content-Security-Policy: require-trusted-types-for 'script'
                                                        Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="youtube_main"
                                                        Origin-Trial: AmhMBR6zCLzDDxpW+HfpP67BqwIknWnyMOXOQGfzYswFmJe+fgaI6XZgAzcxOrzNtP7hEDsOo1jdjFnVr2IdxQ4AAAB4eyJvcmlnaW4iOiJodHRwczovL3lvdXR1YmUuY29tOjQ0MyIsImZlYXR1cmUiOiJXZWJWaWV3WFJlcXVlc3RlZFdpdGhEZXByZWNhdGlvbiIsImV4cGlyeSI6MTc1ODA2NzE5OSwiaXNTdWJkb21haW4iOnRydWV9
                                                        Report-To: {"group":"youtube_main","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/youtube_main"}]}
                                                        Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                        Server: ESF
                                                        Content-Length: 0
                                                        X-XSS-Protection: 0
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Connection: close


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        1192.168.2.649714142.250.185.2384436836C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-30 22:38:58 UTC857OUTGET /account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd HTTP/1.1
                                                        Host: www.youtube.com
                                                        Connection: keep-alive
                                                        Upgrade-Insecure-Requests: 1
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIkqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=
                                                        Sec-Fetch-Site: none
                                                        Sec-Fetch-Mode: navigate
                                                        Sec-Fetch-User: ?1
                                                        Sec-Fetch-Dest: document
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-09-30 22:38:58 UTC2634INHTTP/1.1 303 See Other
                                                        Content-Type: application/binary
                                                        X-Content-Type-Options: nosniff
                                                        Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                        Pragma: no-cache
                                                        Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                        Date: Mon, 30 Sep 2024 22:38:58 GMT
                                                        Location: https://accounts.google.com/ServiceLogin?service=youtube&uilel=3&passive=true&continue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%253F%253Dhttps%25253A%25252F%25252Faccounts.google.com%25252Fv3%25252Fsignin%25252Fchallenge%25252Fpwd%26feature%3Dredirect_login&hl=en
                                                        X-Frame-Options: SAMEORIGIN
                                                        Strict-Transport-Security: max-age=31536000
                                                        Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                        Report-To: {"group":"youtube_main","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/youtube_main"}]}
                                                        Origin-Trial: AmhMBR6zCLzDDxpW+HfpP67BqwIknWnyMOXOQGfzYswFmJe+fgaI6XZgAzcxOrzNtP7hEDsOo1jdjFnVr2IdxQ4AAAB4eyJvcmlnaW4iOiJodHRwczovL3lvdXR1YmUuY29tOjQ0MyIsImZlYXR1cmUiOiJXZWJWaWV3WFJlcXVlc3RlZFdpdGhEZXByZWNhdGlvbiIsImV4cGlyeSI6MTc1ODA2NzE5OSwiaXNTdWJkb21haW4iOnRydWV9
                                                        Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="youtube_main"
                                                        Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                        Vary: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                        Content-Security-Policy: require-trusted-types-for 'script'
                                                        P3P: CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657?hl=en for more info."
                                                        Server: ESF
                                                        Content-Length: 0
                                                        X-XSS-Protection: 0
                                                        Set-Cookie: GPS=1; Domain=.youtube.com; Expires=Mon, 30-Sep-2024 23:08:58 GMT; Path=/; Secure; HttpOnly
                                                        Set-Cookie: YSC=uYBjzU-HpBk; Domain=.youtube.com; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                                                        Set-Cookie: VISITOR_INFO1_LIVE=sAasWt6ysjY; Domain=.youtube.com; Expires=Sat, 29-Mar-2025 22:38:58 GMT; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                                                        Set-Cookie: VISITOR_PRIVACY_METADATA=CgJVUxIEGgAgIA%3D%3D; Domain=.youtube.com; Expires=Sat, 29-Mar-2025 22:38:58 GMT; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Connection: close


                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                        2192.168.2.64971840.113.110.67443
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-30 22:39:00 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 42 50 2b 70 48 63 63 79 6f 6b 57 41 6f 74 53 5a 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 64 37 33 61 66 63 32 32 38 32 39 35 63 62 62 37 0d 0a 0d 0a
                                                        Data Ascii: CNT 1 CON 305MS-CV: BP+pHccyokWAotSZ.1Context: d73afc228295cbb7
                                                        2024-09-30 22:39:00 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                                        Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                                        2024-09-30 22:39:00 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 42 50 2b 70 48 63 63 79 6f 6b 57 41 6f 74 53 5a 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 64 37 33 61 66 63 32 32 38 32 39 35 63 62 62 37 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 55 51 77 45 77 70 55 58 6e 4a 75 4a 48 61 46 43 46 64 44 4b 71 72 74 7a 61 37 68 65 33 74 46 5a 6a 78 64 61 38 61 2f 46 5a 42 30 2f 2b 50 41 63 47 63 77 4f 45 71 67 4b 6a 49 56 4d 61 57 6a 50 6e 63 65 6e 66 53 72 73 72 46 72 54 51 55 56 71 76 79 70 43 42 6a 35 53 75 4f 62 37 68 4b 36 70 68 70 37 55 58 78 38 37 64 35 6e 67 51
                                                        Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: BP+pHccyokWAotSZ.2Context: d73afc228295cbb7<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAUQwEwpUXnJuJHaFCFdDKqrtza7he3tFZjxda8a/FZB0/+PAcGcwOEqgKjIVMaWjPncenfSrsrFrTQUVqvypCBj5SuOb7hK6php7UXx87d5ngQ
                                                        2024-09-30 22:39:00 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 42 50 2b 70 48 63 63 79 6f 6b 57 41 6f 74 53 5a 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 64 37 33 61 66 63 32 32 38 32 39 35 63 62 62 37 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                                        Data Ascii: BND 3 CON\WNS 0 197MS-CV: BP+pHccyokWAotSZ.3Context: d73afc228295cbb7<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                                        2024-09-30 22:39:00 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                                        Data Ascii: 202 1 CON 58
                                                        2024-09-30 22:39:00 UTC58INData Raw: 4d 53 2d 43 56 3a 20 55 45 5a 57 4d 41 5a 5a 71 45 61 51 79 70 77 57 46 6f 7a 6e 78 41 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                                        Data Ascii: MS-CV: UEZWMAZZqEaQypwWFoznxA.0Payload parsing failed.


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        3192.168.2.649727184.28.90.27443
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-30 22:39:02 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Accept: */*
                                                        Accept-Encoding: identity
                                                        User-Agent: Microsoft BITS/7.8
                                                        Host: fs.microsoft.com
                                                        2024-09-30 22:39:02 UTC467INHTTP/1.1 200 OK
                                                        Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                                                        Content-Type: application/octet-stream
                                                        ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                                                        Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                                                        Server: ECAcc (lpl/EF06)
                                                        X-CID: 11
                                                        X-Ms-ApiVersion: Distribute 1.2
                                                        X-Ms-Region: prod-neu-z1
                                                        Cache-Control: public, max-age=238008
                                                        Date: Mon, 30 Sep 2024 22:39:02 GMT
                                                        Connection: close
                                                        X-CID: 2


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        4192.168.2.649732184.28.90.27443
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-30 22:39:03 UTC239OUTGET /fs/windows/config.json HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Accept: */*
                                                        Accept-Encoding: identity
                                                        If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
                                                        Range: bytes=0-2147483646
                                                        User-Agent: Microsoft BITS/7.8
                                                        Host: fs.microsoft.com
                                                        2024-09-30 22:39:03 UTC515INHTTP/1.1 200 OK
                                                        ApiVersion: Distribute 1.1
                                                        Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                                                        Content-Type: application/octet-stream
                                                        ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                                                        Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                                                        Server: ECAcc (lpl/EF06)
                                                        X-CID: 11
                                                        X-Ms-ApiVersion: Distribute 1.2
                                                        X-Ms-Region: prod-weu-z1
                                                        Cache-Control: public, max-age=237951
                                                        Date: Mon, 30 Sep 2024 22:39:03 GMT
                                                        Content-Length: 55
                                                        Connection: close
                                                        X-CID: 2
                                                        2024-09-30 22:39:03 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
                                                        Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        5192.168.2.649742172.217.16.2064436836C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-30 22:39:06 UTC1224OUTGET /accounts/CheckConnection?pmpo=https%3A%2F%2Faccounts.google.com&v=1836720642&timestamp=1727735944416 HTTP/1.1
                                                        Host: accounts.youtube.com
                                                        Connection: keep-alive
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        sec-ch-ua-full-version: "117.0.5938.134"
                                                        sec-ch-ua-arch: "x86"
                                                        sec-ch-ua-platform: "Windows"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                                                        Upgrade-Insecure-Requests: 1
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIkqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=
                                                        Sec-Fetch-Site: cross-site
                                                        Sec-Fetch-Mode: navigate
                                                        Sec-Fetch-User: ?1
                                                        Sec-Fetch-Dest: iframe
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-09-30 22:39:06 UTC1969INHTTP/1.1 200 OK
                                                        Content-Type: text/html; charset=utf-8
                                                        X-Frame-Options: ALLOW-FROM https://accounts.google.com
                                                        Content-Security-Policy: frame-ancestors https://accounts.google.com
                                                        Content-Security-Policy: script-src 'report-sample' 'nonce-chDrSr_debeHDIbKcnWUgg' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport;worker-src 'self'
                                                        Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport/allowlist
                                                        Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport
                                                        Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                        Pragma: no-cache
                                                        Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                        Date: Mon, 30 Sep 2024 22:39:06 GMT
                                                        Cross-Origin-Opener-Policy: same-origin
                                                        Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                        reporting-endpoints: default="/_/AccountsDomainCookiesCheckConnectionHttp/web-reports?context=eJzjstDikmJw1pBikPj6kkkDiJ3SZ7AGAXHSv_OsRUB8ufsS63UgVu25xGoKxEUSV1ibgFiIh6Pr4pvtbAITOlvWMirpJeUXxmempOaVZJZUpuTnJmbmJefnZ2emFhenFpWlFsUbGRiZGFgaGekZWMQXGAAAwQUs8w"
                                                        Server: ESF
                                                        X-XSS-Protection: 0
                                                        X-Content-Type-Options: nosniff
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-09-30 22:39:06 UTC1969INData Raw: 37 36 32 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 20 6e 6f 6e 63 65 3d 22 63 68 44 72 53 72 5f 64 65 62 65 48 44 49 62 4b 63 6e 57 55 67 67 22 3e 22 75 73 65 20 73 74 72 69 63 74 22 3b 74 68 69 73 2e 64 65 66 61 75 6c 74 5f 41 63 63 6f 75 6e 74 73 44 6f 6d 61 69 6e 63 6f 6f 6b 69 65 73 43 68 65 63 6b 63 6f 6e 6e 65 63 74 69 6f 6e 4a 73 3d 74 68 69 73 2e 64 65 66 61 75 6c 74 5f 41 63 63 6f 75 6e 74 73 44 6f 6d 61 69 6e 63 6f 6f 6b 69 65 73 43 68 65 63 6b 63 6f 6e 6e 65 63 74 69 6f 6e 4a 73 7c 7c 7b 7d 3b 28 66 75 6e 63 74 69 6f 6e 28 5f 29 7b 76 61 72 20 77 69 6e 64 6f 77 3d 74 68 69 73 3b 0a 74 72 79 7b 0a 5f 2e 5f 46 5f 74 6f 67 67 6c 65 73 5f 69 6e 69 74 69 61 6c 69 7a 65 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 28 74 79 70 65 6f
                                                        Data Ascii: 7625<html><head><script nonce="chDrSr_debeHDIbKcnWUgg">"use strict";this.default_AccountsDomaincookiesCheckconnectionJs=this.default_AccountsDomaincookiesCheckconnectionJs||{};(function(_){var window=this;try{_._F_toggles_initialize=function(a){(typeo
                                                        2024-09-30 22:39:06 UTC1969INData Raw: 54 72 69 64 65 6e 74 5c 2f 28 5c 64 2e 5c 64 29 2f 2e 65 78 65 63 28 62 29 2c 0a 63 5b 31 5d 3d 3d 22 37 2e 30 22 29 69 66 28 62 26 26 62 5b 31 5d 29 73 77 69 74 63 68 28 62 5b 31 5d 29 7b 63 61 73 65 20 22 34 2e 30 22 3a 61 3d 22 38 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 35 2e 30 22 3a 61 3d 22 39 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 36 2e 30 22 3a 61 3d 22 31 30 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 37 2e 30 22 3a 61 3d 22 31 31 2e 30 22 7d 65 6c 73 65 20 61 3d 22 37 2e 30 22 3b 65 6c 73 65 20 61 3d 63 5b 31 5d 3b 62 3d 61 7d 65 6c 73 65 20 62 3d 22 22 3b 72 65 74 75 72 6e 20 62 7d 76 61 72 20 64 3d 52 65 67 45 78 70 28 22 28 5b 41 2d 5a 5d 5b 5c 5c 77 20 5d 2b 29 2f 28 5b 5e 5c 5c 73 5d 2b 29 5c 5c 73 2a 28 3f 3a 5c 5c 28
                                                        Data Ascii: Trident\/(\d.\d)/.exec(b),c[1]=="7.0")if(b&&b[1])switch(b[1]){case "4.0":a="8.0";break;case "5.0":a="9.0";break;case "6.0":a="10.0";break;case "7.0":a="11.0"}else a="7.0";else a=c[1];b=a}else b="";return b}var d=RegExp("([A-Z][\\w ]+)/([^\\s]+)\\s*(?:\\(
                                                        2024-09-30 22:39:06 UTC1969INData Raw: 74 63 68 28 74 79 70 65 6f 66 20 61 29 7b 63 61 73 65 20 22 6e 75 6d 62 65 72 22 3a 72 65 74 75 72 6e 20 69 73 46 69 6e 69 74 65 28 61 29 3f 61 3a 53 74 72 69 6e 67 28 61 29 3b 63 61 73 65 20 22 62 69 67 69 6e 74 22 3a 72 65 74 75 72 6e 28 41 61 3f 0a 61 3e 3d 42 61 26 26 61 3c 3d 43 61 3a 61 5b 30 5d 3d 3d 3d 22 2d 22 3f 75 61 28 61 2c 44 61 29 3a 75 61 28 61 2c 45 61 29 29 3f 4e 75 6d 62 65 72 28 61 29 3a 53 74 72 69 6e 67 28 61 29 3b 63 61 73 65 20 22 62 6f 6f 6c 65 61 6e 22 3a 72 65 74 75 72 6e 20 61 3f 31 3a 30 3b 63 61 73 65 20 22 6f 62 6a 65 63 74 22 3a 69 66 28 61 29 69 66 28 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 61 29 29 7b 69 66 28 43 28 61 29 29 72 65 74 75 72 6e 7d 65 6c 73 65 20 69 66 28 46 61 26 26 61 21 3d 6e 75 6c 6c 26 26 61 20 69 6e
                                                        Data Ascii: tch(typeof a){case "number":return isFinite(a)?a:String(a);case "bigint":return(Aa?a>=Ba&&a<=Ca:a[0]==="-"?ua(a,Da):ua(a,Ea))?Number(a):String(a);case "boolean":return a?1:0;case "object":if(a)if(Array.isArray(a)){if(C(a))return}else if(Fa&&a!=null&&a in
                                                        2024-09-30 22:39:06 UTC1969INData Raw: 7b 76 61 72 20 62 3b 69 66 28 61 26 26 28 62 3d 51 61 29 21 3d 6e 75 6c 6c 26 26 62 2e 68 61 73 28 61 29 26 26 28 62 3d 61 2e 43 29 29 66 6f 72 28 76 61 72 20 63 3d 30 3b 63 3c 62 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 7b 76 61 72 20 64 3d 62 5b 63 5d 3b 69 66 28 63 3d 3d 3d 62 2e 6c 65 6e 67 74 68 2d 31 26 26 41 28 64 29 29 66 6f 72 28 76 61 72 20 65 20 69 6e 20 64 29 7b 76 61 72 20 66 3d 64 5b 65 5d 3b 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 66 29 26 26 0a 52 61 28 66 2c 61 29 7d 65 6c 73 65 20 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 64 29 26 26 52 61 28 64 2c 61 29 7d 61 3d 45 3f 61 2e 43 3a 4d 61 28 61 2e 43 2c 50 61 2c 76 6f 69 64 20 30 2c 76 6f 69 64 20 30 2c 21 31 29 3b 65 3d 21 45 3b 69 66 28 62 3d 61 2e 6c 65 6e 67 74 68 29 7b 64 3d 61 5b 62 2d
                                                        Data Ascii: {var b;if(a&&(b=Qa)!=null&&b.has(a)&&(b=a.C))for(var c=0;c<b.length;c++){var d=b[c];if(c===b.length-1&&A(d))for(var e in d){var f=d[e];Array.isArray(f)&&Ra(f,a)}else Array.isArray(d)&&Ra(d,a)}a=E?a.C:Ma(a.C,Pa,void 0,void 0,!1);e=!E;if(b=a.length){d=a[b-
                                                        2024-09-30 22:39:06 UTC1969INData Raw: 6f 6c 2e 69 74 65 72 61 74 6f 72 22 2c 66 75 6e 63 74 69 6f 6e 28 61 29 7b 69 66 28 61 29 72 65 74 75 72 6e 20 61 3b 61 3d 53 79 6d 62 6f 6c 28 22 63 22 29 3b 66 6f 72 28 76 61 72 20 62 3d 22 41 72 72 61 79 20 49 6e 74 38 41 72 72 61 79 20 55 69 6e 74 38 41 72 72 61 79 20 55 69 6e 74 38 43 6c 61 6d 70 65 64 41 72 72 61 79 20 49 6e 74 31 36 41 72 72 61 79 20 55 69 6e 74 31 36 41 72 72 61 79 20 49 6e 74 33 32 41 72 72 61 79 20 55 69 6e 74 33 32 41 72 72 61 79 20 46 6c 6f 61 74 33 32 41 72 72 61 79 20 46 6c 6f 61 74 36 34 41 72 72 61 79 22 2e 73 70 6c 69 74 28 22 20 22 29 2c 63 3d 30 3b 63 3c 62 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 7b 76 61 72 20 64 3d 57 61 5b 62 5b 63 5d 5d 3b 74 79 70 65 6f 66 20 64 3d 3d 3d 22 66 75 6e 63 74 69 6f 6e 22 26 26 74 79 70 65
                                                        Data Ascii: ol.iterator",function(a){if(a)return a;a=Symbol("c");for(var b="Array Int8Array Uint8Array Uint8ClampedArray Int16Array Uint16Array Int32Array Uint32Array Float32Array Float64Array".split(" "),c=0;c<b.length;c++){var d=Wa[b[c]];typeof d==="function"&&type
                                                        2024-09-30 22:39:06 UTC1969INData Raw: 29 3b 65 28 22 66 72 65 65 7a 65 22 29 3b 65 28 22 70 72 65 76 65 6e 74 45 78 74 65 6e 73 69 6f 6e 73 22 29 3b 65 28 22 73 65 61 6c 22 29 3b 76 61 72 20 68 3d 30 2c 67 3d 66 75 6e 63 74 69 6f 6e 28 6b 29 7b 74 68 69 73 2e 67 3d 28 68 2b 3d 4d 61 74 68 2e 72 61 6e 64 6f 6d 28 29 2b 31 29 2e 74 6f 53 74 72 69 6e 67 28 29 3b 69 66 28 6b 29 7b 6b 3d 48 28 6b 29 3b 66 6f 72 28 76 61 72 20 6c 3b 21 28 6c 3d 6b 2e 6e 65 78 74 28 29 29 2e 64 6f 6e 65 3b 29 6c 3d 6c 2e 76 61 6c 75 65 2c 74 68 69 73 2e 73 65 74 28 6c 5b 30 5d 2c 6c 5b 31 5d 29 7d 7d 3b 67 2e 70 72 6f 74 6f 74 79 70 65 2e 73 65 74 3d 66 75 6e 63 74 69 6f 6e 28 6b 2c 6c 29 7b 69 66 28 21 63 28 6b 29 29 74 68 72 6f 77 20 45 72 72 6f 72 28 22 69 22 29 3b 64 28 6b 29 3b 69 66 28 21 49 28 6b 2c 66 29 29
                                                        Data Ascii: );e("freeze");e("preventExtensions");e("seal");var h=0,g=function(k){this.g=(h+=Math.random()+1).toString();if(k){k=H(k);for(var l;!(l=k.next()).done;)l=l.value,this.set(l[0],l[1])}};g.prototype.set=function(k,l){if(!c(k))throw Error("i");d(k);if(!I(k,f))
                                                        2024-09-30 22:39:06 UTC1969INData Raw: 75 72 6e 20 67 2e 76 61 6c 75 65 7d 29 7d 3b 63 2e 70 72 6f 74 6f 74 79 70 65 2e 66 6f 72 45 61 63 68 3d 66 75 6e 63 74 69 6f 6e 28 67 2c 6b 29 7b 66 6f 72 28 76 61 72 20 6c 3d 74 68 69 73 2e 65 6e 74 72 69 65 73 28 29 2c 6d 3b 21 28 6d 3d 6c 2e 6e 65 78 74 28 29 29 2e 64 6f 6e 65 3b 29 6d 3d 0a 6d 2e 76 61 6c 75 65 2c 67 2e 63 61 6c 6c 28 6b 2c 6d 5b 31 5d 2c 6d 5b 30 5d 2c 74 68 69 73 29 7d 3b 63 2e 70 72 6f 74 6f 74 79 70 65 5b 53 79 6d 62 6f 6c 2e 69 74 65 72 61 74 6f 72 5d 3d 63 2e 70 72 6f 74 6f 74 79 70 65 2e 65 6e 74 72 69 65 73 3b 76 61 72 20 64 3d 66 75 6e 63 74 69 6f 6e 28 67 2c 6b 29 7b 76 61 72 20 6c 3d 6b 26 26 74 79 70 65 6f 66 20 6b 3b 6c 3d 3d 22 6f 62 6a 65 63 74 22 7c 7c 6c 3d 3d 22 66 75 6e 63 74 69 6f 6e 22 3f 62 2e 68 61 73 28 6b 29
                                                        Data Ascii: urn g.value})};c.prototype.forEach=function(g,k){for(var l=this.entries(),m;!(m=l.next()).done;)m=m.value,g.call(k,m[1],m[0],this)};c.prototype[Symbol.iterator]=c.prototype.entries;var d=function(g,k){var l=k&&typeof k;l=="object"||l=="function"?b.has(k)
                                                        2024-09-30 22:39:06 UTC1969INData Raw: 6f 6e 28 61 29 7b 72 65 74 75 72 6e 20 61 3f 61 3a 66 75 6e 63 74 69 6f 6e 28 62 29 7b 72 65 74 75 72 6e 20 74 79 70 65 6f 66 20 62 3d 3d 3d 22 6e 75 6d 62 65 72 22 26 26 69 73 4e 61 4e 28 62 29 7d 7d 29 3b 76 61 72 20 66 62 3d 66 62 7c 7c 7b 7d 2c 71 3d 74 68 69 73 7c 7c 73 65 6c 66 2c 67 62 3d 71 2e 5f 46 5f 74 6f 67 67 6c 65 73 7c 7c 5b 5d 2c 68 62 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 61 3d 61 2e 73 70 6c 69 74 28 22 2e 22 29 3b 66 6f 72 28 76 61 72 20 62 3d 71 2c 63 3d 30 3b 63 3c 61 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 69 66 28 62 3d 62 5b 61 5b 63 5d 5d 2c 62 3d 3d 6e 75 6c 6c 29 72 65 74 75 72 6e 20 6e 75 6c 6c 3b 72 65 74 75 72 6e 20 62 7d 2c 69 62 3d 22 63 6c 6f 73 75 72 65 5f 75 69 64 5f 22 2b 28 4d 61 74 68 2e 72 61 6e 64 6f 6d 28 29 2a 31 45
                                                        Data Ascii: on(a){return a?a:function(b){return typeof b==="number"&&isNaN(b)}});var fb=fb||{},q=this||self,gb=q._F_toggles||[],hb=function(a){a=a.split(".");for(var b=q,c=0;c<a.length;c++)if(b=b[a[c]],b==null)return null;return b},ib="closure_uid_"+(Math.random()*1E
                                                        2024-09-30 22:39:06 UTC1969INData Raw: 74 65 78 74 5f 5f 39 38 34 33 38 32 3d 7b 7d 29 3b 61 2e 5f 5f 63 6c 6f 73 75 72 65 5f 5f 65 72 72 6f 72 5f 5f 63 6f 6e 74 65 78 74 5f 5f 39 38 34 33 38 32 2e 73 65 76 65 72 69 74 79 3d 62 7d 3b 76 61 72 20 71 62 3d 66 75 6e 63 74 69 6f 6e 28 61 2c 62 2c 63 29 7b 63 3d 63 7c 7c 71 3b 76 61 72 20 64 3d 63 2e 6f 6e 65 72 72 6f 72 2c 65 3d 21 21 62 3b 63 2e 6f 6e 65 72 72 6f 72 3d 66 75 6e 63 74 69 6f 6e 28 66 2c 68 2c 67 2c 6b 2c 6c 29 7b 64 26 26 64 28 66 2c 68 2c 67 2c 6b 2c 6c 29 3b 61 28 7b 6d 65 73 73 61 67 65 3a 66 2c 66 69 6c 65 4e 61 6d 65 3a 68 2c 6c 69 6e 65 3a 67 2c 6c 69 6e 65 4e 75 6d 62 65 72 3a 67 2c 63 61 3a 6b 2c 65 72 72 6f 72 3a 6c 7d 29 3b 72 65 74 75 72 6e 20 65 7d 7d 2c 74 62 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 76 61 72 20 62 3d 68
                                                        Data Ascii: text__984382={});a.__closure__error__context__984382.severity=b};var qb=function(a,b,c){c=c||q;var d=c.onerror,e=!!b;c.onerror=function(f,h,g,k,l){d&&d(f,h,g,k,l);a({message:f,fileName:h,line:g,lineNumber:g,ca:k,error:l});return e}},tb=function(a){var b=h
                                                        2024-09-30 22:39:06 UTC1969INData Raw: 22 6e 75 6d 62 65 72 22 3a 66 3d 53 74 72 69 6e 67 28 66 29 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 62 6f 6f 6c 65 61 6e 22 3a 66 3d 66 3f 22 74 72 75 65 22 3a 22 66 61 6c 73 65 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 66 75 6e 63 74 69 6f 6e 22 3a 66 3d 28 66 3d 73 62 28 66 29 29 3f 66 3a 22 5b 66 6e 5d 22 3b 62 72 65 61 6b 3b 64 65 66 61 75 6c 74 3a 66 3d 0a 74 79 70 65 6f 66 20 66 7d 66 2e 6c 65 6e 67 74 68 3e 34 30 26 26 28 66 3d 66 2e 73 6c 69 63 65 28 30 2c 34 30 29 2b 22 2e 2e 2e 22 29 3b 63 2e 70 75 73 68 28 66 29 7d 62 2e 70 75 73 68 28 61 29 3b 63 2e 70 75 73 68 28 22 29 5c 6e 22 29 3b 74 72 79 7b 63 2e 70 75 73 68 28 77 62 28 61 2e 63 61 6c 6c 65 72 2c 62 29 29 7d 63 61 74 63 68 28 68 29 7b 63 2e 70 75 73 68 28 22 5b 65 78 63 65 70 74 69 6f 6e
                                                        Data Ascii: "number":f=String(f);break;case "boolean":f=f?"true":"false";break;case "function":f=(f=sb(f))?f:"[fn]";break;default:f=typeof f}f.length>40&&(f=f.slice(0,40)+"...");c.push(f)}b.push(a);c.push(")\n");try{c.push(wb(a.caller,b))}catch(h){c.push("[exception


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        6192.168.2.649745172.217.16.1424436836C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-30 22:39:07 UTC549OUTOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Accept: */*
                                                        Access-Control-Request-Method: POST
                                                        Access-Control-Request-Headers: x-goog-authuser
                                                        Origin: https://accounts.google.com
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-09-30 22:39:07 UTC520INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                        Access-Control-Max-Age: 86400
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web,authorization,origin,x-goog-authuser
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Mon, 30 Sep 2024 22:39:07 GMT
                                                        Server: Playlog
                                                        Content-Length: 0
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Connection: close


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        7192.168.2.649747172.217.16.1424436836C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-30 22:39:07 UTC549OUTOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Accept: */*
                                                        Access-Control-Request-Method: POST
                                                        Access-Control-Request-Headers: x-goog-authuser
                                                        Origin: https://accounts.google.com
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-09-30 22:39:07 UTC520INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                        Access-Control-Max-Age: 86400
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web,authorization,origin,x-goog-authuser
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Mon, 30 Sep 2024 22:39:07 GMT
                                                        Server: Playlog
                                                        Content-Length: 0
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Connection: close


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        8192.168.2.649750172.217.16.1424436836C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-30 22:39:08 UTC1112OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 519
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.134"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIkqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-09-30 22:39:08 UTC519OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 37 33 35 39 34 35 34 38 36 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[1,0,0,0,0]]],1828,[["1727735945486",null,null,null
                                                        2024-09-30 22:39:08 UTC933INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Set-Cookie: NID=518=ucDLwNKLDAE_gYCRch55bLd0le4Qb8BUC7u93re2c9uJKtInwWQfyMLyrOK64fs4n0mtJ7YHHN35gzH-cgxIx9Y0lFzlwyBmgrGZkj3okS7NPKrjwGnDZtoFfjw5_DzdhYaiGlWEFBU_g3E1dMs81sJn5Vuy-01LTN3UmMwuea0O3058LjU; expires=Tue, 01-Apr-2025 22:39:08 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                        P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Mon, 30 Sep 2024 22:39:08 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Expires: Mon, 30 Sep 2024 22:39:08 GMT
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-09-30 22:39:08 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-09-30 22:39:08 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        9192.168.2.649751172.217.16.1424436836C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-30 22:39:08 UTC1112OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 519
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.134"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIkqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        2024-09-30 22:39:08 UTC519OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 37 33 35 39 34 35 35 37 30 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[1,0,0,0,0]]],1828,[["1727735945570",null,null,null
                                                        2024-09-30 22:39:08 UTC932INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Set-Cookie: NID=518=OMQleyhhuYM7kr9HKnn1q0gOh11OFo2jBZbhER2FvOmnbnUdpBRWtBmFDK_cwdTReBe9RK1qq9FQOGQU_AN3ml2HG6IgsXLb-EFcg1BSytR40-gAJ4mKUyRiazG3hA9VmxYleWkzuwjnbxSnVYwV6CNX5dGlGZEfXfzJicBBjSPK3lL-_Q; expires=Tue, 01-Apr-2025 22:39:08 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                        P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Mon, 30 Sep 2024 22:39:08 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Expires: Mon, 30 Sep 2024 22:39:08 GMT
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-09-30 22:39:08 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-09-30 22:39:08 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                        10192.168.2.64974940.113.110.67443
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-30 22:39:08 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 31 71 39 4e 33 64 50 4c 53 55 4f 6d 79 75 55 74 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 38 35 34 30 34 31 66 62 38 37 31 64 66 39 62 64 0d 0a 0d 0a
                                                        Data Ascii: CNT 1 CON 305MS-CV: 1q9N3dPLSUOmyuUt.1Context: 854041fb871df9bd
                                                        2024-09-30 22:39:08 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                                        Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                                        2024-09-30 22:39:08 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 31 71 39 4e 33 64 50 4c 53 55 4f 6d 79 75 55 74 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 38 35 34 30 34 31 66 62 38 37 31 64 66 39 62 64 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 55 51 77 45 77 70 55 58 6e 4a 75 4a 48 61 46 43 46 64 44 4b 71 72 74 7a 61 37 68 65 33 74 46 5a 6a 78 64 61 38 61 2f 46 5a 42 30 2f 2b 50 41 63 47 63 77 4f 45 71 67 4b 6a 49 56 4d 61 57 6a 50 6e 63 65 6e 66 53 72 73 72 46 72 54 51 55 56 71 76 79 70 43 42 6a 35 53 75 4f 62 37 68 4b 36 70 68 70 37 55 58 78 38 37 64 35 6e 67 51
                                                        Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: 1q9N3dPLSUOmyuUt.2Context: 854041fb871df9bd<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAUQwEwpUXnJuJHaFCFdDKqrtza7he3tFZjxda8a/FZB0/+PAcGcwOEqgKjIVMaWjPncenfSrsrFrTQUVqvypCBj5SuOb7hK6php7UXx87d5ngQ
                                                        2024-09-30 22:39:08 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 31 71 39 4e 33 64 50 4c 53 55 4f 6d 79 75 55 74 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 38 35 34 30 34 31 66 62 38 37 31 64 66 39 62 64 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                                        Data Ascii: BND 3 CON\WNS 0 197MS-CV: 1q9N3dPLSUOmyuUt.3Context: 854041fb871df9bd<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                                        2024-09-30 22:39:08 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                                        Data Ascii: 202 1 CON 58
                                                        2024-09-30 22:39:08 UTC58INData Raw: 4d 53 2d 43 56 3a 20 67 47 4b 65 66 35 64 34 6f 45 71 70 6a 34 49 70 51 54 4a 36 5a 51 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                                        Data Ascii: MS-CV: gGKef5d4oEqpj4IpQTJ6ZQ.0Payload parsing failed.


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        11192.168.2.649723142.250.186.364436836C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-30 22:39:08 UTC1201OUTGET /favicon.ico HTTP/1.1
                                                        Host: www.google.com
                                                        Connection: keep-alive
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        sec-ch-ua-full-version: "117.0.5938.134"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
                                                        X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIkqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: no-cors
                                                        Sec-Fetch-Dest: image
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=OMQleyhhuYM7kr9HKnn1q0gOh11OFo2jBZbhER2FvOmnbnUdpBRWtBmFDK_cwdTReBe9RK1qq9FQOGQU_AN3ml2HG6IgsXLb-EFcg1BSytR40-gAJ4mKUyRiazG3hA9VmxYleWkzuwjnbxSnVYwV6CNX5dGlGZEfXfzJicBBjSPK3lL-_Q
                                                        2024-09-30 22:39:09 UTC706INHTTP/1.1 200 OK
                                                        Accept-Ranges: bytes
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Cross-Origin-Opener-Policy-Report-Only: same-origin; report-to="static-on-bigtable"
                                                        Report-To: {"group":"static-on-bigtable","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/static-on-bigtable"}]}
                                                        Content-Length: 5430
                                                        X-Content-Type-Options: nosniff
                                                        Server: sffe
                                                        X-XSS-Protection: 0
                                                        Date: Mon, 30 Sep 2024 17:00:09 GMT
                                                        Expires: Tue, 08 Oct 2024 17:00:09 GMT
                                                        Cache-Control: public, max-age=691200
                                                        Last-Modified: Tue, 22 Oct 2019 18:30:00 GMT
                                                        Content-Type: image/x-icon
                                                        Vary: Accept-Encoding
                                                        Age: 20340
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Connection: close
                                                        2024-09-30 22:39:09 UTC684INData Raw: 00 00 01 00 02 00 10 10 00 00 01 00 20 00 68 04 00 00 26 00 00 00 20 20 00 00 01 00 20 00 a8 10 00 00 8e 04 00 00 28 00 00 00 10 00 00 00 20 00 00 00 01 00 20 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 30 fd fd fd 96 fd fd fd d8 fd fd fd f9 fd fd fd f9 fd fd fd d7 fd fd fd 94 fe fe fe 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd 99 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 95 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd c1 ff ff ff ff fa fd f9 ff b4 d9 a7 ff 76 ba 5d ff 58 ab 3a ff 58 aa 3a ff 72 b8 59 ff ac d5 9d ff f8 fb f6 ff ff
                                                        Data Ascii: h& ( 0.v]X:X:rY
                                                        2024-09-30 22:39:09 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d8 fd fd fd 99 ff ff ff ff 92 cf fb ff 37 52 ec ff 38 46 ea ff d0 d4 fa ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 96 fe fe fe 32 ff ff ff ff f9 f9 fe ff 56 62 ed ff 35 43 ea ff 3b 49 eb ff 95 9c f4 ff cf d2 fa ff d1 d4 fa ff 96 9d f4 ff 52 5e ed ff e1 e3 fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 30 00 00 00 00 fd fd fd 9d ff ff ff ff e8 ea fd ff 58 63 ee ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 6c 76 f0 ff ff ff ff ff ff ff ff ff fd fd fd 98 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd c3 ff ff ff ff f9 f9 fe ff a5 ac f6 ff 5d 69 ee ff 3c
                                                        Data Ascii: 7R8F2Vb5C;IR^0Xc5C5C5C5C5C5Clv]i<
                                                        2024-09-30 22:39:09 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d0 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fd fd fd 8b ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff b1 d8 a3 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 60 a5 35 ff ca 8e 3e ff f9 c1 9f ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 87 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 25 fd fd fd fb ff ff ff ff ff ff ff ff ff ff ff ff c2 e0 b7 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 6e b6 54 ff 9f ce 8d ff b7 da aa ff b8 db ab ff a5 d2 95 ff 7b bc 64 ff 54 a8 35 ff 53 a8 34 ff 77 a0 37 ff e3 89 41 ff f4 85 42 ff f4 85 42
                                                        Data Ascii: S4S4S4S4S4S4S4S4S4S4S4S4S4S4`5>%S4S4S4S4S4S4nT{dT5S4w7ABB
                                                        2024-09-30 22:39:09 UTC1390INData Raw: 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff fb d5 bf ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd ea fd fd fd cb ff ff ff ff ff ff ff ff ff ff ff ff 46 cd fc ff 05 bc fb ff 05 bc fb ff 05 bc fb ff 21 ae f9 ff fb fb ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd c8 fd fd fd 9c ff ff ff ff ff ff ff ff ff ff ff ff 86 df fd ff 05 bc fb ff 05 bc fb ff 15 93 f5 ff 34 49 eb ff b3 b8 f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                        Data Ascii: BBBBBBBF!4I
                                                        2024-09-30 22:39:09 UTC576INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d2 fe fe fe 24 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd 8d fd fd fd fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd fb fd fd fd 8b fe fe fe 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 27 fd fd fd 9f fd fd fd f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                        Data Ascii: $'


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        12192.168.2.64975952.165.165.26443
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-30 22:39:12 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=tG9AfCOEA46PAs2&MD=hgtoDYkz HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Accept: */*
                                                        User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                                        Host: slscr.update.microsoft.com
                                                        2024-09-30 22:39:12 UTC560INHTTP/1.1 200 OK
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        Content-Type: application/octet-stream
                                                        Expires: -1
                                                        Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                                        ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
                                                        MS-CorrelationId: dcc4a4a1-801c-4eb3-97cf-d43381f6643f
                                                        MS-RequestId: 31eb9fdc-bf33-47a9-b821-2f58e9370114
                                                        MS-CV: LiqR6gsjWEu0kReK.0
                                                        X-Microsoft-SLSClientCache: 2880
                                                        Content-Disposition: attachment; filename=environment.cab
                                                        X-Content-Type-Options: nosniff
                                                        Date: Mon, 30 Sep 2024 22:39:12 GMT
                                                        Connection: close
                                                        Content-Length: 24490
                                                        2024-09-30 22:39:12 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
                                                        Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
                                                        2024-09-30 22:39:12 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
                                                        Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        13192.168.2.649764172.217.16.1424436836C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-30 22:39:16 UTC1286OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1215
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: text/plain;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.134"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIkqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=OMQleyhhuYM7kr9HKnn1q0gOh11OFo2jBZbhER2FvOmnbnUdpBRWtBmFDK_cwdTReBe9RK1qq9FQOGQU_AN3ml2HG6IgsXLb-EFcg1BSytR40-gAJ4mKUyRiazG3hA9VmxYleWkzuwjnbxSnVYwV6CNX5dGlGZEfXfzJicBBjSPK3lL-_Q
                                                        2024-09-30 22:39:16 UTC1215OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 34 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 35 35 38 2c 5b 5b 22 31 37 32 37 37 33 35 39 34 33 30 30 30 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,null,null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[4,0,0,0,0]]],558,[["1727735943000",null,null,null,
                                                        2024-09-30 22:39:16 UTC940INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Set-Cookie: NID=518=J6XH-SgDI90U1UYfAIIUKh_T4zdEuIX8LomerwJipfQyAl4utPHinMJDOKMx14EhVech-OEf_YnbqJu1_R2ha7Z-eShMFSi3k0VvyFWZa37rkuAa8jsDfF1ohk2ZDyPpQnhZXu4_19BWMU2oIvdQ2smJ41xaXL36trZYxLFQSkeh9OAYWNz0myiedA; expires=Tue, 01-Apr-2025 22:39:16 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                        P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Mon, 30 Sep 2024 22:39:16 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Expires: Mon, 30 Sep 2024 22:39:16 GMT
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-09-30 22:39:16 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-09-30 22:39:16 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                        14192.168.2.64976540.113.110.67443
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-30 22:39:20 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 4a 6b 4e 69 58 74 73 55 2b 45 43 57 4a 36 4f 68 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 65 31 32 34 64 30 33 65 63 36 33 31 35 65 31 64 0d 0a 0d 0a
                                                        Data Ascii: CNT 1 CON 305MS-CV: JkNiXtsU+ECWJ6Oh.1Context: e124d03ec6315e1d
                                                        2024-09-30 22:39:20 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                                        Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                                        2024-09-30 22:39:20 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 4a 6b 4e 69 58 74 73 55 2b 45 43 57 4a 36 4f 68 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 65 31 32 34 64 30 33 65 63 36 33 31 35 65 31 64 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 55 51 77 45 77 70 55 58 6e 4a 75 4a 48 61 46 43 46 64 44 4b 71 72 74 7a 61 37 68 65 33 74 46 5a 6a 78 64 61 38 61 2f 46 5a 42 30 2f 2b 50 41 63 47 63 77 4f 45 71 67 4b 6a 49 56 4d 61 57 6a 50 6e 63 65 6e 66 53 72 73 72 46 72 54 51 55 56 71 76 79 70 43 42 6a 35 53 75 4f 62 37 68 4b 36 70 68 70 37 55 58 78 38 37 64 35 6e 67 51
                                                        Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: JkNiXtsU+ECWJ6Oh.2Context: e124d03ec6315e1d<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAUQwEwpUXnJuJHaFCFdDKqrtza7he3tFZjxda8a/FZB0/+PAcGcwOEqgKjIVMaWjPncenfSrsrFrTQUVqvypCBj5SuOb7hK6php7UXx87d5ngQ
                                                        2024-09-30 22:39:20 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 4a 6b 4e 69 58 74 73 55 2b 45 43 57 4a 36 4f 68 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 65 31 32 34 64 30 33 65 63 36 33 31 35 65 31 64 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                                        Data Ascii: BND 3 CON\WNS 0 197MS-CV: JkNiXtsU+ECWJ6Oh.3Context: e124d03ec6315e1d<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                                        2024-09-30 22:39:20 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                                        Data Ascii: 202 1 CON 58
                                                        2024-09-30 22:39:20 UTC58INData Raw: 4d 53 2d 43 56 3a 20 53 73 37 30 44 67 49 37 75 55 2b 4c 67 4b 6f 75 45 71 36 6b 45 41 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                                        Data Ascii: MS-CV: Ss70DgI7uU+LgKouEq6kEA.0Payload parsing failed.


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        15192.168.2.66508320.3.187.198443
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-30 22:39:27 UTC142OUTGET /clientwebservice/ping HTTP/1.1
                                                        Connection: Keep-Alive
                                                        User-Agent: DNS resiliency checker/1.0
                                                        Host: fe3cr.delivery.mp.microsoft.com
                                                        2024-09-30 22:39:27 UTC234INHTTP/1.1 200 OK
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        Expires: -1
                                                        Server: Microsoft-IIS/10.0
                                                        X-Powered-By: ASP.NET
                                                        X-Content-Type-Options: nosniff
                                                        Date: Mon, 30 Sep 2024 22:39:27 GMT
                                                        Connection: close
                                                        Content-Length: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        16192.168.2.66508452.165.165.26443
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-30 22:39:28 UTC124OUTGET /sls/ping HTTP/1.1
                                                        Connection: Keep-Alive
                                                        User-Agent: DNS resiliency checker/1.0
                                                        Host: slscr.update.microsoft.com
                                                        2024-09-30 22:39:28 UTC318INHTTP/1.1 200 OK
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        Expires: -1
                                                        MS-CV: cOYi09mJakebv0cX.0
                                                        MS-RequestId: 3b0028d1-ac36-4ccd-b663-50b86adf3f25
                                                        MS-CorrelationId: 267ee797-d6b7-498e-9651-c032210612b4
                                                        X-Content-Type-Options: nosniff
                                                        Date: Mon, 30 Sep 2024 22:39:28 GMT
                                                        Connection: close
                                                        Content-Length: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        17192.168.2.6650854.245.163.56443
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-30 22:39:30 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=tG9AfCOEA46PAs2&MD=hgtoDYkz HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Accept: */*
                                                        User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                                        Host: slscr.update.microsoft.com
                                                        2024-09-30 22:39:31 UTC560INHTTP/1.1 200 OK
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        Content-Type: application/octet-stream
                                                        Expires: -1
                                                        Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                                        ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
                                                        MS-CorrelationId: 5ba7b708-8782-4ad8-b311-be4b1e6f3d85
                                                        MS-RequestId: 9026685e-ed51-4b6b-9a84-d0f76e7ddb3e
                                                        MS-CV: HcLDDlv15USuTKUU.0
                                                        X-Microsoft-SLSClientCache: 2880
                                                        Content-Disposition: attachment; filename=environment.cab
                                                        X-Content-Type-Options: nosniff
                                                        Date: Mon, 30 Sep 2024 22:39:30 GMT
                                                        Connection: close
                                                        Content-Length: 24490
                                                        2024-09-30 22:39:31 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
                                                        Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
                                                        2024-09-30 22:39:31 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
                                                        Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        18192.168.2.6650864.245.163.56443
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-30 22:39:32 UTC306OUTGET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=tG9AfCOEA46PAs2&MD=hgtoDYkz HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Accept: */*
                                                        User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                                        Host: slscr.update.microsoft.com
                                                        2024-09-30 22:39:32 UTC560INHTTP/1.1 200 OK
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        Content-Type: application/octet-stream
                                                        Expires: -1
                                                        Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                                        ETag: "vic+p1MiJJ+/WMnK08jaWnCBGDfvkGRzPk9f8ZadQHg=_1440"
                                                        MS-CorrelationId: 392945c9-e9ab-42b2-8ceb-a4eafabcc553
                                                        MS-RequestId: c48833c3-63b1-42d1-bc77-44f59f19ea38
                                                        MS-CV: s16gtdls6kKw1FtX.0
                                                        X-Microsoft-SLSClientCache: 1440
                                                        Content-Disposition: attachment; filename=environment.cab
                                                        X-Content-Type-Options: nosniff
                                                        Date: Mon, 30 Sep 2024 22:39:32 GMT
                                                        Connection: close
                                                        Content-Length: 30005
                                                        2024-09-30 22:39:32 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 8d 2b 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 5b 49 00 00 14 00 00 00 00 00 10 00 8d 2b 00 00 a8 49 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 72 4d 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 fe f6 51 be 21 2b 72 4d 43 4b ed 7c 05 58 54 eb da f6 14 43 49 37 0a 02 d2 b9 86 0e 41 52 a4 1b 24 a5 bb 43 24 44 18 94 90 92 52 41 3a 05 09 95 ee 54 b0 00 91 2e e9 12 10 04 11 c9 6f 10 b7 a2 67 9f bd cf 3e ff b7 ff b3 bf 73 ed e1 9a 99 f5 c6 7a d7 bb de f5 3e cf fd 3c f7 dc 17 4a 1a 52 e7 41 a8 97 1e 14 f4 e5 25 7d f4 05 82 82 c1 20 30 08 06 ba c3 05 02 11 7f a9 c1 ff d2 87 5c 1e f4 ed 65 8e 7a 1f f6 0a 40 03 1d 7b f9 83 2c 1c 2f db b8 3a 39 3a 58 38 ba 73 5e
                                                        Data Ascii: MSCF+D[I+IdrMenvironment.cabQ!+rMCK|XTCI7AR$C$DRA:T.og>sz><JRA%} 0\ez@{,/:9:X8s^
                                                        2024-09-30 22:39:32 UTC14181INData Raw: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 26 30 24 06 03 55 04 03 13 1d 4d 69 63 72 6f 73 6f 66 74 20 54 69 6d 65 2d 53 74 61 6d 70 20 50 43 41 20 32 30 31 30 30 1e 17 0d 32 33 31 30 31 32 31 39 30 37 32 35 5a 17 0d 32 35 30 31 31 30 31 39 30 37 32 35 5a 30 81 d2 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 2d 30 2b 06 03 55 04 0b 13 24 4d 69 63 72 6f
                                                        Data Ascii: UUS10UWashington10URedmond10UMicrosoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100231012190725Z250110190725Z010UUS10UWashington10URedmond10UMicrosoft Corporation1-0+U$Micro


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        19192.168.2.665087172.217.16.2064436836C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-30 22:39:37 UTC1317OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1399
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.134"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIkqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=J6XH-SgDI90U1UYfAIIUKh_T4zdEuIX8LomerwJipfQyAl4utPHinMJDOKMx14EhVech-OEf_YnbqJu1_R2ha7Z-eShMFSi3k0VvyFWZa37rkuAa8jsDfF1ohk2ZDyPpQnhZXu4_19BWMU2oIvdQ2smJ41xaXL36trZYxLFQSkeh9OAYWNz0myiedA
                                                        2024-09-30 22:39:37 UTC1399OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 37 33 35 39 37 35 37 36 31 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[1,0,0,0,0]]],1828,[["1727735975761",null,null,null
                                                        2024-09-30 22:39:37 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Mon, 30 Sep 2024 22:39:37 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-09-30 22:39:37 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-09-30 22:39:37 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        20192.168.2.665088172.217.16.2064436836C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-30 22:39:37 UTC1317OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1045
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.134"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIkqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=J6XH-SgDI90U1UYfAIIUKh_T4zdEuIX8LomerwJipfQyAl4utPHinMJDOKMx14EhVech-OEf_YnbqJu1_R2ha7Z-eShMFSi3k0VvyFWZa37rkuAa8jsDfF1ohk2ZDyPpQnhZXu4_19BWMU2oIvdQ2smJ41xaXL36trZYxLFQSkeh9OAYWNz0myiedA
                                                        2024-09-30 22:39:37 UTC1045OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 37 33 35 39 37 36 30 30 30 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[1,0,0,0,0]]],1828,[["1727735976000",null,null,null
                                                        2024-09-30 22:39:37 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Mon, 30 Sep 2024 22:39:37 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-09-30 22:39:37 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-09-30 22:39:37 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        21192.168.2.665089172.217.16.2064436836C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-30 22:39:38 UTC1277OUTPOST /log?hasfast=true&authuser=0&format=json HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1038
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        sec-ch-ua-full-version: "117.0.5938.134"
                                                        Content-Type: text/plain;charset=UTF-8
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIkqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: no-cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=J6XH-SgDI90U1UYfAIIUKh_T4zdEuIX8LomerwJipfQyAl4utPHinMJDOKMx14EhVech-OEf_YnbqJu1_R2ha7Z-eShMFSi3k0VvyFWZa37rkuAa8jsDfF1ohk2ZDyPpQnhZXu4_19BWMU2oIvdQ2smJ41xaXL36trZYxLFQSkeh9OAYWNz0myiedA
                                                        2024-09-30 22:39:38 UTC1038OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 62 6f 71 5f 69 64 65 6e 74 69 74 79 66 72 6f 6e 74 65 6e 64 61 75 74 68 75 69 73 65 72 76 65 72 5f 32 30 32 34 30 39 32 34 2e 30 32 5f 70 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 33 2c 30 2c 30
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"boq_identityfrontendauthuiserver_20240924.02_p0",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[3,0,0
                                                        2024-09-30 22:39:38 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Mon, 30 Sep 2024 22:39:38 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-09-30 22:39:38 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-09-30 22:39:38 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                        22192.168.2.66509040.115.3.253443
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-30 22:39:39 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 43 6c 46 51 61 52 57 34 4c 6b 61 56 70 37 30 6e 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 36 63 65 30 39 34 30 63 63 35 66 30 39 33 38 65 0d 0a 0d 0a
                                                        Data Ascii: CNT 1 CON 305MS-CV: ClFQaRW4LkaVp70n.1Context: 6ce0940cc5f0938e
                                                        2024-09-30 22:39:39 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                                        Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                                        2024-09-30 22:39:39 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 43 6c 46 51 61 52 57 34 4c 6b 61 56 70 37 30 6e 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 36 63 65 30 39 34 30 63 63 35 66 30 39 33 38 65 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 55 51 77 45 77 70 55 58 6e 4a 75 4a 48 61 46 43 46 64 44 4b 71 72 74 7a 61 37 68 65 33 74 46 5a 6a 78 64 61 38 61 2f 46 5a 42 30 2f 2b 50 41 63 47 63 77 4f 45 71 67 4b 6a 49 56 4d 61 57 6a 50 6e 63 65 6e 66 53 72 73 72 46 72 54 51 55 56 71 76 79 70 43 42 6a 35 53 75 4f 62 37 68 4b 36 70 68 70 37 55 58 78 38 37 64 35 6e 67 51
                                                        Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: ClFQaRW4LkaVp70n.2Context: 6ce0940cc5f0938e<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAUQwEwpUXnJuJHaFCFdDKqrtza7he3tFZjxda8a/FZB0/+PAcGcwOEqgKjIVMaWjPncenfSrsrFrTQUVqvypCBj5SuOb7hK6php7UXx87d5ngQ
                                                        2024-09-30 22:39:39 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 43 6c 46 51 61 52 57 34 4c 6b 61 56 70 37 30 6e 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 36 63 65 30 39 34 30 63 63 35 66 30 39 33 38 65 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                                        Data Ascii: BND 3 CON\WNS 0 197MS-CV: ClFQaRW4LkaVp70n.3Context: 6ce0940cc5f0938e<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                                        2024-09-30 22:39:39 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                                        Data Ascii: 202 1 CON 58
                                                        2024-09-30 22:39:39 UTC58INData Raw: 4d 53 2d 43 56 3a 20 43 51 74 44 7a 2b 4f 37 62 30 4b 62 4f 63 64 36 50 73 46 79 62 77 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                                        Data Ascii: MS-CV: CQtDz+O7b0KbOcd6PsFybw.0Payload parsing failed.


                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                        23192.168.2.66509340.115.3.253443
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-30 22:40:02 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 7a 45 76 65 51 58 44 73 68 6b 32 33 73 74 4a 70 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 65 33 32 32 35 30 61 63 32 61 35 64 33 61 33 64 0d 0a 0d 0a
                                                        Data Ascii: CNT 1 CON 305MS-CV: zEveQXDshk23stJp.1Context: e32250ac2a5d3a3d
                                                        2024-09-30 22:40:02 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                                        Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                                        2024-09-30 22:40:02 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 7a 45 76 65 51 58 44 73 68 6b 32 33 73 74 4a 70 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 65 33 32 32 35 30 61 63 32 61 35 64 33 61 33 64 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 55 51 77 45 77 70 55 58 6e 4a 75 4a 48 61 46 43 46 64 44 4b 71 72 74 7a 61 37 68 65 33 74 46 5a 6a 78 64 61 38 61 2f 46 5a 42 30 2f 2b 50 41 63 47 63 77 4f 45 71 67 4b 6a 49 56 4d 61 57 6a 50 6e 63 65 6e 66 53 72 73 72 46 72 54 51 55 56 71 76 79 70 43 42 6a 35 53 75 4f 62 37 68 4b 36 70 68 70 37 55 58 78 38 37 64 35 6e 67 51
                                                        Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: zEveQXDshk23stJp.2Context: e32250ac2a5d3a3d<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAUQwEwpUXnJuJHaFCFdDKqrtza7he3tFZjxda8a/FZB0/+PAcGcwOEqgKjIVMaWjPncenfSrsrFrTQUVqvypCBj5SuOb7hK6php7UXx87d5ngQ
                                                        2024-09-30 22:40:02 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 7a 45 76 65 51 58 44 73 68 6b 32 33 73 74 4a 70 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 65 33 32 32 35 30 61 63 32 61 35 64 33 61 33 64 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                                        Data Ascii: BND 3 CON\WNS 0 197MS-CV: zEveQXDshk23stJp.3Context: e32250ac2a5d3a3d<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                                        2024-09-30 22:40:03 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                                        Data Ascii: 202 1 CON 58
                                                        2024-09-30 22:40:03 UTC58INData Raw: 4d 53 2d 43 56 3a 20 6d 56 62 68 57 69 47 65 4f 6b 53 61 4b 35 67 50 33 51 36 78 68 77 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                                        Data Ascii: MS-CV: mVbhWiGeOkSaK5gP3Q6xhw.0Payload parsing failed.


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        24192.168.2.665096172.217.16.2064436836C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-30 22:40:08 UTC1317OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1345
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.134"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIkqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=J6XH-SgDI90U1UYfAIIUKh_T4zdEuIX8LomerwJipfQyAl4utPHinMJDOKMx14EhVech-OEf_YnbqJu1_R2ha7Z-eShMFSi3k0VvyFWZa37rkuAa8jsDfF1ohk2ZDyPpQnhZXu4_19BWMU2oIvdQ2smJ41xaXL36trZYxLFQSkeh9OAYWNz0myiedA
                                                        2024-09-30 22:40:08 UTC1345OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 37 33 36 30 30 36 36 33 30 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[1,0,0,0,0]]],1828,[["1727736006630",null,null,null
                                                        2024-09-30 22:40:08 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Mon, 30 Sep 2024 22:40:08 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-09-30 22:40:08 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-09-30 22:40:08 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        25192.168.2.665097172.217.16.2064436836C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-30 22:40:08 UTC1317OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1302
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.134"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIkqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=J6XH-SgDI90U1UYfAIIUKh_T4zdEuIX8LomerwJipfQyAl4utPHinMJDOKMx14EhVech-OEf_YnbqJu1_R2ha7Z-eShMFSi3k0VvyFWZa37rkuAa8jsDfF1ohk2ZDyPpQnhZXu4_19BWMU2oIvdQ2smJ41xaXL36trZYxLFQSkeh9OAYWNz0myiedA
                                                        2024-09-30 22:40:08 UTC1302OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 37 33 36 30 30 36 37 35 35 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[1,0,0,0,0]]],1828,[["1727736006755",null,null,null
                                                        2024-09-30 22:40:08 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Mon, 30 Sep 2024 22:40:08 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-09-30 22:40:08 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-09-30 22:40:08 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                        26192.168.2.66510040.115.3.253443
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-30 22:40:35 UTC71OUTData Raw: 43 4e 54 20 31 20 43 4f 4e 20 33 30 35 0d 0a 4d 53 2d 43 56 3a 20 6d 63 63 71 69 6a 7a 76 51 45 43 56 55 4b 30 36 2e 31 0d 0a 43 6f 6e 74 65 78 74 3a 20 31 65 61 62 66 37 65 32 34 33 66 64 37 32 34 37 0d 0a 0d 0a
                                                        Data Ascii: CNT 1 CON 305MS-CV: mccqijzvQECVUK06.1Context: 1eabf7e243fd7247
                                                        2024-09-30 22:40:35 UTC249OUTData Raw: 3c 63 6f 6e 6e 65 63 74 3e 3c 76 65 72 3e 32 3c 2f 76 65 72 3e 3c 61 67 65 6e 74 3e 3c 6f 73 3e 57 69 6e 64 6f 77 73 3c 2f 6f 73 3e 3c 6f 73 56 65 72 3e 31 30 2e 30 2e 30 2e 30 2e 31 39 30 34 35 3c 2f 6f 73 56 65 72 3e 3c 70 72 6f 63 3e 78 36 34 3c 2f 70 72 6f 63 3e 3c 6c 63 69 64 3e 65 6e 2d 43 48 3c 2f 6c 63 69 64 3e 3c 67 65 6f 49 64 3e 32 32 33 3c 2f 67 65 6f 49 64 3e 3c 61 6f 61 63 3e 30 3c 2f 61 6f 61 63 3e 3c 64 65 76 69 63 65 54 79 70 65 3e 31 3c 2f 64 65 76 69 63 65 54 79 70 65 3e 3c 64 65 76 69 63 65 4e 61 6d 65 3e 56 4d 77 61 72 65 32 30 2c 31 3c 2f 64 65 76 69 63 65 4e 61 6d 65 3e 3c 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 74 72 75 65 3c 2f 66 6f 6c 6c 6f 77 52 65 74 72 79 3e 3c 2f 61 67 65 6e 74 3e 3c 2f 63 6f 6e 6e 65 63 74 3e
                                                        Data Ascii: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
                                                        2024-09-30 22:40:35 UTC1084OUTData Raw: 41 54 48 20 32 20 43 4f 4e 5c 44 45 56 49 43 45 20 31 30 36 31 0d 0a 4d 53 2d 43 56 3a 20 6d 63 63 71 69 6a 7a 76 51 45 43 56 55 4b 30 36 2e 32 0d 0a 43 6f 6e 74 65 78 74 3a 20 31 65 61 62 66 37 65 32 34 33 66 64 37 32 34 37 0d 0a 0d 0a 3c 64 65 76 69 63 65 3e 3c 63 6f 6d 70 61 63 74 2d 74 69 63 6b 65 74 3e 74 3d 45 77 43 34 41 75 70 49 42 41 41 55 31 62 44 47 66 64 61 7a 69 44 66 58 70 6a 4e 35 4e 36 63 59 68 54 31 77 62 6d 51 41 41 55 51 77 45 77 70 55 58 6e 4a 75 4a 48 61 46 43 46 64 44 4b 71 72 74 7a 61 37 68 65 33 74 46 5a 6a 78 64 61 38 61 2f 46 5a 42 30 2f 2b 50 41 63 47 63 77 4f 45 71 67 4b 6a 49 56 4d 61 57 6a 50 6e 63 65 6e 66 53 72 73 72 46 72 54 51 55 56 71 76 79 70 43 42 6a 35 53 75 4f 62 37 68 4b 36 70 68 70 37 55 58 78 38 37 64 35 6e 67 51
                                                        Data Ascii: ATH 2 CON\DEVICE 1061MS-CV: mccqijzvQECVUK06.2Context: 1eabf7e243fd7247<device><compact-ticket>t=EwC4AupIBAAU1bDGfdaziDfXpjN5N6cYhT1wbmQAAUQwEwpUXnJuJHaFCFdDKqrtza7he3tFZjxda8a/FZB0/+PAcGcwOEqgKjIVMaWjPncenfSrsrFrTQUVqvypCBj5SuOb7hK6php7UXx87d5ngQ
                                                        2024-09-30 22:40:35 UTC218OUTData Raw: 42 4e 44 20 33 20 43 4f 4e 5c 57 4e 53 20 30 20 31 39 37 0d 0a 4d 53 2d 43 56 3a 20 6d 63 63 71 69 6a 7a 76 51 45 43 56 55 4b 30 36 2e 33 0d 0a 43 6f 6e 74 65 78 74 3a 20 31 65 61 62 66 37 65 32 34 33 66 64 37 32 34 37 0d 0a 0d 0a 3c 77 6e 73 3e 3c 76 65 72 3e 31 3c 2f 76 65 72 3e 3c 63 6c 69 65 6e 74 3e 3c 6e 61 6d 65 3e 57 50 4e 3c 2f 6e 61 6d 65 3e 3c 76 65 72 3e 31 2e 30 3c 2f 76 65 72 3e 3c 2f 63 6c 69 65 6e 74 3e 3c 6f 70 74 69 6f 6e 73 3e 3c 70 77 72 6d 6f 64 65 20 6d 6f 64 65 3d 22 30 22 3e 3c 2f 70 77 72 6d 6f 64 65 3e 3c 2f 6f 70 74 69 6f 6e 73 3e 3c 6c 61 73 74 4d 73 67 49 64 3e 30 3c 2f 6c 61 73 74 4d 73 67 49 64 3e 3c 2f 77 6e 73 3e
                                                        Data Ascii: BND 3 CON\WNS 0 197MS-CV: mccqijzvQECVUK06.3Context: 1eabf7e243fd7247<wns><ver>1</ver><client><name>WPN</name><ver>1.0</ver></client><options><pwrmode mode="0"></pwrmode></options><lastMsgId>0</lastMsgId></wns>
                                                        2024-09-30 22:40:35 UTC14INData Raw: 32 30 32 20 31 20 43 4f 4e 20 35 38 0d 0a
                                                        Data Ascii: 202 1 CON 58
                                                        2024-09-30 22:40:35 UTC58INData Raw: 4d 53 2d 43 56 3a 20 66 32 59 65 32 58 38 68 4b 55 4f 62 78 57 66 2b 47 5a 57 44 6a 51 2e 30 0d 0a 0d 0a 50 61 79 6c 6f 61 64 20 70 61 72 73 69 6e 67 20 66 61 69 6c 65 64 2e
                                                        Data Ascii: MS-CV: f2Ye2X8hKUObxWf+GZWDjQ.0Payload parsing failed.


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        27192.168.2.665102172.217.16.2064436836C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-30 22:40:38 UTC1317OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1297
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.134"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIkqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=J6XH-SgDI90U1UYfAIIUKh_T4zdEuIX8LomerwJipfQyAl4utPHinMJDOKMx14EhVech-OEf_YnbqJu1_R2ha7Z-eShMFSi3k0VvyFWZa37rkuAa8jsDfF1ohk2ZDyPpQnhZXu4_19BWMU2oIvdQ2smJ41xaXL36trZYxLFQSkeh9OAYWNz0myiedA
                                                        2024-09-30 22:40:38 UTC1297OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 37 33 36 30 33 37 32 32 34 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[1,0,0,0,0]]],1828,[["1727736037224",null,null,null
                                                        2024-09-30 22:40:39 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Mon, 30 Sep 2024 22:40:39 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-09-30 22:40:39 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-09-30 22:40:39 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        28192.168.2.665101172.217.16.2064436836C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-09-30 22:40:38 UTC1317OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                        Host: play.google.com
                                                        Connection: keep-alive
                                                        Content-Length: 1089
                                                        sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                        sec-ch-ua-mobile: ?0
                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                        sec-ch-ua-arch: "x86"
                                                        Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                        sec-ch-ua-full-version: "117.0.5938.134"
                                                        sec-ch-ua-platform-version: "10.0.0"
                                                        X-Goog-AuthUser: 0
                                                        sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.134", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.134"
                                                        sec-ch-ua-bitness: "64"
                                                        sec-ch-ua-model: ""
                                                        sec-ch-ua-wow64: ?0
                                                        sec-ch-ua-platform: "Windows"
                                                        Accept: */*
                                                        Origin: https://accounts.google.com
                                                        X-Client-Data: CJa2yQEIprbJAQipncoBCO6MywEIkqHLAQj6mM0BCIWgzQEI3L3NAQi5ys0BCOnSzQEI6NXNAQjL1s0BCKjYzQEI+cDUFRi60s0BGOuNpRc=
                                                        Sec-Fetch-Site: same-site
                                                        Sec-Fetch-Mode: cors
                                                        Sec-Fetch-Dest: empty
                                                        Referer: https://accounts.google.com/
                                                        Accept-Encoding: gzip, deflate, br
                                                        Accept-Language: en-US,en;q=0.9
                                                        Cookie: NID=518=J6XH-SgDI90U1UYfAIIUKh_T4zdEuIX8LomerwJipfQyAl4utPHinMJDOKMx14EhVech-OEf_YnbqJu1_R2ha7Z-eShMFSi3k0VvyFWZa37rkuAa8jsDfF1ohk2ZDyPpQnhZXu4_19BWMU2oIvdQ2smJ41xaXL36trZYxLFQSkeh9OAYWNz0myiedA
                                                        2024-09-30 22:40:38 UTC1089OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 34 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 37 33 36 30 33 37 32 32 36 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                        Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.134"],[1,0,0,0,0]]],1828,[["1727736037226",null,null,null
                                                        2024-09-30 22:40:39 UTC523INHTTP/1.1 200 OK
                                                        Access-Control-Allow-Origin: https://accounts.google.com
                                                        Cross-Origin-Resource-Policy: cross-origin
                                                        Access-Control-Allow-Credentials: true
                                                        Access-Control-Allow-Headers: X-Playlog-Web
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Date: Mon, 30 Sep 2024 22:40:39 GMT
                                                        Server: Playlog
                                                        Cache-Control: private
                                                        X-XSS-Protection: 0
                                                        X-Frame-Options: SAMEORIGIN
                                                        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                        Accept-Ranges: none
                                                        Vary: Accept-Encoding
                                                        Connection: close
                                                        Transfer-Encoding: chunked
                                                        2024-09-30 22:40:39 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                        Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                        2024-09-30 22:40:39 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:18:38:54
                                                        Start date:30/09/2024
                                                        Path:C:\Users\user\Desktop\file.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\file.exe"
                                                        Imagebase:0xdb0000
                                                        File size:917'504 bytes
                                                        MD5 hash:50ABA0AA8A80D890EF49C27A76476169
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:2
                                                        Start time:18:38:54
                                                        Start date:30/09/2024
                                                        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --app="https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-features=CrashRecovery
                                                        Imagebase:0x7ff684c40000
                                                        File size:3'242'272 bytes
                                                        MD5 hash:5BBFA6CBDF4C254EB368D534F9E23C92
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:4
                                                        Start time:18:38:55
                                                        Start date:30/09/2024
                                                        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2104 --field-trial-handle=2032,i,7930574530814096516,14453764649597155510,262144 --disable-features=CrashRecovery /prefetch:8
                                                        Imagebase:0x7ff684c40000
                                                        File size:3'242'272 bytes
                                                        MD5 hash:5BBFA6CBDF4C254EB368D534F9E23C92
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:6
                                                        Start time:18:39:05
                                                        Start date:30/09/2024
                                                        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5444 --field-trial-handle=2032,i,7930574530814096516,14453764649597155510,262144 --disable-features=CrashRecovery /prefetch:8
                                                        Imagebase:0x7ff684c40000
                                                        File size:3'242'272 bytes
                                                        MD5 hash:5BBFA6CBDF4C254EB368D534F9E23C92
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:7
                                                        Start time:18:39:05
                                                        Start date:30/09/2024
                                                        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5552 --field-trial-handle=2032,i,7930574530814096516,14453764649597155510,262144 --disable-features=CrashRecovery /prefetch:8
                                                        Imagebase:0x7ff684c40000
                                                        File size:3'242'272 bytes
                                                        MD5 hash:5BBFA6CBDF4C254EB368D534F9E23C92
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:2%
                                                          Dynamic/Decrypted Code Coverage:0%
                                                          Signature Coverage:7.2%
                                                          Total number of Nodes:1485
                                                          Total number of Limit Nodes:50
                                                          execution_graph 94057 db105b 94062 db344d 94057->94062 94059 db106a 94093 dd00a3 29 API calls __onexit 94059->94093 94061 db1074 94063 db345d __wsopen_s 94062->94063 94094 dba961 94063->94094 94067 db351c 94106 db3357 94067->94106 94074 dba961 22 API calls 94075 db354d 94074->94075 94127 dba6c3 94075->94127 94078 df3176 RegQueryValueExW 94079 df320c RegCloseKey 94078->94079 94080 df3193 94078->94080 94082 db3578 94079->94082 94092 df321e _wcslen 94079->94092 94133 dcfe0b 94080->94133 94082->94059 94083 df31ac 94143 db5722 94083->94143 94086 df31d4 94146 db6b57 94086->94146 94087 db4c6d 22 API calls 94087->94092 94089 df31ee messages 94089->94079 94091 db515f 22 API calls 94091->94092 94092->94082 94092->94087 94092->94091 94158 db9cb3 94092->94158 94093->94061 94095 dcfe0b 22 API calls 94094->94095 94096 dba976 94095->94096 94164 dcfddb 94096->94164 94098 db3513 94099 db3a5a 94098->94099 94186 df1f50 94099->94186 94102 db9cb3 22 API calls 94103 db3a8d 94102->94103 94188 db3aa2 94103->94188 94105 db3a97 94105->94067 94107 df1f50 __wsopen_s 94106->94107 94108 db3364 GetFullPathNameW 94107->94108 94109 db3386 94108->94109 94110 db6b57 22 API calls 94109->94110 94111 db33a4 94110->94111 94112 db33c6 94111->94112 94113 df30bb 94112->94113 94114 db33dd 94112->94114 94116 dcfddb 22 API calls 94113->94116 94212 db33ee 94114->94212 94118 df30c5 _wcslen 94116->94118 94117 db33e8 94121 db515f 94117->94121 94119 dcfe0b 22 API calls 94118->94119 94120 df30fe __fread_nolock 94119->94120 94122 db516e 94121->94122 94126 db518f __fread_nolock 94121->94126 94124 dcfe0b 22 API calls 94122->94124 94123 dcfddb 22 API calls 94125 db3544 94123->94125 94124->94126 94125->94074 94126->94123 94128 dba6dd 94127->94128 94129 db3556 RegOpenKeyExW 94127->94129 94130 dcfddb 22 API calls 94128->94130 94129->94078 94129->94082 94131 dba6e7 94130->94131 94132 dcfe0b 22 API calls 94131->94132 94132->94129 94136 dcfddb 94133->94136 94134 ddea0c ___std_exception_copy 21 API calls 94134->94136 94135 dcfdfa 94135->94083 94136->94134 94136->94135 94138 dcfdfc 94136->94138 94227 dd4ead 7 API calls 2 library calls 94136->94227 94142 dd066d 94138->94142 94228 dd32a4 RaiseException 94138->94228 94141 dd068a 94141->94083 94229 dd32a4 RaiseException 94142->94229 94144 dcfddb 22 API calls 94143->94144 94145 db5734 RegQueryValueExW 94144->94145 94145->94086 94145->94089 94147 db6b67 _wcslen 94146->94147 94148 df4ba1 94146->94148 94151 db6b7d 94147->94151 94152 db6ba2 94147->94152 94149 db93b2 22 API calls 94148->94149 94150 df4baa 94149->94150 94150->94150 94230 db6f34 22 API calls 94151->94230 94154 dcfddb 22 API calls 94152->94154 94156 db6bae 94154->94156 94155 db6b85 __fread_nolock 94155->94089 94157 dcfe0b 22 API calls 94156->94157 94157->94155 94159 db9cc2 _wcslen 94158->94159 94160 dcfe0b 22 API calls 94159->94160 94161 db9cea __fread_nolock 94160->94161 94162 dcfddb 22 API calls 94161->94162 94163 db9d00 94162->94163 94163->94092 94167 dcfde0 94164->94167 94166 dcfdfa 94166->94098 94167->94166 94170 dcfdfc 94167->94170 94174 ddea0c 94167->94174 94181 dd4ead 7 API calls 2 library calls 94167->94181 94169 dd066d 94183 dd32a4 RaiseException 94169->94183 94170->94169 94182 dd32a4 RaiseException 94170->94182 94173 dd068a 94173->94098 94176 de3820 pre_c_initialization 94174->94176 94175 de385e 94185 ddf2d9 20 API calls __dosmaperr 94175->94185 94176->94175 94177 de3849 RtlAllocateHeap 94176->94177 94184 dd4ead 7 API calls 2 library calls 94176->94184 94177->94176 94179 de385c 94177->94179 94179->94167 94181->94167 94182->94169 94183->94173 94184->94176 94185->94179 94187 db3a67 GetModuleFileNameW 94186->94187 94187->94102 94189 df1f50 __wsopen_s 94188->94189 94190 db3aaf GetFullPathNameW 94189->94190 94191 db3ae9 94190->94191 94192 db3ace 94190->94192 94193 dba6c3 22 API calls 94191->94193 94194 db6b57 22 API calls 94192->94194 94195 db3ada 94193->94195 94194->94195 94198 db37a0 94195->94198 94199 db37ae 94198->94199 94202 db93b2 94199->94202 94201 db37c2 94201->94105 94203 db93c0 94202->94203 94205 db93c9 __fread_nolock 94202->94205 94203->94205 94206 dbaec9 94203->94206 94205->94201 94207 dbaedc 94206->94207 94211 dbaed9 __fread_nolock 94206->94211 94208 dcfddb 22 API calls 94207->94208 94209 dbaee7 94208->94209 94210 dcfe0b 22 API calls 94209->94210 94210->94211 94211->94205 94213 db33fe _wcslen 94212->94213 94214 df311d 94213->94214 94215 db3411 94213->94215 94216 dcfddb 22 API calls 94214->94216 94222 dba587 94215->94222 94218 df3127 94216->94218 94220 dcfe0b 22 API calls 94218->94220 94219 db341e __fread_nolock 94219->94117 94221 df3157 __fread_nolock 94220->94221 94223 dba59d 94222->94223 94226 dba598 __fread_nolock 94222->94226 94224 dff80f 94223->94224 94225 dcfe0b 22 API calls 94223->94225 94225->94226 94226->94219 94227->94136 94228->94142 94229->94141 94230->94155 94231 e02a00 94245 dbd7b0 messages 94231->94245 94232 dbdb11 PeekMessageW 94232->94245 94233 dbd807 GetInputState 94233->94232 94233->94245 94235 e01cbe TranslateAcceleratorW 94235->94245 94236 dbdb8f PeekMessageW 94236->94245 94237 dbdb73 TranslateMessage DispatchMessageW 94237->94236 94238 dbda04 timeGetTime 94238->94245 94239 dbdbaf Sleep 94253 dbdbc0 94239->94253 94240 e02b74 Sleep 94240->94253 94241 e01dda timeGetTime 94384 dce300 23 API calls 94241->94384 94242 dce551 timeGetTime 94242->94253 94245->94232 94245->94233 94245->94235 94245->94236 94245->94237 94245->94238 94245->94239 94245->94240 94245->94241 94248 dbd9d5 94245->94248 94263 dbdd50 94245->94263 94270 dc1310 94245->94270 94324 dbbf40 94245->94324 94382 dbdfd0 346 API calls 3 library calls 94245->94382 94383 dcedf6 IsDialogMessageW GetClassLongW 94245->94383 94385 e23a2a 23 API calls 94245->94385 94386 dbec40 94245->94386 94410 e2359c 82 API calls __wsopen_s 94245->94410 94246 e02c0b GetExitCodeProcess 94249 e02c21 WaitForSingleObject 94246->94249 94250 e02c37 CloseHandle 94246->94250 94249->94245 94249->94250 94250->94253 94251 e02a31 94251->94248 94252 e429bf GetForegroundWindow 94252->94253 94253->94242 94253->94245 94253->94246 94253->94248 94253->94251 94253->94252 94254 e02ca9 Sleep 94253->94254 94411 e35658 23 API calls 94253->94411 94412 e1e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 94253->94412 94413 e1d4dc CreateToolhelp32Snapshot Process32FirstW 94253->94413 94254->94245 94264 dbdd6f 94263->94264 94265 dbdd83 94263->94265 94423 dbd260 94264->94423 94455 e2359c 82 API calls __wsopen_s 94265->94455 94267 dbdd7a 94267->94245 94269 e02f75 94269->94269 94271 dc1376 94270->94271 94272 dc17b0 94270->94272 94273 e06331 94271->94273 94274 dc1390 94271->94274 94489 dd0242 5 API calls __Init_thread_wait 94272->94489 94494 e3709c 346 API calls 94273->94494 94465 dc1940 94274->94465 94278 dc17ba 94281 dc17fb 94278->94281 94283 db9cb3 22 API calls 94278->94283 94280 e0633d 94280->94245 94285 e06346 94281->94285 94287 dc182c 94281->94287 94282 dc1940 9 API calls 94284 dc13b6 94282->94284 94290 dc17d4 94283->94290 94284->94281 94286 dc13ec 94284->94286 94495 e2359c 82 API calls __wsopen_s 94285->94495 94286->94285 94310 dc1408 __fread_nolock 94286->94310 94491 dbaceb 23 API calls messages 94287->94491 94490 dd01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 94290->94490 94291 dc1839 94492 dcd217 346 API calls 94291->94492 94293 e0636e 94496 e2359c 82 API calls __wsopen_s 94293->94496 94295 dc152f 94297 dc153c 94295->94297 94298 e063d1 94295->94298 94300 dc1940 9 API calls 94297->94300 94498 e35745 54 API calls _wcslen 94298->94498 94301 dc1549 94300->94301 94305 e064fa 94301->94305 94307 dc1940 9 API calls 94301->94307 94302 dcfddb 22 API calls 94302->94310 94303 dc1872 94493 dcfaeb 23 API calls 94303->94493 94304 dcfe0b 22 API calls 94304->94310 94314 e06369 94305->94314 94500 e2359c 82 API calls __wsopen_s 94305->94500 94312 dc1563 94307->94312 94309 dbec40 346 API calls 94309->94310 94310->94291 94310->94293 94310->94295 94310->94302 94310->94304 94310->94309 94311 e063b2 94310->94311 94310->94314 94497 e2359c 82 API calls __wsopen_s 94311->94497 94312->94305 94317 dc15c7 messages 94312->94317 94499 dba8c7 22 API calls __fread_nolock 94312->94499 94314->94245 94316 dc1940 9 API calls 94316->94317 94317->94303 94317->94305 94317->94314 94317->94316 94320 dc167b messages 94317->94320 94475 e3ab67 94317->94475 94478 e3a2ea 94317->94478 94483 e25c5a 94317->94483 94318 dc171d 94318->94245 94320->94318 94488 dcce17 22 API calls messages 94320->94488 94650 dbadf0 94324->94650 94326 dbbf9d 94327 dbbfa9 94326->94327 94328 e004b6 94326->94328 94330 dbc01e 94327->94330 94331 e004c6 94327->94331 94669 e2359c 82 API calls __wsopen_s 94328->94669 94655 dbac91 94330->94655 94670 e2359c 82 API calls __wsopen_s 94331->94670 94335 e17120 22 API calls 94366 dbc039 __fread_nolock messages 94335->94366 94336 dbc7da 94339 dcfe0b 22 API calls 94336->94339 94344 dbc808 __fread_nolock 94339->94344 94341 e004f5 94345 e0055a 94341->94345 94671 dcd217 346 API calls 94341->94671 94347 dcfe0b 22 API calls 94344->94347 94381 dbc603 94345->94381 94672 e2359c 82 API calls __wsopen_s 94345->94672 94346 dbec40 346 API calls 94346->94366 94368 dbc350 __fread_nolock messages 94347->94368 94348 dbaf8a 22 API calls 94348->94366 94349 e0091a 94682 e23209 23 API calls 94349->94682 94352 e008a5 94353 dbec40 346 API calls 94352->94353 94354 e008cf 94353->94354 94354->94381 94680 dba81b 41 API calls 94354->94680 94356 e00591 94673 e2359c 82 API calls __wsopen_s 94356->94673 94360 e008f6 94681 e2359c 82 API calls __wsopen_s 94360->94681 94362 dbc3ac 94362->94245 94364 dbc237 94365 dbc253 94364->94365 94683 dba8c7 22 API calls __fread_nolock 94364->94683 94369 e00976 94365->94369 94374 dbc297 messages 94365->94374 94366->94335 94366->94336 94366->94341 94366->94344 94366->94345 94366->94346 94366->94348 94366->94349 94366->94352 94366->94356 94366->94360 94366->94364 94372 dcfddb 22 API calls 94366->94372 94373 e009bf 94366->94373 94377 dbbbe0 40 API calls 94366->94377 94380 dcfe0b 22 API calls 94366->94380 94366->94381 94659 dbad81 94366->94659 94674 e17099 22 API calls __fread_nolock 94366->94674 94675 e35745 54 API calls _wcslen 94366->94675 94676 dcaa42 22 API calls messages 94366->94676 94677 e1f05c 40 API calls 94366->94677 94678 dba993 41 API calls 94366->94678 94679 dbaceb 23 API calls messages 94366->94679 94368->94362 94668 dcce17 22 API calls messages 94368->94668 94684 dbaceb 23 API calls messages 94369->94684 94372->94366 94373->94381 94685 e2359c 82 API calls __wsopen_s 94373->94685 94374->94373 94666 dbaceb 23 API calls messages 94374->94666 94376 dbc335 94376->94373 94378 dbc342 94376->94378 94377->94366 94667 dba704 22 API calls messages 94378->94667 94380->94366 94381->94245 94382->94245 94383->94245 94384->94245 94385->94245 94408 dbec76 messages 94386->94408 94387 dd0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 94387->94408 94388 dcfddb 22 API calls 94388->94408 94389 dd01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 94389->94408 94390 dbfef7 94403 dbed9d messages 94390->94403 94698 dba8c7 22 API calls __fread_nolock 94390->94698 94393 e04600 94393->94403 94697 dba8c7 22 API calls __fread_nolock 94393->94697 94394 e04b0b 94700 e2359c 82 API calls __wsopen_s 94394->94700 94398 dba8c7 22 API calls 94398->94408 94401 dbfbe3 94401->94403 94404 e04bdc 94401->94404 94409 dbf3ae messages 94401->94409 94402 dba961 22 API calls 94402->94408 94403->94245 94701 e2359c 82 API calls __wsopen_s 94404->94701 94405 dd00a3 29 API calls pre_c_initialization 94405->94408 94407 e04beb 94702 e2359c 82 API calls __wsopen_s 94407->94702 94408->94387 94408->94388 94408->94389 94408->94390 94408->94393 94408->94394 94408->94398 94408->94401 94408->94402 94408->94403 94408->94405 94408->94407 94408->94409 94695 dc01e0 346 API calls 2 library calls 94408->94695 94696 dc06a0 41 API calls messages 94408->94696 94409->94403 94699 e2359c 82 API calls __wsopen_s 94409->94699 94410->94245 94411->94253 94412->94253 94703 e1def7 94413->94703 94415 e1d529 Process32NextW 94416 e1d5db CloseHandle 94415->94416 94422 e1d522 94415->94422 94416->94253 94417 dba961 22 API calls 94417->94422 94418 db9cb3 22 API calls 94418->94422 94422->94415 94422->94416 94422->94417 94422->94418 94709 db525f 22 API calls 94422->94709 94710 db6350 22 API calls 94422->94710 94711 dcce60 41 API calls 94422->94711 94424 dbec40 346 API calls 94423->94424 94442 dbd29d 94424->94442 94425 e01bc4 94464 e2359c 82 API calls __wsopen_s 94425->94464 94427 dbd30b messages 94427->94267 94428 dbd6d5 94428->94427 94438 dcfe0b 22 API calls 94428->94438 94429 dbd3c3 94429->94428 94431 dbd3ce 94429->94431 94430 dbd5ff 94432 e01bb5 94430->94432 94433 dbd614 94430->94433 94435 dcfddb 22 API calls 94431->94435 94463 e35705 23 API calls 94432->94463 94437 dcfddb 22 API calls 94433->94437 94434 dbd4b8 94439 dcfe0b 22 API calls 94434->94439 94443 dbd3d5 __fread_nolock 94435->94443 94447 dbd46a 94437->94447 94438->94443 94450 dbd429 __fread_nolock messages 94439->94450 94440 dcfddb 22 API calls 94441 dbd3f6 94440->94441 94441->94450 94456 dbbec0 346 API calls 94441->94456 94442->94425 94442->94427 94442->94428 94442->94429 94442->94434 94444 dcfddb 22 API calls 94442->94444 94442->94450 94443->94440 94443->94441 94444->94442 94446 e01ba4 94462 e2359c 82 API calls __wsopen_s 94446->94462 94447->94267 94450->94430 94450->94446 94450->94447 94451 e01b7f 94450->94451 94453 e01b5d 94450->94453 94457 db1f6f 94450->94457 94461 e2359c 82 API calls __wsopen_s 94451->94461 94460 e2359c 82 API calls __wsopen_s 94453->94460 94455->94269 94456->94450 94458 dbec40 346 API calls 94457->94458 94459 db1f98 94458->94459 94459->94450 94460->94447 94461->94447 94462->94447 94463->94425 94464->94427 94466 dc195d 94465->94466 94467 dc1981 94465->94467 94474 dc13a0 94466->94474 94503 dd0242 5 API calls __Init_thread_wait 94466->94503 94501 dd0242 5 API calls __Init_thread_wait 94467->94501 94470 dc198b 94470->94466 94502 dd01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 94470->94502 94471 dc8727 94471->94474 94504 dd01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 94471->94504 94474->94282 94505 e3aff9 94475->94505 94479 db7510 53 API calls 94478->94479 94480 e3a306 94479->94480 94481 e1d4dc 47 API calls 94480->94481 94482 e3a315 94481->94482 94482->94317 94484 db7510 53 API calls 94483->94484 94485 e25c6d 94484->94485 94645 e1dbbe lstrlenW 94485->94645 94487 e25c77 94487->94317 94488->94320 94489->94278 94490->94281 94491->94291 94492->94303 94493->94303 94494->94280 94495->94314 94496->94314 94497->94314 94498->94312 94499->94317 94500->94314 94501->94470 94502->94466 94503->94471 94504->94474 94506 e3b01d ___scrt_fastfail 94505->94506 94507 e3b094 94506->94507 94508 e3b058 94506->94508 94513 e3b08b 94507->94513 94626 dbb567 39 API calls 94507->94626 94623 dbb567 39 API calls 94508->94623 94510 e3b0ed 94596 db7510 94510->94596 94512 e3b063 94512->94513 94624 dbb567 39 API calls 94512->94624 94513->94510 94628 dbb567 39 API calls 94513->94628 94515 e3b0a5 94627 dbb567 39 API calls 94515->94627 94520 e3b078 94625 dbb567 39 API calls 94520->94625 94523 e3b115 94524 e3b1d8 94523->94524 94525 e3b11f 94523->94525 94526 e3b20a GetCurrentDirectoryW 94524->94526 94528 db7510 53 API calls 94524->94528 94527 db7510 53 API calls 94525->94527 94529 dcfe0b 22 API calls 94526->94529 94530 e3b130 94527->94530 94531 e3b1ef 94528->94531 94532 e3b22f GetCurrentDirectoryW 94529->94532 94533 db7620 22 API calls 94530->94533 94534 db7620 22 API calls 94531->94534 94535 e3b23c 94532->94535 94536 e3b13a 94533->94536 94537 e3b1f9 _wcslen 94534->94537 94539 e3b275 94535->94539 94629 db9c6e 22 API calls 94535->94629 94538 db7510 53 API calls 94536->94538 94537->94526 94537->94539 94540 e3b14b 94538->94540 94547 e3b287 94539->94547 94548 e3b28b 94539->94548 94542 db7620 22 API calls 94540->94542 94544 e3b155 94542->94544 94543 e3b255 94630 db9c6e 22 API calls 94543->94630 94546 db7510 53 API calls 94544->94546 94550 e3b166 94546->94550 94552 e3b39a CreateProcessW 94547->94552 94553 e3b2f8 94547->94553 94632 e207c0 10 API calls 94548->94632 94549 e3b265 94631 db9c6e 22 API calls 94549->94631 94555 db7620 22 API calls 94550->94555 94595 e3b32f _wcslen 94552->94595 94635 e111c8 39 API calls 94553->94635 94558 e3b170 94555->94558 94556 e3b294 94633 e206e6 10 API calls 94556->94633 94561 e3b1a6 GetSystemDirectoryW 94558->94561 94565 db7510 53 API calls 94558->94565 94560 e3b2fd 94563 e3b323 94560->94563 94564 e3b32a 94560->94564 94567 dcfe0b 22 API calls 94561->94567 94562 e3b2aa 94634 e205a7 8 API calls 94562->94634 94636 e11201 128 API calls 2 library calls 94563->94636 94637 e114ce 6 API calls 94564->94637 94570 e3b187 94565->94570 94568 e3b1cb GetSystemDirectoryW 94567->94568 94568->94535 94574 db7620 22 API calls 94570->94574 94572 e3b2d0 94572->94547 94573 e3b328 94573->94595 94577 e3b191 _wcslen 94574->94577 94575 e3b3d6 GetLastError 94587 e3b41a 94575->94587 94576 e3b42f CloseHandle 94578 e3b43f 94576->94578 94588 e3b49a 94576->94588 94577->94535 94577->94561 94580 e3b451 94578->94580 94581 e3b446 CloseHandle 94578->94581 94582 e3b463 94580->94582 94583 e3b458 CloseHandle 94580->94583 94581->94580 94585 e3b475 94582->94585 94586 e3b46a CloseHandle 94582->94586 94583->94582 94584 e3b4a6 94584->94587 94638 e209d9 34 API calls 94585->94638 94586->94585 94640 e20175 6 API calls 94587->94640 94588->94584 94593 e3b4d2 CloseHandle 94588->94593 94591 e3ab79 94591->94317 94592 e3b486 94639 e3b536 25 API calls 94592->94639 94593->94587 94595->94575 94595->94576 94597 db7522 94596->94597 94598 db7525 94596->94598 94619 db7620 94597->94619 94599 db755b 94598->94599 94600 db752d 94598->94600 94602 df50f6 94599->94602 94605 db756d 94599->94605 94610 df500f 94599->94610 94641 dd51c6 26 API calls 94600->94641 94644 dd5183 26 API calls 94602->94644 94603 db753d 94609 dcfddb 22 API calls 94603->94609 94642 dcfb21 51 API calls 94605->94642 94607 df510e 94607->94607 94611 db7547 94609->94611 94613 dcfe0b 22 API calls 94610->94613 94614 df5088 94610->94614 94612 db9cb3 22 API calls 94611->94612 94612->94597 94616 df5058 94613->94616 94643 dcfb21 51 API calls 94614->94643 94615 dcfddb 22 API calls 94617 df507f 94615->94617 94616->94615 94618 db9cb3 22 API calls 94617->94618 94618->94614 94620 db762a _wcslen 94619->94620 94621 dcfe0b 22 API calls 94620->94621 94622 db763f 94621->94622 94622->94523 94623->94512 94624->94520 94625->94513 94626->94515 94627->94513 94628->94510 94629->94543 94630->94549 94631->94539 94632->94556 94633->94562 94634->94572 94635->94560 94636->94573 94637->94595 94638->94592 94639->94588 94640->94591 94641->94603 94642->94603 94643->94602 94644->94607 94646 e1dc06 94645->94646 94647 e1dbdc GetFileAttributesW 94645->94647 94646->94487 94647->94646 94648 e1dbe8 FindFirstFileW 94647->94648 94648->94646 94649 e1dbf9 FindClose 94648->94649 94649->94646 94651 dbae01 94650->94651 94654 dbae1c messages 94650->94654 94652 dbaec9 22 API calls 94651->94652 94653 dbae09 CharUpperBuffW 94652->94653 94653->94654 94654->94326 94656 dbacae 94655->94656 94657 dbacd1 94656->94657 94686 e2359c 82 API calls __wsopen_s 94656->94686 94657->94366 94660 dffadb 94659->94660 94661 dbad92 94659->94661 94662 dcfddb 22 API calls 94661->94662 94663 dbad99 94662->94663 94687 dbadcd 94663->94687 94666->94376 94667->94368 94668->94368 94669->94331 94670->94381 94671->94345 94672->94381 94673->94381 94674->94366 94675->94366 94676->94366 94677->94366 94678->94366 94679->94366 94680->94360 94681->94381 94682->94364 94683->94365 94684->94373 94685->94381 94686->94657 94691 dbaddd 94687->94691 94688 dbadb6 94688->94366 94689 dcfddb 22 API calls 94689->94691 94690 dba961 22 API calls 94690->94691 94691->94688 94691->94689 94691->94690 94693 dbadcd 22 API calls 94691->94693 94694 dba8c7 22 API calls __fread_nolock 94691->94694 94693->94691 94694->94691 94695->94408 94696->94408 94697->94403 94698->94403 94699->94403 94700->94403 94701->94407 94702->94403 94704 e1df02 94703->94704 94705 e1df19 94704->94705 94708 e1df1f 94704->94708 94712 dd63b2 GetStringTypeW _strftime 94704->94712 94713 dd62fb 39 API calls _strftime 94705->94713 94708->94422 94709->94422 94710->94422 94711->94422 94712->94704 94713->94708 94714 db1098 94719 db42de 94714->94719 94718 db10a7 94720 dba961 22 API calls 94719->94720 94721 db42f5 GetVersionExW 94720->94721 94722 db6b57 22 API calls 94721->94722 94723 db4342 94722->94723 94724 db93b2 22 API calls 94723->94724 94734 db4378 94723->94734 94725 db436c 94724->94725 94727 db37a0 22 API calls 94725->94727 94726 db441b GetCurrentProcess IsWow64Process 94728 db4437 94726->94728 94727->94734 94729 db444f LoadLibraryA 94728->94729 94730 df3824 GetSystemInfo 94728->94730 94731 db449c GetSystemInfo 94729->94731 94732 db4460 GetProcAddress 94729->94732 94733 db4476 94731->94733 94732->94731 94736 db4470 GetNativeSystemInfo 94732->94736 94737 db447a FreeLibrary 94733->94737 94738 db109d 94733->94738 94734->94726 94735 df37df 94734->94735 94736->94733 94737->94738 94739 dd00a3 29 API calls __onexit 94738->94739 94739->94718 94740 dbf7bf 94741 dbf7d3 94740->94741 94742 dbfcb6 94740->94742 94743 dbfcc2 94741->94743 94745 dcfddb 22 API calls 94741->94745 94777 dbaceb 23 API calls messages 94742->94777 94778 dbaceb 23 API calls messages 94743->94778 94747 dbf7e5 94745->94747 94747->94743 94748 dbf83e 94747->94748 94749 dbfd3d 94747->94749 94751 dc1310 346 API calls 94748->94751 94766 dbed9d messages 94748->94766 94779 e21155 22 API calls 94749->94779 94768 dbec76 messages 94751->94768 94752 dcfddb 22 API calls 94752->94768 94753 dbfef7 94753->94766 94781 dba8c7 22 API calls __fread_nolock 94753->94781 94756 e04600 94756->94766 94780 dba8c7 22 API calls __fread_nolock 94756->94780 94757 e04b0b 94783 e2359c 82 API calls __wsopen_s 94757->94783 94761 dba8c7 22 API calls 94761->94768 94764 dbfbe3 94764->94766 94767 e04bdc 94764->94767 94770 dbf3ae messages 94764->94770 94765 dba961 22 API calls 94765->94768 94784 e2359c 82 API calls __wsopen_s 94767->94784 94768->94752 94768->94753 94768->94756 94768->94757 94768->94761 94768->94764 94768->94765 94768->94766 94769 dd00a3 29 API calls pre_c_initialization 94768->94769 94768->94770 94772 dd0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 94768->94772 94773 e04beb 94768->94773 94774 dd01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 94768->94774 94775 dc01e0 346 API calls 2 library calls 94768->94775 94776 dc06a0 41 API calls messages 94768->94776 94769->94768 94770->94766 94782 e2359c 82 API calls __wsopen_s 94770->94782 94772->94768 94785 e2359c 82 API calls __wsopen_s 94773->94785 94774->94768 94775->94768 94776->94768 94777->94743 94778->94749 94779->94766 94780->94766 94781->94766 94782->94766 94783->94766 94784->94773 94785->94766 94786 dd03fb 94787 dd0407 __FrameHandler3::FrameUnwindToState 94786->94787 94815 dcfeb1 94787->94815 94789 dd0561 94845 dd083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 94789->94845 94791 dd040e 94791->94789 94793 dd0438 94791->94793 94792 dd0568 94838 dd4e52 94792->94838 94804 dd0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 94793->94804 94826 de247d 94793->94826 94800 dd0457 94802 dd04d8 94834 dd0959 94802->94834 94804->94802 94841 dd4e1a 38 API calls 2 library calls 94804->94841 94806 dd04de 94807 dd04f3 94806->94807 94842 dd0992 GetModuleHandleW 94807->94842 94809 dd04fa 94809->94792 94810 dd04fe 94809->94810 94811 dd0507 94810->94811 94843 dd4df5 28 API calls _abort 94810->94843 94844 dd0040 13 API calls 2 library calls 94811->94844 94814 dd050f 94814->94800 94816 dcfeba 94815->94816 94847 dd0698 IsProcessorFeaturePresent 94816->94847 94818 dcfec6 94848 dd2c94 10 API calls 3 library calls 94818->94848 94820 dcfecb 94825 dcfecf 94820->94825 94849 de2317 94820->94849 94823 dcfee6 94823->94791 94825->94791 94828 de2494 94826->94828 94827 dd0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 94829 dd0451 94827->94829 94828->94827 94829->94800 94830 de2421 94829->94830 94831 de2450 94830->94831 94832 dd0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 94831->94832 94833 de2479 94832->94833 94833->94804 94924 dd2340 94834->94924 94837 dd097f 94837->94806 94926 dd4bcf 94838->94926 94841->94802 94842->94809 94843->94811 94844->94814 94845->94792 94847->94818 94848->94820 94853 ded1f6 94849->94853 94852 dd2cbd 8 API calls 3 library calls 94852->94825 94856 ded213 94853->94856 94857 ded20f 94853->94857 94855 dcfed8 94855->94823 94855->94852 94856->94857 94859 de4bfb 94856->94859 94871 dd0a8c 94857->94871 94860 de4c07 __FrameHandler3::FrameUnwindToState 94859->94860 94878 de2f5e EnterCriticalSection 94860->94878 94862 de4c0e 94879 de50af 94862->94879 94864 de4c1d 94870 de4c2c 94864->94870 94892 de4a8f 29 API calls 94864->94892 94867 de4c27 94893 de4b45 GetStdHandle GetFileType 94867->94893 94869 de4c3d __wsopen_s 94869->94856 94894 de4c48 LeaveCriticalSection _abort 94870->94894 94872 dd0a95 94871->94872 94873 dd0a97 IsProcessorFeaturePresent 94871->94873 94872->94855 94875 dd0c5d 94873->94875 94923 dd0c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 94875->94923 94877 dd0d40 94877->94855 94878->94862 94880 de50bb __FrameHandler3::FrameUnwindToState 94879->94880 94881 de50df 94880->94881 94882 de50c8 94880->94882 94895 de2f5e EnterCriticalSection 94881->94895 94903 ddf2d9 20 API calls __dosmaperr 94882->94903 94885 de50eb 94891 de5117 94885->94891 94896 de5000 94885->94896 94886 de50cd 94904 de27ec 26 API calls __wsopen_s 94886->94904 94890 de50d7 __wsopen_s 94890->94864 94905 de513e LeaveCriticalSection _abort 94891->94905 94892->94867 94893->94870 94894->94869 94895->94885 94906 de4c7d 94896->94906 94898 de5012 94902 de501f 94898->94902 94913 de3405 11 API calls 2 library calls 94898->94913 94900 de5071 94900->94885 94914 de29c8 94902->94914 94903->94886 94904->94890 94905->94890 94911 de4c8a pre_c_initialization 94906->94911 94907 de4cca 94921 ddf2d9 20 API calls __dosmaperr 94907->94921 94908 de4cb5 RtlAllocateHeap 94910 de4cc8 94908->94910 94908->94911 94910->94898 94911->94907 94911->94908 94920 dd4ead 7 API calls 2 library calls 94911->94920 94913->94898 94915 de29d3 RtlFreeHeap 94914->94915 94916 de29fc __dosmaperr 94914->94916 94915->94916 94917 de29e8 94915->94917 94916->94900 94922 ddf2d9 20 API calls __dosmaperr 94917->94922 94919 de29ee GetLastError 94919->94916 94920->94911 94921->94910 94922->94919 94923->94877 94925 dd096c GetStartupInfoW 94924->94925 94925->94837 94927 dd4bdb _abort 94926->94927 94928 dd4bf4 94927->94928 94929 dd4be2 94927->94929 94950 de2f5e EnterCriticalSection 94928->94950 94965 dd4d29 GetModuleHandleW 94929->94965 94932 dd4be7 94932->94928 94966 dd4d6d GetModuleHandleExW 94932->94966 94933 dd4bfb 94937 dd4c70 94933->94937 94949 dd4c99 94933->94949 94951 de21a8 94933->94951 94941 dd4c88 94937->94941 94945 de2421 _abort 5 API calls 94937->94945 94939 dd4cb6 94957 dd4ce8 94939->94957 94940 dd4ce2 94974 df1d29 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 94940->94974 94946 de2421 _abort 5 API calls 94941->94946 94945->94941 94946->94949 94954 dd4cd9 94949->94954 94950->94933 94975 de1ee1 94951->94975 94994 de2fa6 LeaveCriticalSection 94954->94994 94956 dd4cb2 94956->94939 94956->94940 94995 de360c 94957->94995 94960 dd4d16 94962 dd4d6d _abort 8 API calls 94960->94962 94961 dd4cf6 GetPEB 94961->94960 94963 dd4d06 GetCurrentProcess TerminateProcess 94961->94963 94964 dd4d1e ExitProcess 94962->94964 94963->94960 94965->94932 94967 dd4dba 94966->94967 94968 dd4d97 GetProcAddress 94966->94968 94970 dd4dc9 94967->94970 94971 dd4dc0 FreeLibrary 94967->94971 94969 dd4dac 94968->94969 94969->94967 94972 dd0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 94970->94972 94971->94970 94973 dd4bf3 94972->94973 94973->94928 94978 de1e90 94975->94978 94977 de1f05 94977->94937 94979 de1e9c __FrameHandler3::FrameUnwindToState 94978->94979 94986 de2f5e EnterCriticalSection 94979->94986 94981 de1eaa 94987 de1f31 94981->94987 94985 de1ec8 __wsopen_s 94985->94977 94986->94981 94988 de1f51 94987->94988 94991 de1f59 94987->94991 94989 dd0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 94988->94989 94990 de1eb7 94989->94990 94993 de1ed5 LeaveCriticalSection _abort 94990->94993 94991->94988 94992 de29c8 _free 20 API calls 94991->94992 94992->94988 94993->94985 94994->94956 94996 de3627 94995->94996 94997 de3631 94995->94997 94999 dd0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 94996->94999 95002 de2fd7 5 API calls 2 library calls 94997->95002 95001 dd4cf2 94999->95001 95000 de3648 95000->94996 95001->94960 95001->94961 95002->95000 95003 dbdefc 95006 db1d6f 95003->95006 95005 dbdf07 95007 db1d8c 95006->95007 95008 db1f6f 346 API calls 95007->95008 95009 db1da6 95008->95009 95010 df2759 95009->95010 95012 db1dc2 95009->95012 95013 db1e36 95009->95013 95016 e2359c 82 API calls __wsopen_s 95010->95016 95012->95013 95015 db289a 23 API calls 95012->95015 95013->95005 95015->95013 95016->95013 95017 db1033 95022 db4c91 95017->95022 95021 db1042 95023 dba961 22 API calls 95022->95023 95024 db4cff 95023->95024 95030 db3af0 95024->95030 95027 db4d9c 95028 db1038 95027->95028 95033 db51f7 22 API calls __fread_nolock 95027->95033 95029 dd00a3 29 API calls __onexit 95028->95029 95029->95021 95034 db3b1c 95030->95034 95033->95027 95035 db3b0f 95034->95035 95036 db3b29 95034->95036 95035->95027 95036->95035 95037 db3b30 RegOpenKeyExW 95036->95037 95037->95035 95038 db3b4a RegQueryValueExW 95037->95038 95039 db3b6b 95038->95039 95040 db3b80 RegCloseKey 95038->95040 95039->95040 95040->95035 95041 db2e37 95042 dba961 22 API calls 95041->95042 95043 db2e4d 95042->95043 95120 db4ae3 95043->95120 95045 db2e6b 95046 db3a5a 24 API calls 95045->95046 95047 db2e7f 95046->95047 95048 db9cb3 22 API calls 95047->95048 95049 db2e8c 95048->95049 95134 db4ecb 95049->95134 95052 db2ead 95156 dba8c7 22 API calls __fread_nolock 95052->95156 95053 df2cb0 95174 e22cf9 95053->95174 95055 df2cc3 95056 df2ccf 95055->95056 95200 db4f39 95055->95200 95062 db4f39 68 API calls 95056->95062 95059 db2ec3 95157 db6f88 22 API calls 95059->95157 95061 db2ecf 95063 db9cb3 22 API calls 95061->95063 95064 df2ce5 95062->95064 95065 db2edc 95063->95065 95206 db3084 22 API calls 95064->95206 95158 dba81b 41 API calls 95065->95158 95068 db2eec 95070 db9cb3 22 API calls 95068->95070 95069 df2d02 95207 db3084 22 API calls 95069->95207 95072 db2f12 95070->95072 95159 dba81b 41 API calls 95072->95159 95073 df2d1e 95075 db3a5a 24 API calls 95073->95075 95076 df2d44 95075->95076 95208 db3084 22 API calls 95076->95208 95077 db2f21 95079 dba961 22 API calls 95077->95079 95081 db2f3f 95079->95081 95080 df2d50 95209 dba8c7 22 API calls __fread_nolock 95080->95209 95160 db3084 22 API calls 95081->95160 95084 df2d5e 95210 db3084 22 API calls 95084->95210 95085 db2f4b 95161 dd4a28 40 API calls 3 library calls 95085->95161 95088 df2d6d 95211 dba8c7 22 API calls __fread_nolock 95088->95211 95089 db2f59 95089->95064 95090 db2f63 95089->95090 95162 dd4a28 40 API calls 3 library calls 95090->95162 95093 df2d83 95212 db3084 22 API calls 95093->95212 95094 db2f6e 95094->95069 95096 db2f78 95094->95096 95163 dd4a28 40 API calls 3 library calls 95096->95163 95097 df2d90 95099 db2f83 95099->95073 95100 db2f8d 95099->95100 95164 dd4a28 40 API calls 3 library calls 95100->95164 95102 db2f98 95103 db2fdc 95102->95103 95165 db3084 22 API calls 95102->95165 95103->95088 95104 db2fe8 95103->95104 95104->95097 95168 db63eb 22 API calls 95104->95168 95106 db2fbf 95166 dba8c7 22 API calls __fread_nolock 95106->95166 95109 db2ff8 95169 db6a50 22 API calls 95109->95169 95110 db2fcd 95167 db3084 22 API calls 95110->95167 95113 db3006 95170 db70b0 23 API calls 95113->95170 95117 db3021 95118 db3065 95117->95118 95171 db6f88 22 API calls 95117->95171 95172 db70b0 23 API calls 95117->95172 95173 db3084 22 API calls 95117->95173 95121 db4af0 __wsopen_s 95120->95121 95122 db6b57 22 API calls 95121->95122 95123 db4b22 95121->95123 95122->95123 95133 db4b58 95123->95133 95213 db4c6d 95123->95213 95125 db9cb3 22 API calls 95126 db4c52 95125->95126 95128 db515f 22 API calls 95126->95128 95127 db9cb3 22 API calls 95127->95133 95131 db4c5e 95128->95131 95129 db4c6d 22 API calls 95129->95133 95130 db515f 22 API calls 95130->95133 95131->95045 95132 db4c29 95132->95125 95132->95131 95133->95127 95133->95129 95133->95130 95133->95132 95216 db4e90 LoadLibraryA 95134->95216 95139 df3ccf 95141 db4f39 68 API calls 95139->95141 95140 db4ef6 LoadLibraryExW 95224 db4e59 LoadLibraryA 95140->95224 95143 df3cd6 95141->95143 95145 db4e59 3 API calls 95143->95145 95147 df3cde 95145->95147 95246 db50f5 95147->95246 95148 db4f20 95148->95147 95149 db4f2c 95148->95149 95151 db4f39 68 API calls 95149->95151 95153 db2ea5 95151->95153 95153->95052 95153->95053 95155 df3d05 95156->95059 95157->95061 95158->95068 95159->95077 95160->95085 95161->95089 95162->95094 95163->95099 95164->95102 95165->95106 95166->95110 95167->95103 95168->95109 95169->95113 95170->95117 95171->95117 95172->95117 95173->95117 95175 e22d15 95174->95175 95176 db511f 64 API calls 95175->95176 95177 e22d29 95176->95177 95377 e22e66 95177->95377 95180 db50f5 40 API calls 95181 e22d56 95180->95181 95182 db50f5 40 API calls 95181->95182 95183 e22d66 95182->95183 95184 db50f5 40 API calls 95183->95184 95185 e22d81 95184->95185 95186 db50f5 40 API calls 95185->95186 95187 e22d9c 95186->95187 95188 db511f 64 API calls 95187->95188 95189 e22db3 95188->95189 95190 ddea0c ___std_exception_copy 21 API calls 95189->95190 95191 e22dba 95190->95191 95192 ddea0c ___std_exception_copy 21 API calls 95191->95192 95193 e22dc4 95192->95193 95194 db50f5 40 API calls 95193->95194 95195 e22dd8 95194->95195 95196 e228fe 27 API calls 95195->95196 95197 e22dee 95196->95197 95198 e22d3f 95197->95198 95383 e222ce 79 API calls 95197->95383 95198->95055 95201 db4f43 95200->95201 95203 db4f4a 95200->95203 95384 dde678 95201->95384 95204 db4f6a FreeLibrary 95203->95204 95205 db4f59 95203->95205 95204->95205 95205->95056 95206->95069 95207->95073 95208->95080 95209->95084 95210->95088 95211->95093 95212->95097 95214 dbaec9 22 API calls 95213->95214 95215 db4c78 95214->95215 95215->95123 95217 db4ea8 GetProcAddress 95216->95217 95218 db4ec6 95216->95218 95219 db4eb8 95217->95219 95221 dde5eb 95218->95221 95219->95218 95220 db4ebf FreeLibrary 95219->95220 95220->95218 95254 dde52a 95221->95254 95223 db4eea 95223->95139 95223->95140 95225 db4e6e GetProcAddress 95224->95225 95226 db4e8d 95224->95226 95227 db4e7e 95225->95227 95229 db4f80 95226->95229 95227->95226 95228 db4e86 FreeLibrary 95227->95228 95228->95226 95230 dcfe0b 22 API calls 95229->95230 95231 db4f95 95230->95231 95232 db5722 22 API calls 95231->95232 95233 db4fa1 __fread_nolock 95232->95233 95234 db4fdc 95233->95234 95235 df3d1d 95233->95235 95236 db50a5 95233->95236 95239 db50f5 40 API calls 95234->95239 95240 df3d22 95234->95240 95245 db506e messages 95234->95245 95312 db511f 95234->95312 95317 e2304d 74 API calls 95235->95317 95306 db42a2 CreateStreamOnHGlobal 95236->95306 95239->95234 95241 db511f 64 API calls 95240->95241 95242 df3d45 95241->95242 95243 db50f5 40 API calls 95242->95243 95243->95245 95245->95148 95247 db5107 95246->95247 95248 df3d70 95246->95248 95339 dde8c4 95247->95339 95251 e228fe 95360 e2274e 95251->95360 95253 e22919 95253->95155 95256 dde536 __FrameHandler3::FrameUnwindToState 95254->95256 95255 dde544 95279 ddf2d9 20 API calls __dosmaperr 95255->95279 95256->95255 95258 dde574 95256->95258 95260 dde579 95258->95260 95261 dde586 95258->95261 95259 dde549 95280 de27ec 26 API calls __wsopen_s 95259->95280 95281 ddf2d9 20 API calls __dosmaperr 95260->95281 95271 de8061 95261->95271 95265 dde58f 95266 dde595 95265->95266 95267 dde5a2 95265->95267 95282 ddf2d9 20 API calls __dosmaperr 95266->95282 95283 dde5d4 LeaveCriticalSection __fread_nolock 95267->95283 95268 dde554 __wsopen_s 95268->95223 95272 de806d __FrameHandler3::FrameUnwindToState 95271->95272 95284 de2f5e EnterCriticalSection 95272->95284 95274 de807b 95285 de80fb 95274->95285 95278 de80ac __wsopen_s 95278->95265 95279->95259 95280->95268 95281->95268 95282->95268 95283->95268 95284->95274 95288 de811e 95285->95288 95286 de8177 95287 de4c7d pre_c_initialization 20 API calls 95286->95287 95289 de8180 95287->95289 95288->95286 95294 de8088 95288->95294 95301 dd918d EnterCriticalSection 95288->95301 95302 dd91a1 LeaveCriticalSection 95288->95302 95291 de29c8 _free 20 API calls 95289->95291 95292 de8189 95291->95292 95292->95294 95303 de3405 11 API calls 2 library calls 95292->95303 95298 de80b7 95294->95298 95295 de81a8 95304 dd918d EnterCriticalSection 95295->95304 95305 de2fa6 LeaveCriticalSection 95298->95305 95300 de80be 95300->95278 95301->95288 95302->95288 95303->95295 95304->95294 95305->95300 95307 db42bc FindResourceExW 95306->95307 95311 db42d9 95306->95311 95308 df35ba LoadResource 95307->95308 95307->95311 95309 df35cf SizeofResource 95308->95309 95308->95311 95310 df35e3 LockResource 95309->95310 95309->95311 95310->95311 95311->95234 95313 db512e 95312->95313 95314 df3d90 95312->95314 95318 ddece3 95313->95318 95317->95240 95321 ddeaaa 95318->95321 95320 db513c 95320->95234 95323 ddeab6 __FrameHandler3::FrameUnwindToState 95321->95323 95322 ddeac2 95334 ddf2d9 20 API calls __dosmaperr 95322->95334 95323->95322 95324 ddeae8 95323->95324 95336 dd918d EnterCriticalSection 95324->95336 95327 ddeac7 95335 de27ec 26 API calls __wsopen_s 95327->95335 95328 ddeaf4 95337 ddec0a 62 API calls 2 library calls 95328->95337 95331 ddeb08 95338 ddeb27 LeaveCriticalSection __fread_nolock 95331->95338 95333 ddead2 __wsopen_s 95333->95320 95334->95327 95335->95333 95336->95328 95337->95331 95338->95333 95342 dde8e1 95339->95342 95341 db5118 95341->95251 95343 dde8ed __FrameHandler3::FrameUnwindToState 95342->95343 95344 dde925 __wsopen_s 95343->95344 95345 dde92d 95343->95345 95346 dde900 ___scrt_fastfail 95343->95346 95344->95341 95357 dd918d EnterCriticalSection 95345->95357 95355 ddf2d9 20 API calls __dosmaperr 95346->95355 95349 dde937 95358 dde6f8 38 API calls 4 library calls 95349->95358 95350 dde91a 95356 de27ec 26 API calls __wsopen_s 95350->95356 95353 dde94e 95359 dde96c LeaveCriticalSection __fread_nolock 95353->95359 95355->95350 95356->95344 95357->95349 95358->95353 95359->95344 95363 dde4e8 95360->95363 95362 e2275d 95362->95253 95366 dde469 95363->95366 95365 dde505 95365->95362 95367 dde48c 95366->95367 95368 dde478 95366->95368 95373 dde488 __alldvrm 95367->95373 95376 de333f 11 API calls 2 library calls 95367->95376 95374 ddf2d9 20 API calls __dosmaperr 95368->95374 95370 dde47d 95375 de27ec 26 API calls __wsopen_s 95370->95375 95373->95365 95374->95370 95375->95373 95376->95373 95378 e22e7a 95377->95378 95379 db50f5 40 API calls 95378->95379 95380 e22d3b 95378->95380 95381 e228fe 27 API calls 95378->95381 95382 db511f 64 API calls 95378->95382 95379->95378 95380->95180 95380->95198 95381->95378 95382->95378 95383->95198 95385 dde684 __FrameHandler3::FrameUnwindToState 95384->95385 95386 dde6aa 95385->95386 95387 dde695 95385->95387 95396 dde6a5 __wsopen_s 95386->95396 95397 dd918d EnterCriticalSection 95386->95397 95414 ddf2d9 20 API calls __dosmaperr 95387->95414 95389 dde69a 95415 de27ec 26 API calls __wsopen_s 95389->95415 95392 dde6c6 95398 dde602 95392->95398 95394 dde6d1 95416 dde6ee LeaveCriticalSection __fread_nolock 95394->95416 95396->95203 95397->95392 95399 dde60f 95398->95399 95400 dde624 95398->95400 95449 ddf2d9 20 API calls __dosmaperr 95399->95449 95404 dde61f 95400->95404 95417 dddc0b 95400->95417 95403 dde614 95450 de27ec 26 API calls __wsopen_s 95403->95450 95404->95394 95410 dde646 95434 de862f 95410->95434 95413 de29c8 _free 20 API calls 95413->95404 95414->95389 95415->95396 95416->95396 95418 dddc23 95417->95418 95422 dddc1f 95417->95422 95419 ddd955 __fread_nolock 26 API calls 95418->95419 95418->95422 95420 dddc43 95419->95420 95451 de59be 62 API calls 3 library calls 95420->95451 95423 de4d7a 95422->95423 95424 dde640 95423->95424 95425 de4d90 95423->95425 95427 ddd955 95424->95427 95425->95424 95426 de29c8 _free 20 API calls 95425->95426 95426->95424 95428 ddd976 95427->95428 95429 ddd961 95427->95429 95428->95410 95452 ddf2d9 20 API calls __dosmaperr 95429->95452 95431 ddd966 95453 de27ec 26 API calls __wsopen_s 95431->95453 95433 ddd971 95433->95410 95435 de863e 95434->95435 95436 de8653 95434->95436 95457 ddf2c6 20 API calls __dosmaperr 95435->95457 95437 de868e 95436->95437 95442 de867a 95436->95442 95459 ddf2c6 20 API calls __dosmaperr 95437->95459 95439 de8643 95458 ddf2d9 20 API calls __dosmaperr 95439->95458 95454 de8607 95442->95454 95443 de8693 95460 ddf2d9 20 API calls __dosmaperr 95443->95460 95446 dde64c 95446->95404 95446->95413 95447 de869b 95461 de27ec 26 API calls __wsopen_s 95447->95461 95449->95403 95450->95404 95451->95422 95452->95431 95453->95433 95462 de8585 95454->95462 95456 de862b 95456->95446 95457->95439 95458->95446 95459->95443 95460->95447 95461->95446 95463 de8591 __FrameHandler3::FrameUnwindToState 95462->95463 95473 de5147 EnterCriticalSection 95463->95473 95465 de859f 95466 de85c6 95465->95466 95467 de85d1 95465->95467 95474 de86ae 95466->95474 95489 ddf2d9 20 API calls __dosmaperr 95467->95489 95470 de85cc 95490 de85fb LeaveCriticalSection __wsopen_s 95470->95490 95472 de85ee __wsopen_s 95472->95456 95473->95465 95491 de53c4 95474->95491 95476 de86c4 95504 de5333 21 API calls 2 library calls 95476->95504 95477 de86be 95477->95476 95479 de53c4 __wsopen_s 26 API calls 95477->95479 95488 de86f6 95477->95488 95482 de86ed 95479->95482 95480 de53c4 __wsopen_s 26 API calls 95483 de8702 CloseHandle 95480->95483 95481 de871c 95487 de873e 95481->95487 95505 ddf2a3 20 API calls __dosmaperr 95481->95505 95485 de53c4 __wsopen_s 26 API calls 95482->95485 95483->95476 95486 de870e GetLastError 95483->95486 95485->95488 95486->95476 95487->95470 95488->95476 95488->95480 95489->95470 95490->95472 95492 de53e6 95491->95492 95493 de53d1 95491->95493 95497 de540b 95492->95497 95508 ddf2c6 20 API calls __dosmaperr 95492->95508 95506 ddf2c6 20 API calls __dosmaperr 95493->95506 95496 de53d6 95507 ddf2d9 20 API calls __dosmaperr 95496->95507 95497->95477 95498 de5416 95509 ddf2d9 20 API calls __dosmaperr 95498->95509 95501 de53de 95501->95477 95502 de541e 95510 de27ec 26 API calls __wsopen_s 95502->95510 95504->95481 95505->95487 95506->95496 95507->95501 95508->95498 95509->95502 95510->95501 95511 db3156 95514 db3170 95511->95514 95515 db3187 95514->95515 95516 db31eb 95515->95516 95517 db318c 95515->95517 95558 db31e9 95515->95558 95521 df2dfb 95516->95521 95522 db31f1 95516->95522 95518 db3199 95517->95518 95519 db3265 PostQuitMessage 95517->95519 95524 df2e7c 95518->95524 95525 db31a4 95518->95525 95554 db316a 95519->95554 95520 db31d0 DefWindowProcW 95520->95554 95566 db18e2 10 API calls 95521->95566 95526 db31f8 95522->95526 95527 db321d SetTimer RegisterWindowMessageW 95522->95527 95580 e1bf30 34 API calls ___scrt_fastfail 95524->95580 95531 db31ae 95525->95531 95532 df2e68 95525->95532 95528 df2d9c 95526->95528 95529 db3201 KillTimer 95526->95529 95533 db3246 CreatePopupMenu 95527->95533 95527->95554 95541 df2dd7 MoveWindow 95528->95541 95542 df2da1 95528->95542 95559 db30f2 95529->95559 95530 df2e1c 95567 dce499 42 API calls 95530->95567 95538 df2e4d 95531->95538 95539 db31b9 95531->95539 95579 e1c161 27 API calls ___scrt_fastfail 95532->95579 95533->95554 95538->95520 95578 e10ad7 22 API calls 95538->95578 95545 db3253 95539->95545 95552 db31c4 95539->95552 95540 df2e8e 95540->95520 95540->95554 95541->95554 95546 df2da7 95542->95546 95547 df2dc6 SetFocus 95542->95547 95544 db3263 95544->95554 95564 db326f 44 API calls ___scrt_fastfail 95545->95564 95551 df2db0 95546->95551 95546->95552 95547->95554 95565 db18e2 10 API calls 95551->95565 95552->95520 95555 db30f2 Shell_NotifyIconW 95552->95555 95556 df2e41 95555->95556 95568 db3837 95556->95568 95558->95520 95560 db3154 95559->95560 95561 db3104 ___scrt_fastfail 95559->95561 95563 db3c50 DeleteObject DestroyWindow 95560->95563 95562 db3123 Shell_NotifyIconW 95561->95562 95562->95560 95563->95554 95564->95544 95565->95554 95566->95530 95567->95552 95569 db3862 ___scrt_fastfail 95568->95569 95581 db4212 95569->95581 95572 db38e8 95574 df3386 Shell_NotifyIconW 95572->95574 95575 db3906 Shell_NotifyIconW 95572->95575 95585 db3923 95575->95585 95577 db391c 95577->95558 95578->95558 95579->95544 95580->95540 95582 df35a4 95581->95582 95583 db38b7 95581->95583 95582->95583 95584 df35ad DestroyIcon 95582->95584 95583->95572 95607 e1c874 42 API calls _strftime 95583->95607 95584->95583 95586 db393f 95585->95586 95605 db3a13 95585->95605 95608 db6270 95586->95608 95589 db395a 95591 db6b57 22 API calls 95589->95591 95590 df3393 LoadStringW 95592 df33ad 95590->95592 95593 db396f 95591->95593 95600 db3994 ___scrt_fastfail 95592->95600 95614 dba8c7 22 API calls __fread_nolock 95592->95614 95594 df33c9 95593->95594 95595 db397c 95593->95595 95615 db6350 22 API calls 95594->95615 95595->95592 95598 db3986 95595->95598 95613 db6350 22 API calls 95598->95613 95603 db39f9 Shell_NotifyIconW 95600->95603 95601 df33d7 95601->95600 95602 db33c6 22 API calls 95601->95602 95604 df33f9 95602->95604 95603->95605 95606 db33c6 22 API calls 95604->95606 95605->95577 95606->95600 95607->95572 95609 dcfe0b 22 API calls 95608->95609 95610 db6295 95609->95610 95611 dcfddb 22 API calls 95610->95611 95612 db394d 95611->95612 95612->95589 95612->95590 95613->95600 95614->95600 95615->95601 95616 db1cad SystemParametersInfoW 95617 db2de3 95618 db2df0 __wsopen_s 95617->95618 95619 db2e09 95618->95619 95620 df2c2b ___scrt_fastfail 95618->95620 95621 db3aa2 23 API calls 95619->95621 95622 df2c47 GetOpenFileNameW 95620->95622 95623 db2e12 95621->95623 95624 df2c96 95622->95624 95633 db2da5 95623->95633 95626 db6b57 22 API calls 95624->95626 95628 df2cab 95626->95628 95628->95628 95630 db2e27 95651 db44a8 95630->95651 95634 df1f50 __wsopen_s 95633->95634 95635 db2db2 GetLongPathNameW 95634->95635 95636 db6b57 22 API calls 95635->95636 95637 db2dda 95636->95637 95638 db3598 95637->95638 95639 dba961 22 API calls 95638->95639 95640 db35aa 95639->95640 95641 db3aa2 23 API calls 95640->95641 95642 db35b5 95641->95642 95643 db35c0 95642->95643 95647 df32eb 95642->95647 95645 db515f 22 API calls 95643->95645 95646 db35cc 95645->95646 95680 db35f3 95646->95680 95649 df330d 95647->95649 95686 dcce60 41 API calls 95647->95686 95650 db35df 95650->95630 95652 db4ecb 94 API calls 95651->95652 95653 db44cd 95652->95653 95654 df3833 95653->95654 95656 db4ecb 94 API calls 95653->95656 95655 e22cf9 80 API calls 95654->95655 95657 df3848 95655->95657 95658 db44e1 95656->95658 95659 df384c 95657->95659 95660 df3869 95657->95660 95658->95654 95661 db44e9 95658->95661 95662 db4f39 68 API calls 95659->95662 95663 dcfe0b 22 API calls 95660->95663 95664 df3854 95661->95664 95665 db44f5 95661->95665 95662->95664 95679 df38ae 95663->95679 95688 e1da5a 82 API calls 95664->95688 95687 db940c 136 API calls 2 library calls 95665->95687 95668 df3862 95668->95660 95669 db2e31 95670 db4f39 68 API calls 95673 df3a5f 95670->95673 95673->95670 95694 e1989b 82 API calls __wsopen_s 95673->95694 95676 db9cb3 22 API calls 95676->95679 95679->95673 95679->95676 95689 e1967e 22 API calls __fread_nolock 95679->95689 95690 e195ad 42 API calls _wcslen 95679->95690 95691 e20b5a 22 API calls 95679->95691 95692 dba4a1 22 API calls __fread_nolock 95679->95692 95693 db3ff7 22 API calls 95679->95693 95681 db3605 95680->95681 95685 db3624 __fread_nolock 95680->95685 95684 dcfe0b 22 API calls 95681->95684 95682 dcfddb 22 API calls 95683 db363b 95682->95683 95683->95650 95684->95685 95685->95682 95686->95647 95687->95669 95688->95668 95689->95679 95690->95679 95691->95679 95692->95679 95693->95679 95694->95673 95695 df2ba5 95696 df2baf 95695->95696 95697 db2b25 95695->95697 95699 db3a5a 24 API calls 95696->95699 95723 db2b83 7 API calls 95697->95723 95701 df2bb8 95699->95701 95703 db9cb3 22 API calls 95701->95703 95704 df2bc6 95703->95704 95706 df2bce 95704->95706 95707 df2bf5 95704->95707 95705 db2b2f 95708 db3837 49 API calls 95705->95708 95710 db2b44 95705->95710 95709 db33c6 22 API calls 95706->95709 95711 db33c6 22 API calls 95707->95711 95708->95710 95712 df2bd9 95709->95712 95715 db2b5f 95710->95715 95718 db30f2 Shell_NotifyIconW 95710->95718 95713 df2bf1 GetForegroundWindow ShellExecuteW 95711->95713 95727 db6350 22 API calls 95712->95727 95719 df2c26 95713->95719 95721 db2b66 SetCurrentDirectoryW 95715->95721 95717 df2be7 95720 db33c6 22 API calls 95717->95720 95718->95715 95719->95715 95720->95713 95722 db2b7a 95721->95722 95728 db2cd4 7 API calls 95723->95728 95725 db2b2a 95726 db2c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 95725->95726 95726->95705 95727->95717 95728->95725 95729 de8402 95734 de81be 95729->95734 95732 de842a 95739 de81ef try_get_first_available_module 95734->95739 95736 de83ee 95753 de27ec 26 API calls __wsopen_s 95736->95753 95738 de8343 95738->95732 95746 df0984 95738->95746 95742 de8338 95739->95742 95749 dd8e0b 40 API calls 2 library calls 95739->95749 95741 de838c 95741->95742 95750 dd8e0b 40 API calls 2 library calls 95741->95750 95742->95738 95752 ddf2d9 20 API calls __dosmaperr 95742->95752 95744 de83ab 95744->95742 95751 dd8e0b 40 API calls 2 library calls 95744->95751 95754 df0081 95746->95754 95748 df099f 95748->95732 95749->95741 95750->95744 95751->95742 95752->95736 95753->95738 95755 df008d __FrameHandler3::FrameUnwindToState 95754->95755 95756 df009b 95755->95756 95759 df00d4 95755->95759 95812 ddf2d9 20 API calls __dosmaperr 95756->95812 95758 df00a0 95813 de27ec 26 API calls __wsopen_s 95758->95813 95765 df065b 95759->95765 95764 df00aa __wsopen_s 95764->95748 95815 df042f 95765->95815 95768 df068d 95847 ddf2c6 20 API calls __dosmaperr 95768->95847 95769 df06a6 95833 de5221 95769->95833 95772 df06ab 95773 df06cb 95772->95773 95774 df06b4 95772->95774 95846 df039a CreateFileW 95773->95846 95849 ddf2c6 20 API calls __dosmaperr 95774->95849 95778 df06b9 95850 ddf2d9 20 API calls __dosmaperr 95778->95850 95779 df0781 GetFileType 95783 df078c GetLastError 95779->95783 95784 df07d3 95779->95784 95781 df0756 GetLastError 95852 ddf2a3 20 API calls __dosmaperr 95781->95852 95782 df0704 95782->95779 95782->95781 95851 df039a CreateFileW 95782->95851 95853 ddf2a3 20 API calls __dosmaperr 95783->95853 95855 de516a 21 API calls 2 library calls 95784->95855 95788 df0692 95848 ddf2d9 20 API calls __dosmaperr 95788->95848 95789 df079a CloseHandle 95789->95788 95790 df07c3 95789->95790 95854 ddf2d9 20 API calls __dosmaperr 95790->95854 95792 df0749 95792->95779 95792->95781 95794 df07f4 95796 df0840 95794->95796 95856 df05ab 72 API calls 3 library calls 95794->95856 95795 df07c8 95795->95788 95801 df086d 95796->95801 95857 df014d 72 API calls 4 library calls 95796->95857 95799 df0866 95800 df087e 95799->95800 95799->95801 95803 df00f8 95800->95803 95804 df08fc CloseHandle 95800->95804 95802 de86ae __wsopen_s 29 API calls 95801->95802 95802->95803 95814 df0121 LeaveCriticalSection __wsopen_s 95803->95814 95858 df039a CreateFileW 95804->95858 95806 df0927 95807 df095d 95806->95807 95808 df0931 GetLastError 95806->95808 95807->95803 95859 ddf2a3 20 API calls __dosmaperr 95808->95859 95810 df093d 95860 de5333 21 API calls 2 library calls 95810->95860 95812->95758 95813->95764 95814->95764 95816 df046a 95815->95816 95817 df0450 95815->95817 95861 df03bf 95816->95861 95817->95816 95868 ddf2d9 20 API calls __dosmaperr 95817->95868 95820 df045f 95869 de27ec 26 API calls __wsopen_s 95820->95869 95822 df04a2 95823 df04d1 95822->95823 95870 ddf2d9 20 API calls __dosmaperr 95822->95870 95832 df0524 95823->95832 95872 ddd70d 26 API calls 2 library calls 95823->95872 95826 df051f 95828 df059e 95826->95828 95826->95832 95827 df04c6 95871 de27ec 26 API calls __wsopen_s 95827->95871 95873 de27fc 11 API calls _abort 95828->95873 95831 df05aa 95832->95768 95832->95769 95834 de522d __FrameHandler3::FrameUnwindToState 95833->95834 95876 de2f5e EnterCriticalSection 95834->95876 95836 de5234 95837 de5259 95836->95837 95841 de52c7 EnterCriticalSection 95836->95841 95844 de527b 95836->95844 95839 de5000 __wsopen_s 21 API calls 95837->95839 95842 de525e 95839->95842 95840 de52a4 __wsopen_s 95840->95772 95843 de52d4 LeaveCriticalSection 95841->95843 95841->95844 95842->95844 95880 de5147 EnterCriticalSection 95842->95880 95843->95836 95877 de532a 95844->95877 95846->95782 95847->95788 95848->95803 95849->95778 95850->95788 95851->95792 95852->95788 95853->95789 95854->95795 95855->95794 95856->95796 95857->95799 95858->95806 95859->95810 95860->95807 95864 df03d7 95861->95864 95862 df03f2 95862->95822 95864->95862 95874 ddf2d9 20 API calls __dosmaperr 95864->95874 95865 df0416 95875 de27ec 26 API calls __wsopen_s 95865->95875 95867 df0421 95867->95822 95868->95820 95869->95816 95870->95827 95871->95823 95872->95826 95873->95831 95874->95865 95875->95867 95876->95836 95881 de2fa6 LeaveCriticalSection 95877->95881 95879 de5331 95879->95840 95880->95844 95881->95879 95882 df2402 95885 db1410 95882->95885 95886 db144f mciSendStringW 95885->95886 95887 df24b8 DestroyWindow 95885->95887 95888 db146b 95886->95888 95889 db16c6 95886->95889 95900 df24c4 95887->95900 95890 db1479 95888->95890 95888->95900 95889->95888 95891 db16d5 UnregisterHotKey 95889->95891 95918 db182e 95890->95918 95891->95889 95893 df24d8 95893->95900 95924 db6246 CloseHandle 95893->95924 95894 df24e2 FindClose 95894->95900 95896 df2509 95899 df251c FreeLibrary 95896->95899 95901 df252d 95896->95901 95898 db148e 95898->95901 95906 db149c 95898->95906 95899->95896 95900->95893 95900->95894 95900->95896 95902 df2541 VirtualFree 95901->95902 95909 db1509 95901->95909 95902->95901 95903 db14f8 CoUninitialize 95903->95909 95904 df2589 95911 df2598 messages 95904->95911 95925 e232eb 6 API calls messages 95904->95925 95905 db1514 95908 db1524 95905->95908 95906->95903 95922 db1944 VirtualFreeEx CloseHandle 95908->95922 95909->95904 95909->95905 95914 df2627 95911->95914 95926 e164d4 22 API calls messages 95911->95926 95913 db153a 95913->95911 95915 db161f 95913->95915 95914->95914 95915->95914 95923 db1876 CloseHandle InternetCloseHandle InternetCloseHandle WaitForSingleObject 95915->95923 95917 db16c1 95920 db183b 95918->95920 95919 db1480 95919->95896 95919->95898 95920->95919 95927 e1702a 22 API calls 95920->95927 95922->95913 95923->95917 95924->95893 95925->95904 95926->95911 95927->95920 95928 db1044 95933 db10f3 95928->95933 95930 db104a 95969 dd00a3 29 API calls __onexit 95930->95969 95932 db1054 95970 db1398 95933->95970 95937 db116a 95938 dba961 22 API calls 95937->95938 95939 db1174 95938->95939 95940 dba961 22 API calls 95939->95940 95941 db117e 95940->95941 95942 dba961 22 API calls 95941->95942 95943 db1188 95942->95943 95944 dba961 22 API calls 95943->95944 95945 db11c6 95944->95945 95946 dba961 22 API calls 95945->95946 95947 db1292 95946->95947 95980 db171c 95947->95980 95951 db12c4 95952 dba961 22 API calls 95951->95952 95953 db12ce 95952->95953 95954 dc1940 9 API calls 95953->95954 95955 db12f9 95954->95955 96001 db1aab 95955->96001 95957 db1315 95958 db1325 GetStdHandle 95957->95958 95959 db137a 95958->95959 95960 df2485 95958->95960 95963 db1387 OleInitialize 95959->95963 95960->95959 95961 df248e 95960->95961 95962 dcfddb 22 API calls 95961->95962 95964 df2495 95962->95964 95963->95930 96008 e2011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 95964->96008 95966 df249e 96009 e20944 CreateThread 95966->96009 95968 df24aa CloseHandle 95968->95959 95969->95932 96010 db13f1 95970->96010 95973 db13f1 22 API calls 95974 db13d0 95973->95974 95975 dba961 22 API calls 95974->95975 95976 db13dc 95975->95976 95977 db6b57 22 API calls 95976->95977 95978 db1129 95977->95978 95979 db1bc3 6 API calls 95978->95979 95979->95937 95981 dba961 22 API calls 95980->95981 95982 db172c 95981->95982 95983 dba961 22 API calls 95982->95983 95984 db1734 95983->95984 95985 dba961 22 API calls 95984->95985 95986 db174f 95985->95986 95987 dcfddb 22 API calls 95986->95987 95988 db129c 95987->95988 95989 db1b4a 95988->95989 95990 db1b58 95989->95990 95991 dba961 22 API calls 95990->95991 95992 db1b63 95991->95992 95993 dba961 22 API calls 95992->95993 95994 db1b6e 95993->95994 95995 dba961 22 API calls 95994->95995 95996 db1b79 95995->95996 95997 dba961 22 API calls 95996->95997 95998 db1b84 95997->95998 95999 dcfddb 22 API calls 95998->95999 96000 db1b96 RegisterWindowMessageW 95999->96000 96000->95951 96002 db1abb 96001->96002 96003 df272d 96001->96003 96004 dcfddb 22 API calls 96002->96004 96017 e23209 23 API calls 96003->96017 96006 db1ac3 96004->96006 96006->95957 96007 df2738 96008->95966 96009->95968 96018 e2092a 28 API calls 96009->96018 96011 dba961 22 API calls 96010->96011 96012 db13fc 96011->96012 96013 dba961 22 API calls 96012->96013 96014 db1404 96013->96014 96015 dba961 22 API calls 96014->96015 96016 db13c6 96015->96016 96016->95973 96017->96007

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 393 db42de-db434d call dba961 GetVersionExW call db6b57 398 df3617-df362a 393->398 399 db4353 393->399 400 df362b-df362f 398->400 401 db4355-db4357 399->401 402 df3632-df363e 400->402 403 df3631 400->403 404 db435d-db43bc call db93b2 call db37a0 401->404 405 df3656 401->405 402->400 406 df3640-df3642 402->406 403->402 422 df37df-df37e6 404->422 423 db43c2-db43c4 404->423 409 df365d-df3660 405->409 406->401 408 df3648-df364f 406->408 408->398 411 df3651 408->411 412 db441b-db4435 GetCurrentProcess IsWow64Process 409->412 413 df3666-df36a8 409->413 411->405 415 db4437 412->415 416 db4494-db449a 412->416 413->412 417 df36ae-df36b1 413->417 419 db443d-db4449 415->419 416->419 420 df36db-df36e5 417->420 421 df36b3-df36bd 417->421 429 db444f-db445e LoadLibraryA 419->429 430 df3824-df3828 GetSystemInfo 419->430 425 df36f8-df3702 420->425 426 df36e7-df36f3 420->426 431 df36bf-df36c5 421->431 432 df36ca-df36d6 421->432 427 df37e8 422->427 428 df3806-df3809 422->428 423->409 424 db43ca-db43dd 423->424 433 db43e3-db43e5 424->433 434 df3726-df372f 424->434 436 df3715-df3721 425->436 437 df3704-df3710 425->437 426->412 435 df37ee 427->435 438 df380b-df381a 428->438 439 df37f4-df37fc 428->439 440 db449c-db44a6 GetSystemInfo 429->440 441 db4460-db446e GetProcAddress 429->441 431->412 432->412 443 db43eb-db43ee 433->443 444 df374d-df3762 433->444 445 df373c-df3748 434->445 446 df3731-df3737 434->446 435->439 436->412 437->412 438->435 447 df381c-df3822 438->447 439->428 442 db4476-db4478 440->442 441->440 448 db4470-db4474 GetNativeSystemInfo 441->448 453 db447a-db447b FreeLibrary 442->453 454 db4481-db4493 442->454 449 df3791-df3794 443->449 450 db43f4-db440f 443->450 451 df376f-df377b 444->451 452 df3764-df376a 444->452 445->412 446->412 447->439 448->442 449->412 457 df379a-df37c1 449->457 455 db4415 450->455 456 df3780-df378c 450->456 451->412 452->412 453->454 455->412 456->412 458 df37ce-df37da 457->458 459 df37c3-df37c9 457->459 458->412 459->412
                                                          APIs
                                                          • GetVersionExW.KERNEL32(?), ref: 00DB430D
                                                            • Part of subcall function 00DB6B57: _wcslen.LIBCMT ref: 00DB6B6A
                                                          • GetCurrentProcess.KERNEL32(?,00E4CB64,00000000,?,?), ref: 00DB4422
                                                          • IsWow64Process.KERNEL32(00000000,?,?), ref: 00DB4429
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00DB4454
                                                          • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00DB4466
                                                          • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00DB4474
                                                          • FreeLibrary.KERNEL32(00000000,?,?), ref: 00DB447B
                                                          • GetSystemInfo.KERNEL32(?,?,?), ref: 00DB44A0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                          • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                          • API String ID: 3290436268-3101561225
                                                          • Opcode ID: 3f21b8c6b900cb59ce701bc13858a9b97baec269cd55b791cab6ccb93f72c1d7
                                                          • Instruction ID: 99d0fe19da9364daf4c38d25065913136efdc36d1b0608b15953a1ce77562604
                                                          • Opcode Fuzzy Hash: 3f21b8c6b900cb59ce701bc13858a9b97baec269cd55b791cab6ccb93f72c1d7
                                                          • Instruction Fuzzy Hash: 4DA1707690A2C4DFC712D76B7C411E57FAC6B26740B1B98E9D48AB3A22D260460ECB71

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 797 db42a2-db42ba CreateStreamOnHGlobal 798 db42da-db42dd 797->798 799 db42bc-db42d3 FindResourceExW 797->799 800 db42d9 799->800 801 df35ba-df35c9 LoadResource 799->801 800->798 801->800 802 df35cf-df35dd SizeofResource 801->802 802->800 803 df35e3-df35ee LockResource 802->803 803->800 804 df35f4-df3612 803->804 804->800
                                                          APIs
                                                          • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00DB50AA,?,?,00000000,00000000), ref: 00DB42B2
                                                          • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00DB50AA,?,?,00000000,00000000), ref: 00DB42C9
                                                          • LoadResource.KERNEL32(?,00000000,?,?,00DB50AA,?,?,00000000,00000000,?,?,?,?,?,?,00DB4F20), ref: 00DF35BE
                                                          • SizeofResource.KERNEL32(?,00000000,?,?,00DB50AA,?,?,00000000,00000000,?,?,?,?,?,?,00DB4F20), ref: 00DF35D3
                                                          • LockResource.KERNEL32(00DB50AA,?,?,00DB50AA,?,?,00000000,00000000,?,?,?,?,?,?,00DB4F20,?), ref: 00DF35E6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                          • String ID: SCRIPT
                                                          • API String ID: 3051347437-3967369404
                                                          • Opcode ID: 6661f335a4b79de46ac28555d1ecffea94b202d97975f8be26f0908cfc977cf5
                                                          • Instruction ID: ce6fd7cca7416682dc0170c910aadee1c6d013d81a2541299669d504766f2997
                                                          • Opcode Fuzzy Hash: 6661f335a4b79de46ac28555d1ecffea94b202d97975f8be26f0908cfc977cf5
                                                          • Instruction Fuzzy Hash: 93117C74202700FFE7218FA6DC49F677BB9EBC6B51F248169B503A7260DBB1D8059634

                                                          Control-flow Graph

                                                          APIs
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00DB2B6B
                                                            • Part of subcall function 00DB3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00E81418,?,00DB2E7F,?,?,?,00000000), ref: 00DB3A78
                                                            • Part of subcall function 00DB9CB3: _wcslen.LIBCMT ref: 00DB9CBD
                                                          • GetForegroundWindow.USER32(runas,?,?,?,?,?,00E72224), ref: 00DF2C10
                                                          • ShellExecuteW.SHELL32(00000000,?,?,00E72224), ref: 00DF2C17
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                          • String ID: runas
                                                          • API String ID: 448630720-4000483414
                                                          • Opcode ID: 11e4929194760b3d47ee6d11c9762f16701a35e39b9b944a2a37e373f86b2903
                                                          • Instruction ID: bfe7080658eb47ae8678b59862e2e07235054b9e50b52e229c013e011474fe62
                                                          • Opcode Fuzzy Hash: 11e4929194760b3d47ee6d11c9762f16701a35e39b9b944a2a37e373f86b2903
                                                          • Instruction Fuzzy Hash: 2411B432208345EAC704FF64D8929FEBBA8DBD5700F58542DF19B231A2DF20894A9732

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1243 e1d4dc-e1d524 CreateToolhelp32Snapshot Process32FirstW call e1def7 1246 e1d5d2-e1d5d5 1243->1246 1247 e1d529-e1d538 Process32NextW 1246->1247 1248 e1d5db-e1d5ea CloseHandle 1246->1248 1247->1248 1249 e1d53e-e1d5ad call dba961 * 2 call db9cb3 call db525f call db988f call db6350 call dcce60 1247->1249 1264 e1d5b7-e1d5be 1249->1264 1265 e1d5af-e1d5b1 1249->1265 1266 e1d5c0-e1d5cd call db988f * 2 1264->1266 1265->1266 1267 e1d5b3-e1d5b5 1265->1267 1266->1246 1267->1264 1267->1266
                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 00E1D501
                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 00E1D50F
                                                          • Process32NextW.KERNEL32(00000000,?), ref: 00E1D52F
                                                          • CloseHandle.KERNELBASE(00000000), ref: 00E1D5DC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                          • String ID:
                                                          • API String ID: 420147892-0
                                                          • Opcode ID: 7c8f76e485bad853cba857aceaad2135631358c5c1d072b2a999bacb278da333
                                                          • Instruction ID: 2dbd0698f77f5f1874bc38d923300582dac9852614b0ece6d8d321ee09580495
                                                          • Opcode Fuzzy Hash: 7c8f76e485bad853cba857aceaad2135631358c5c1d072b2a999bacb278da333
                                                          • Instruction Fuzzy Hash: 11316D71108240DFD300EF54CC91AEEBBF8EF99354F54092DF586971A1EB619989CBA2

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1271 e1dbbe-e1dbda lstrlenW 1272 e1dc06 1271->1272 1273 e1dbdc-e1dbe6 GetFileAttributesW 1271->1273 1274 e1dc09-e1dc0d 1272->1274 1273->1274 1275 e1dbe8-e1dbf7 FindFirstFileW 1273->1275 1275->1272 1276 e1dbf9-e1dc04 FindClose 1275->1276 1276->1274
                                                          APIs
                                                          • lstrlenW.KERNEL32(?,00DF5222), ref: 00E1DBCE
                                                          • GetFileAttributesW.KERNELBASE(?), ref: 00E1DBDD
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00E1DBEE
                                                          • FindClose.KERNEL32(00000000), ref: 00E1DBFA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: FileFind$AttributesCloseFirstlstrlen
                                                          • String ID:
                                                          • API String ID: 2695905019-0
                                                          • Opcode ID: e128dbb53a0d806e83af1bf3b2729a0ebc65fb3a6ab4ecc7d3bf28a23116acd1
                                                          • Instruction ID: 60ad8591edafcfe13002f8f5eb08f53616ffe37c5277d44b6502ccd100ef9662
                                                          • Opcode Fuzzy Hash: e128dbb53a0d806e83af1bf3b2729a0ebc65fb3a6ab4ecc7d3bf28a23116acd1
                                                          • Instruction Fuzzy Hash: B0F0A7344159145B82206B799C0D4EE776C9F02338B204B02F535E31F0EBF05999C5D9
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(00DE28E9,?,00DD4CBE,00DE28E9,00E788B8,0000000C,00DD4E15,00DE28E9,00000002,00000000,?,00DE28E9), ref: 00DD4D09
                                                          • TerminateProcess.KERNEL32(00000000,?,00DD4CBE,00DE28E9,00E788B8,0000000C,00DD4E15,00DE28E9,00000002,00000000,?,00DE28E9), ref: 00DD4D10
                                                          • ExitProcess.KERNEL32 ref: 00DD4D22
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$CurrentExitTerminate
                                                          • String ID:
                                                          • API String ID: 1703294689-0
                                                          • Opcode ID: 6bba876f08f4842d2049d73b4f193616a810b18b21932038fa056f06b7fe0a7a
                                                          • Instruction ID: e85708c57b0136a51037bc4c7a2d86998769b11f37652b64dc25443d97d164dd
                                                          • Opcode Fuzzy Hash: 6bba876f08f4842d2049d73b4f193616a810b18b21932038fa056f06b7fe0a7a
                                                          • Instruction Fuzzy Hash: ACE0EC35001188AFCF61AF65DD09A583F6AFF42791F284059FC059B232CB35DD46CBA0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper
                                                          • String ID: p#
                                                          • API String ID: 3964851224-4182048217
                                                          • Opcode ID: c32e832b02f62500eef1277dec887841118b65c047b077905e4c79424159627b
                                                          • Instruction ID: 2002218811c656c5a9f2df2e149bd153916e63e70f4a1e584d1eb03d8f40535c
                                                          • Opcode Fuzzy Hash: c32e832b02f62500eef1277dec887841118b65c047b077905e4c79424159627b
                                                          • Instruction Fuzzy Hash: 2DA24A70608341CFD714DF18C480BAABBE1FF89304F54996DE99A9B352D771E885CBA2

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 0 e3aff9-e3b056 call dd2340 3 e3b094-e3b098 0->3 4 e3b058-e3b06b call dbb567 0->4 5 e3b09a-e3b0bb call dbb567 * 2 3->5 6 e3b0dd-e3b0e0 3->6 15 e3b0c8 4->15 16 e3b06d-e3b092 call dbb567 * 2 4->16 30 e3b0bf-e3b0c4 5->30 8 e3b0e2-e3b0e5 6->8 9 e3b0f5-e3b119 call db7510 call db7620 6->9 12 e3b0e8-e3b0ed call dbb567 8->12 32 e3b1d8-e3b1e0 9->32 33 e3b11f-e3b178 call db7510 call db7620 call db7510 call db7620 call db7510 call db7620 9->33 12->9 20 e3b0cb-e3b0cf 15->20 16->30 26 e3b0d1-e3b0d7 20->26 27 e3b0d9-e3b0db 20->27 26->12 27->6 27->9 30->6 34 e3b0c6 30->34 35 e3b1e2-e3b1fd call db7510 call db7620 32->35 36 e3b20a-e3b238 GetCurrentDirectoryW call dcfe0b GetCurrentDirectoryW 32->36 80 e3b1a6-e3b1d6 GetSystemDirectoryW call dcfe0b GetSystemDirectoryW 33->80 81 e3b17a-e3b195 call db7510 call db7620 33->81 34->20 35->36 50 e3b1ff-e3b208 call dd4963 35->50 45 e3b23c 36->45 48 e3b240-e3b244 45->48 51 e3b246-e3b270 call db9c6e * 3 48->51 52 e3b275-e3b285 call e200d9 48->52 50->36 50->52 51->52 64 e3b287-e3b289 52->64 65 e3b28b-e3b2e1 call e207c0 call e206e6 call e205a7 52->65 68 e3b2ee-e3b2f2 64->68 65->68 96 e3b2e3 65->96 70 e3b39a-e3b3be CreateProcessW 68->70 71 e3b2f8-e3b321 call e111c8 68->71 78 e3b3c1-e3b3d4 call dcfe14 * 2 70->78 85 e3b323-e3b328 call e11201 71->85 86 e3b32a call e114ce 71->86 101 e3b3d6-e3b3e8 78->101 102 e3b42f-e3b43d CloseHandle 78->102 80->45 81->80 107 e3b197-e3b1a0 call dd4963 81->107 100 e3b32f-e3b33c call dd4963 85->100 86->100 96->68 115 e3b347-e3b357 call dd4963 100->115 116 e3b33e-e3b345 100->116 105 e3b3ea 101->105 106 e3b3ed-e3b3fc 101->106 109 e3b43f-e3b444 102->109 110 e3b49c 102->110 105->106 111 e3b401-e3b42a GetLastError call db630c call dbcfa0 106->111 112 e3b3fe 106->112 107->48 107->80 117 e3b451-e3b456 109->117 118 e3b446-e3b44c CloseHandle 109->118 113 e3b4a0-e3b4a4 110->113 130 e3b4e5-e3b4f6 call e20175 111->130 112->111 122 e3b4b2-e3b4bc 113->122 123 e3b4a6-e3b4b0 113->123 133 e3b362-e3b372 call dd4963 115->133 134 e3b359-e3b360 115->134 116->115 116->116 119 e3b463-e3b468 117->119 120 e3b458-e3b45e CloseHandle 117->120 118->117 127 e3b475-e3b49a call e209d9 call e3b536 119->127 128 e3b46a-e3b470 CloseHandle 119->128 120->119 131 e3b4c4-e3b4e3 call dbcfa0 CloseHandle 122->131 132 e3b4be 122->132 123->130 127->113 128->127 131->130 132->131 146 e3b374-e3b37b 133->146 147 e3b37d-e3b398 call dcfe14 * 3 133->147 134->133 134->134 146->146 146->147 147->78
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 00E3B198
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00E3B1B0
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00E3B1D4
                                                          • _wcslen.LIBCMT ref: 00E3B200
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00E3B214
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00E3B236
                                                          • _wcslen.LIBCMT ref: 00E3B332
                                                            • Part of subcall function 00E205A7: GetStdHandle.KERNEL32(000000F6), ref: 00E205C6
                                                          • _wcslen.LIBCMT ref: 00E3B34B
                                                          • _wcslen.LIBCMT ref: 00E3B366
                                                          • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00E3B3B6
                                                          • GetLastError.KERNEL32(00000000), ref: 00E3B407
                                                          • CloseHandle.KERNEL32(?), ref: 00E3B439
                                                          • CloseHandle.KERNEL32(00000000), ref: 00E3B44A
                                                          • CloseHandle.KERNEL32(00000000), ref: 00E3B45C
                                                          • CloseHandle.KERNEL32(00000000), ref: 00E3B46E
                                                          • CloseHandle.KERNEL32(?), ref: 00E3B4E3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 2178637699-0
                                                          • Opcode ID: a8932a5848f29323d9175262cdc5982a24de653eba9c3665bf94d5a5c5f1f965
                                                          • Instruction ID: 31aae776890cb0a05296280b5873f9a9240c58a388f37acd1a8e416849a8c574
                                                          • Opcode Fuzzy Hash: a8932a5848f29323d9175262cdc5982a24de653eba9c3665bf94d5a5c5f1f965
                                                          • Instruction Fuzzy Hash: 9BF18A31604200DFC724EF24C895B6EBBE5EF85314F14955DF99AAB2A2DB31EC44CB62
                                                          APIs
                                                          • GetInputState.USER32 ref: 00DBD807
                                                          • timeGetTime.WINMM ref: 00DBDA07
                                                          • Sleep.KERNEL32(0000000A), ref: 00DBDBB1
                                                          • Sleep.KERNEL32(0000000A), ref: 00E02B76
                                                          • GetExitCodeProcess.KERNEL32(?,?), ref: 00E02C11
                                                          • WaitForSingleObject.KERNEL32(?,00000000), ref: 00E02C29
                                                          • CloseHandle.KERNEL32(?), ref: 00E02C3D
                                                          • Sleep.KERNEL32(?,CCCCCCCC,00000000), ref: 00E02CA9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Sleep$CloseCodeExitHandleInputObjectProcessSingleStateTimeWaittime
                                                          • String ID:
                                                          • API String ID: 388478766-0
                                                          • Opcode ID: d62a6dffb3d9bbf6f8788db27c28192beeb51a5132e5ffd03acdf4bc12f4e034
                                                          • Instruction ID: 610783a490d35ea608b254618ad356978edc67dac2128d7f10d438c3aa3a3199
                                                          • Opcode Fuzzy Hash: d62a6dffb3d9bbf6f8788db27c28192beeb51a5132e5ffd03acdf4bc12f4e034
                                                          • Instruction Fuzzy Hash: 7242D430604241DFDB29CF25C898BAAB7F2FF45304F18455DE59AA7291E770E884CFA2

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00DB2D07
                                                          • RegisterClassExW.USER32(00000030), ref: 00DB2D31
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00DB2D42
                                                          • InitCommonControlsEx.COMCTL32(?), ref: 00DB2D5F
                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00DB2D6F
                                                          • LoadIconW.USER32(000000A9), ref: 00DB2D85
                                                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00DB2D94
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                          • API String ID: 2914291525-1005189915
                                                          • Opcode ID: e3c041ba96ee92068e0e347829be917525fbc6c75c12ee333e9735b5298b601f
                                                          • Instruction ID: 9050b2ff7bef55088e8fcc829f0c8d342af744ed2a7ee6e2bd7ba6e0f91dad66
                                                          • Opcode Fuzzy Hash: e3c041ba96ee92068e0e347829be917525fbc6c75c12ee333e9735b5298b601f
                                                          • Instruction Fuzzy Hash: 2621E3B5902308AFDB40DFA6E849BDDBBB8FB49700F10415AF615B72A0D7B1054ACF90

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 461 df065b-df068b call df042f 464 df068d-df0698 call ddf2c6 461->464 465 df06a6-df06b2 call de5221 461->465 470 df069a-df06a1 call ddf2d9 464->470 471 df06cb-df0714 call df039a 465->471 472 df06b4-df06c9 call ddf2c6 call ddf2d9 465->472 481 df097d-df0983 470->481 479 df0716-df071f 471->479 480 df0781-df078a GetFileType 471->480 472->470 484 df0756-df077c GetLastError call ddf2a3 479->484 485 df0721-df0725 479->485 486 df078c-df07bd GetLastError call ddf2a3 CloseHandle 480->486 487 df07d3-df07d6 480->487 484->470 485->484 490 df0727-df0754 call df039a 485->490 486->470 498 df07c3-df07ce call ddf2d9 486->498 488 df07df-df07e5 487->488 489 df07d8-df07dd 487->489 493 df07e9-df0837 call de516a 488->493 494 df07e7 488->494 489->493 490->480 490->484 504 df0839-df0845 call df05ab 493->504 505 df0847-df086b call df014d 493->505 494->493 498->470 504->505 512 df086f-df0879 call de86ae 504->512 510 df087e-df08c1 505->510 511 df086d 505->511 514 df08c3-df08c7 510->514 515 df08e2-df08f0 510->515 511->512 512->481 514->515 517 df08c9-df08dd 514->517 518 df097b 515->518 519 df08f6-df08fa 515->519 517->515 518->481 519->518 520 df08fc-df092f CloseHandle call df039a 519->520 523 df0963-df0977 520->523 524 df0931-df095d GetLastError call ddf2a3 call de5333 520->524 523->518 524->523
                                                          APIs
                                                            • Part of subcall function 00DF039A: CreateFileW.KERNELBASE(00000000,00000000,?,00DF0704,?,?,00000000,?,00DF0704,00000000,0000000C), ref: 00DF03B7
                                                          • GetLastError.KERNEL32 ref: 00DF076F
                                                          • __dosmaperr.LIBCMT ref: 00DF0776
                                                          • GetFileType.KERNELBASE(00000000), ref: 00DF0782
                                                          • GetLastError.KERNEL32 ref: 00DF078C
                                                          • __dosmaperr.LIBCMT ref: 00DF0795
                                                          • CloseHandle.KERNEL32(00000000), ref: 00DF07B5
                                                          • CloseHandle.KERNEL32(?), ref: 00DF08FF
                                                          • GetLastError.KERNEL32 ref: 00DF0931
                                                          • __dosmaperr.LIBCMT ref: 00DF0938
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                          • String ID: H
                                                          • API String ID: 4237864984-2852464175
                                                          • Opcode ID: eb05d63fcc82cc0591b811f03a7de5b4eadca8e8ae1f724c0b1db39f7510d2ee
                                                          • Instruction ID: a9901f1cc737f7dcc4e3a660f5f771a67fac68bd9ac88bc9b2cd8b65b63d40e9
                                                          • Opcode Fuzzy Hash: eb05d63fcc82cc0591b811f03a7de5b4eadca8e8ae1f724c0b1db39f7510d2ee
                                                          • Instruction Fuzzy Hash: BEA11632A001088FDF19AF68D851BBE7FA0EB06324F198159F915EF392D7319916CBB1

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 00DB3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00E81418,?,00DB2E7F,?,?,?,00000000), ref: 00DB3A78
                                                            • Part of subcall function 00DB3357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00DB3379
                                                          • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00DB356A
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00DF318D
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00DF31CE
                                                          • RegCloseKey.ADVAPI32(?), ref: 00DF3210
                                                          • _wcslen.LIBCMT ref: 00DF3277
                                                          • _wcslen.LIBCMT ref: 00DF3286
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                          • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                          • API String ID: 98802146-2727554177
                                                          • Opcode ID: 46dc9400e65a7562fd62bf0e9408bb6660f250cf76c98e9aba6f56e5feb840ab
                                                          • Instruction ID: 7bf50c07b6443eb0fa29ace1dedde76fc9facc1c15a1d2b620113ad742a9ed12
                                                          • Opcode Fuzzy Hash: 46dc9400e65a7562fd62bf0e9408bb6660f250cf76c98e9aba6f56e5feb840ab
                                                          • Instruction Fuzzy Hash: FC71B371405302DEC314EF6AEC929ABBBE8FF95740F51442EF64AA3160DB319A48CB71

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00DB2B8E
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00DB2B9D
                                                          • LoadIconW.USER32(00000063), ref: 00DB2BB3
                                                          • LoadIconW.USER32(000000A4), ref: 00DB2BC5
                                                          • LoadIconW.USER32(000000A2), ref: 00DB2BD7
                                                          • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00DB2BEF
                                                          • RegisterClassExW.USER32(?), ref: 00DB2C40
                                                            • Part of subcall function 00DB2CD4: GetSysColorBrush.USER32(0000000F), ref: 00DB2D07
                                                            • Part of subcall function 00DB2CD4: RegisterClassExW.USER32(00000030), ref: 00DB2D31
                                                            • Part of subcall function 00DB2CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00DB2D42
                                                            • Part of subcall function 00DB2CD4: InitCommonControlsEx.COMCTL32(?), ref: 00DB2D5F
                                                            • Part of subcall function 00DB2CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00DB2D6F
                                                            • Part of subcall function 00DB2CD4: LoadIconW.USER32(000000A9), ref: 00DB2D85
                                                            • Part of subcall function 00DB2CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00DB2D94
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                          • String ID: #$0$AutoIt v3
                                                          • API String ID: 423443420-4155596026
                                                          • Opcode ID: 18692ae53dbbf5daeeeaebd2942b83f930cff17fa1f324ad0f7c44f13a72b3d3
                                                          • Instruction ID: 5ffefbca1dae843dc85e25be9fb41329333a62a0bb28a527410e212e8a9e688c
                                                          • Opcode Fuzzy Hash: 18692ae53dbbf5daeeeaebd2942b83f930cff17fa1f324ad0f7c44f13a72b3d3
                                                          • Instruction Fuzzy Hash: 21212874A01314AFDB109FE7EC49BA97FB8FB48B50F11009AE508B7AA0D3B1055ACF90

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 602 db3170-db3185 603 db3187-db318a 602->603 604 db31e5-db31e7 602->604 605 db31eb 603->605 606 db318c-db3193 603->606 604->603 607 db31e9 604->607 611 df2dfb-df2e23 call db18e2 call dce499 605->611 612 db31f1-db31f6 605->612 608 db3199-db319e 606->608 609 db3265-db326d PostQuitMessage 606->609 610 db31d0-db31d8 DefWindowProcW 607->610 614 df2e7c-df2e90 call e1bf30 608->614 615 db31a4-db31a8 608->615 617 db3219-db321b 609->617 616 db31de-db31e4 610->616 647 df2e28-df2e2f 611->647 618 db31f8-db31fb 612->618 619 db321d-db3244 SetTimer RegisterWindowMessageW 612->619 614->617 641 df2e96 614->641 623 db31ae-db31b3 615->623 624 df2e68-df2e77 call e1c161 615->624 617->616 620 df2d9c-df2d9f 618->620 621 db3201-db320f KillTimer call db30f2 618->621 619->617 625 db3246-db3251 CreatePopupMenu 619->625 633 df2dd7-df2df6 MoveWindow 620->633 634 df2da1-df2da5 620->634 636 db3214 call db3c50 621->636 630 df2e4d-df2e54 623->630 631 db31b9-db31be 623->631 624->617 625->617 630->610 635 df2e5a-df2e63 call e10ad7 630->635 639 db3253-db3263 call db326f 631->639 640 db31c4-db31ca 631->640 633->617 642 df2da7-df2daa 634->642 643 df2dc6-df2dd2 SetFocus 634->643 635->610 636->617 639->617 640->610 640->647 641->610 642->640 648 df2db0-df2dc1 call db18e2 642->648 643->617 647->610 651 df2e35-df2e48 call db30f2 call db3837 647->651 648->617 651->610
                                                          APIs
                                                          • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00DB316A,?,?), ref: 00DB31D8
                                                          • KillTimer.USER32(?,00000001,?,?,?,?,?,00DB316A,?,?), ref: 00DB3204
                                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00DB3227
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00DB316A,?,?), ref: 00DB3232
                                                          • CreatePopupMenu.USER32 ref: 00DB3246
                                                          • PostQuitMessage.USER32(00000000), ref: 00DB3267
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                          • String ID: TaskbarCreated
                                                          • API String ID: 129472671-2362178303
                                                          • Opcode ID: cf60e261982ae4b68198e91d77d85caa9fa273a631eb9a2f2fb6b444b26e1845
                                                          • Instruction ID: 5af46cf5891583ebac32667e9986548db61329d5b942ed2d9d72bff58a6cc673
                                                          • Opcode Fuzzy Hash: cf60e261982ae4b68198e91d77d85caa9fa273a631eb9a2f2fb6b444b26e1845
                                                          • Instruction Fuzzy Hash: E0412635640308EFDB142B79DC0EBF93A1DEB45380F184155F54BA62A1CB70DA46B7B5

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 658 db1410-db1449 659 db144f-db1465 mciSendStringW 658->659 660 df24b8-df24b9 DestroyWindow 658->660 661 db146b-db1473 659->661 662 db16c6-db16d3 659->662 663 df24c4-df24d1 660->663 661->663 664 db1479-db1488 call db182e 661->664 665 db16f8-db16ff 662->665 666 db16d5-db16f0 UnregisterHotKey 662->666 667 df24d3-df24d6 663->667 668 df2500-df2507 663->668 679 df250e-df251a 664->679 680 db148e-db1496 664->680 665->661 671 db1705 665->671 666->665 670 db16f2-db16f3 call db10d0 666->670 672 df24d8-df24e0 call db6246 667->672 673 df24e2-df24e5 FindClose 667->673 668->663 676 df2509 668->676 670->665 671->662 678 df24eb-df24f8 672->678 673->678 676->679 678->668 684 df24fa-df24fb call e232b1 678->684 681 df251c-df251e FreeLibrary 679->681 682 df2524-df252b 679->682 685 db149c-db14c1 call dbcfa0 680->685 686 df2532-df253f 680->686 681->682 682->679 687 df252d 682->687 684->668 696 db14f8-db1503 CoUninitialize 685->696 697 db14c3 685->697 688 df2566-df256d 686->688 689 df2541-df255e VirtualFree 686->689 687->686 688->686 693 df256f 688->693 689->688 692 df2560-df2561 call e23317 689->692 692->688 699 df2574-df2578 693->699 698 db1509-db150e 696->698 696->699 700 db14c6-db14f6 call db1a05 call db19ae 697->700 702 df2589-df2596 call e232eb 698->702 703 db1514-db151e 698->703 699->698 704 df257e-df2584 699->704 700->696 716 df2598 702->716 707 db1707-db1714 call dcf80e 703->707 708 db1524-db15a5 call db988f call db1944 call db17d5 call dcfe14 call db177c call db988f call dbcfa0 call db17fe call dcfe14 703->708 704->698 707->708 718 db171a 707->718 720 df259d-df25bf call dcfdcd 708->720 748 db15ab-db15cf call dcfe14 708->748 716->720 718->707 726 df25c1 720->726 730 df25c6-df25e8 call dcfdcd 726->730 736 df25ea 730->736 739 df25ef-df2611 call dcfdcd 736->739 744 df2613 739->744 747 df2618-df2625 call e164d4 744->747 753 df2627 747->753 748->730 754 db15d5-db15f9 call dcfe14 748->754 756 df262c-df2639 call dcac64 753->756 754->739 758 db15ff-db1619 call dcfe14 754->758 763 df263b 756->763 758->747 764 db161f-db1643 call db17d5 call dcfe14 758->764 766 df2640-df264d call e23245 763->766 764->756 773 db1649-db1651 764->773 771 df264f 766->771 774 df2654-df2661 call e232cc 771->774 773->766 775 db1657-db1675 call db988f call db190a 773->775 780 df2663 774->780 775->774 784 db167b-db1689 775->784 783 df2668-df2675 call e232cc 780->783 790 df2677 783->790 784->783 786 db168f-db16c5 call db988f * 3 call db1876 784->786 790->790
                                                          APIs
                                                          • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00DB1459
                                                          • CoUninitialize.COMBASE ref: 00DB14F8
                                                          • UnregisterHotKey.USER32(?), ref: 00DB16DD
                                                          • DestroyWindow.USER32(?), ref: 00DF24B9
                                                          • FreeLibrary.KERNEL32(?), ref: 00DF251E
                                                          • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00DF254B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                          • String ID: close all
                                                          • API String ID: 469580280-3243417748
                                                          • Opcode ID: 3efdd757d15556ee1dde4f717cc3d8dbe71d29f2487d90548dc3e46d9e054794
                                                          • Instruction ID: 2abac430826ce4d0970518e00aa1a5e548a95cc821ec97321125a08d2e25ef89
                                                          • Opcode Fuzzy Hash: 3efdd757d15556ee1dde4f717cc3d8dbe71d29f2487d90548dc3e46d9e054794
                                                          • Instruction Fuzzy Hash: 43D16A35602212CFCB29EF15C4A5AB9F7A5BF45700F6581ADE54AAB261CB30ED12CF70

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 807 db2c63-db2cd3 CreateWindowExW * 2 ShowWindow * 2
                                                          APIs
                                                          • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00DB2C91
                                                          • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00DB2CB2
                                                          • ShowWindow.USER32(00000000,?,?,?,?,?,?,00DB1CAD,?), ref: 00DB2CC6
                                                          • ShowWindow.USER32(00000000,?,?,?,?,?,?,00DB1CAD,?), ref: 00DB2CCF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$CreateShow
                                                          • String ID: AutoIt v3$edit
                                                          • API String ID: 1584632944-3779509399
                                                          • Opcode ID: 71792b31970009d031222a71e68080d42a2a32fab602c5d31cdd6cc67f6bb7ad
                                                          • Instruction ID: 78ec9a0c6f2327a4fcaf4c58c1a0eca847f61cf6ab4587b32fbe14da10c03781
                                                          • Opcode Fuzzy Hash: 71792b31970009d031222a71e68080d42a2a32fab602c5d31cdd6cc67f6bb7ad
                                                          • Instruction Fuzzy Hash: F9F017755403907EEB200723AC08EBB2EBDD7C6F50B12009AFA08B35A0C261084ADBB0

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1232 db3b1c-db3b27 1233 db3b99-db3b9b 1232->1233 1234 db3b29-db3b2e 1232->1234 1235 db3b8c-db3b8f 1233->1235 1234->1233 1236 db3b30-db3b48 RegOpenKeyExW 1234->1236 1236->1233 1237 db3b4a-db3b69 RegQueryValueExW 1236->1237 1238 db3b6b-db3b76 1237->1238 1239 db3b80-db3b8b RegCloseKey 1237->1239 1240 db3b78-db3b7a 1238->1240 1241 db3b90-db3b97 1238->1241 1239->1235 1242 db3b7e 1240->1242 1241->1242 1242->1239
                                                          APIs
                                                          • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00DB3B0F,SwapMouseButtons,00000004,?), ref: 00DB3B40
                                                          • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00DB3B0F,SwapMouseButtons,00000004,?), ref: 00DB3B61
                                                          • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00DB3B0F,SwapMouseButtons,00000004,?), ref: 00DB3B83
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseOpenQueryValue
                                                          • String ID: Control Panel\Mouse
                                                          • API String ID: 3677997916-824357125
                                                          • Opcode ID: 302e90ca08f8fccdc49d34b30252f1e28f7ddb6bcdbdcbb949779562033df659
                                                          • Instruction ID: bdb72df4296fbe11c30f13ad7bbf80210160d4cb8534f37365368ad00d555b5e
                                                          • Opcode Fuzzy Hash: 302e90ca08f8fccdc49d34b30252f1e28f7ddb6bcdbdcbb949779562033df659
                                                          • Instruction Fuzzy Hash: 43115AB5511208FFDB208FA5DC44AEEB7B8EF01740B104559A806E7114D631AE44A764
                                                          APIs
                                                          • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00DF33A2
                                                            • Part of subcall function 00DB6B57: _wcslen.LIBCMT ref: 00DB6B6A
                                                          • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00DB3A04
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: IconLoadNotifyShell_String_wcslen
                                                          • String ID: Line:
                                                          • API String ID: 2289894680-1585850449
                                                          • Opcode ID: 84accb26a7ccbcb774c668ded32a0852195a552462089cd598c5470fd87d65e9
                                                          • Instruction ID: 0549f537f5b67dc31bd835d2a36c9e987c8a00a6a0bc77e0fada043f285f5d32
                                                          • Opcode Fuzzy Hash: 84accb26a7ccbcb774c668ded32a0852195a552462089cd598c5470fd87d65e9
                                                          • Instruction Fuzzy Hash: 3C31DE71408304EEC720EB24DC45BEBB7ECEB40710F15456AF59AA2191EF709A49CBF2
                                                          APIs
                                                          • GetOpenFileNameW.COMDLG32(?), ref: 00DF2C8C
                                                            • Part of subcall function 00DB3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00DB3A97,?,?,00DB2E7F,?,?,?,00000000), ref: 00DB3AC2
                                                            • Part of subcall function 00DB2DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00DB2DC4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Name$Path$FileFullLongOpen
                                                          • String ID: X$`e
                                                          • API String ID: 779396738-4036142377
                                                          • Opcode ID: 14a20cdb75a3079565e4816f75ae98e3450e526adff5ad526345d0fdb2d2055c
                                                          • Instruction ID: d1278efc45def650346efc0e32ca4ef4d0e971c7e334a90aa3c73c27a849a56e
                                                          • Opcode Fuzzy Hash: 14a20cdb75a3079565e4816f75ae98e3450e526adff5ad526345d0fdb2d2055c
                                                          • Instruction Fuzzy Hash: F5218171A002589ECB01DF94C845BEE7BF8EF49304F008059E549B7241EBB49A498BB1
                                                          APIs
                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00DD0668
                                                            • Part of subcall function 00DD32A4: RaiseException.KERNEL32(?,?,?,00DD068A,?,00E81444,?,?,?,?,?,?,00DD068A,00DB1129,00E78738,00DB1129), ref: 00DD3304
                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00DD0685
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw$ExceptionRaise
                                                          • String ID: Unknown exception
                                                          • API String ID: 3476068407-410509341
                                                          • Opcode ID: 1c030d7193829771b42f952b0c1e5d8b1c79cd3d358adeb8482c743ea9ddf63a
                                                          • Instruction ID: 528a49d1bdfb002cade88e171046eda163765c850e9bf3d27e3434ad37c2dbe7
                                                          • Opcode Fuzzy Hash: 1c030d7193829771b42f952b0c1e5d8b1c79cd3d358adeb8482c743ea9ddf63a
                                                          • Instruction Fuzzy Hash: 3DF0C23490030E77CB10BAA4E84AE9E7F6D9E80350F604137F818D6691EF71DA25C5B1
                                                          APIs
                                                            • Part of subcall function 00DB1BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00DB1BF4
                                                            • Part of subcall function 00DB1BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00DB1BFC
                                                            • Part of subcall function 00DB1BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00DB1C07
                                                            • Part of subcall function 00DB1BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00DB1C12
                                                            • Part of subcall function 00DB1BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00DB1C1A
                                                            • Part of subcall function 00DB1BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00DB1C22
                                                            • Part of subcall function 00DB1B4A: RegisterWindowMessageW.USER32(00000004,?,00DB12C4), ref: 00DB1BA2
                                                          • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00DB136A
                                                          • OleInitialize.OLE32 ref: 00DB1388
                                                          • CloseHandle.KERNEL32(00000000,00000000), ref: 00DF24AB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                          • String ID:
                                                          • API String ID: 1986988660-0
                                                          • Opcode ID: bf3f670a7b0b131e1ba93f7df006887b86f93edfcd0778d886f8abcc09adb3d6
                                                          • Instruction ID: d69edad43e1c0ba352dd7bf4fd257a604adaaf05cbc6701b61c17d1b60458f8a
                                                          • Opcode Fuzzy Hash: bf3f670a7b0b131e1ba93f7df006887b86f93edfcd0778d886f8abcc09adb3d6
                                                          • Instruction Fuzzy Hash: 76719CB49113408FC788EFBBA8566953AE8FBC934475491AED01EF7261EB30440B8F65
                                                          APIs
                                                          • CloseHandle.KERNELBASE(00000000,00000000,?,?,00DE85CC,?,00E78CC8,0000000C), ref: 00DE8704
                                                          • GetLastError.KERNEL32(?,00DE85CC,?,00E78CC8,0000000C), ref: 00DE870E
                                                          • __dosmaperr.LIBCMT ref: 00DE8739
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseErrorHandleLast__dosmaperr
                                                          • String ID:
                                                          • API String ID: 2583163307-0
                                                          • Opcode ID: 37257d9ecab1f3af9c959d601676d8f0aa622660c372291d1f89c9b1f92758d5
                                                          • Instruction ID: 36962d1f581e6b08e59f29e619cfaf630b07cde5cdacb867f14168d9734fbd23
                                                          • Opcode Fuzzy Hash: 37257d9ecab1f3af9c959d601676d8f0aa622660c372291d1f89c9b1f92758d5
                                                          • Instruction Fuzzy Hash: 5E012B326056E02AD6647737A94577E67498B827B8F3D015DF81C9B1D2DEA0CC85A270
                                                          APIs
                                                          • __Init_thread_footer.LIBCMT ref: 00DC17F6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Init_thread_footer
                                                          • String ID: CALL
                                                          • API String ID: 1385522511-4196123274
                                                          • Opcode ID: 9793b04b82bf615b06c8ebfbe2876b73157f22bbc436fe03e024417f31ffb297
                                                          • Instruction ID: df3203ed97e6f76fd91c5d89a5147bcbef9bb7257e88f5c9dde40119bd184e59
                                                          • Opcode Fuzzy Hash: 9793b04b82bf615b06c8ebfbe2876b73157f22bbc436fe03e024417f31ffb297
                                                          • Instruction Fuzzy Hash: D0226A746082529FC714DF14C480F6ABBF2FF86314F28895DF4969B2A2D731E855CBA2
                                                          APIs
                                                          • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00DB3908
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_
                                                          • String ID:
                                                          • API String ID: 1144537725-0
                                                          • Opcode ID: a42c80e88b46af44339e6e8c30c5158f6358bda8bab04cc08b9acda51c8491ab
                                                          • Instruction ID: 12d8c9b34ec77464e0542a46fa10a4ac5081b1eb2a77487d4335fcd8a6b30503
                                                          • Opcode Fuzzy Hash: a42c80e88b46af44339e6e8c30c5158f6358bda8bab04cc08b9acda51c8491ab
                                                          • Instruction Fuzzy Hash: 2831C174504701DFD720DF25D8847D7BBE8FB49308F04096EF59A93240E771AA49DB62
                                                          APIs
                                                            • Part of subcall function 00DB4E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00DB4EDD,?,00E81418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DB4E9C
                                                            • Part of subcall function 00DB4E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00DB4EAE
                                                            • Part of subcall function 00DB4E90: FreeLibrary.KERNEL32(00000000,?,?,00DB4EDD,?,00E81418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DB4EC0
                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00E81418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DB4EFD
                                                            • Part of subcall function 00DB4E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00DF3CDE,?,00E81418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DB4E62
                                                            • Part of subcall function 00DB4E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00DB4E74
                                                            • Part of subcall function 00DB4E59: FreeLibrary.KERNEL32(00000000,?,?,00DF3CDE,?,00E81418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DB4E87
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Library$Load$AddressFreeProc
                                                          • String ID:
                                                          • API String ID: 2632591731-0
                                                          • Opcode ID: 7e9a57040f599f38af9712c91a6408e257e92b7a8ae0e5123e8befee7b5e4cb9
                                                          • Instruction ID: 3b7bb1e1df0b884bbe71e6899005dbf8d37397ec6ad4fc5750d4687de82f8d58
                                                          • Opcode Fuzzy Hash: 7e9a57040f599f38af9712c91a6408e257e92b7a8ae0e5123e8befee7b5e4cb9
                                                          • Instruction Fuzzy Hash: AE118F32610205EADB14EB64E812FED77A5EF44B50F208429F583AB1D6EEB0DA459B70
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: __wsopen_s
                                                          • String ID:
                                                          • API String ID: 3347428461-0
                                                          • Opcode ID: 3283d99b2a9a0a28c598a4a0e5e76584636a576392281767f67e9e7dba56927c
                                                          • Instruction ID: c76784a38d6039c943900531696dfa3ead1d5f04c65fddeb9abc1d2e5f700aba
                                                          • Opcode Fuzzy Hash: 3283d99b2a9a0a28c598a4a0e5e76584636a576392281767f67e9e7dba56927c
                                                          • Instruction Fuzzy Hash: 3611487190420AAFCB05DF99E94099A7BF5EF48314F144059F808AB352DA30DA11DBA4
                                                          APIs
                                                            • Part of subcall function 00DE4C7D: RtlAllocateHeap.NTDLL(00000008,00DB1129,00000000,?,00DE2E29,00000001,00000364,?,?,?,00DDF2DE,00DE3863,00E81444,?,00DCFDF5,?), ref: 00DE4CBE
                                                          • _free.LIBCMT ref: 00DE506C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap_free
                                                          • String ID:
                                                          • API String ID: 614378929-0
                                                          • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                          • Instruction ID: 78287b369431bbb4db7f0f949e4684f73f5b47a7e3651011151086e74d7a3421
                                                          • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                          • Instruction Fuzzy Hash: 63012B722047445BE3319E66D84595AFBECFB85370F65051DF184832C0E670A805C774
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                          • Instruction ID: 1f3e628732dfb3e80d702b773da361e642c57dd6e454c5baa54958420a8cc755
                                                          • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                          • Instruction Fuzzy Hash: 38F02832511A1496CB313B6A8C05B6A339CDF52334F140B1BF4259B3D2DB74E8028AB5
                                                          APIs
                                                          • RtlAllocateHeap.NTDLL(00000008,00DB1129,00000000,?,00DE2E29,00000001,00000364,?,?,?,00DDF2DE,00DE3863,00E81444,?,00DCFDF5,?), ref: 00DE4CBE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1279760036-0
                                                          • Opcode ID: 6c62dc58cb79c49bd7e9770d3e4c87cb18f1a86139d19eecae94b0df0748dae2
                                                          • Instruction ID: 65522b3e155bc1d13429f910b3778fc94c08aa2c8596efc76bd44df5b23800b1
                                                          • Opcode Fuzzy Hash: 6c62dc58cb79c49bd7e9770d3e4c87cb18f1a86139d19eecae94b0df0748dae2
                                                          • Instruction Fuzzy Hash: B5F0E2316032A46BDB217F739D09B5A3788FF817A0B394126B81AEB690CE30D80186F0
                                                          APIs
                                                          • RtlAllocateHeap.NTDLL(00000000,?,00E81444,?,00DCFDF5,?,?,00DBA976,00000010,00E81440,00DB13FC,?,00DB13C6,?,00DB1129), ref: 00DE3852
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1279760036-0
                                                          • Opcode ID: a56d766b68a2c76ae3d86c5095feada40a5046b05d815a979eef82651ecc8aff
                                                          • Instruction ID: 89d1fa5fdc13b71b056531eef260fb68ac43bf623354198916017c4e4179d8e4
                                                          • Opcode Fuzzy Hash: a56d766b68a2c76ae3d86c5095feada40a5046b05d815a979eef82651ecc8aff
                                                          • Instruction Fuzzy Hash: D3E065311023A46BD63137779C49BBA3759EF827B0F190126BC55A7691DB21DD0182F1
                                                          APIs
                                                          • FreeLibrary.KERNEL32(?,?,00E81418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DB4F6D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: FreeLibrary
                                                          • String ID:
                                                          • API String ID: 3664257935-0
                                                          • Opcode ID: 3f57cfaddbf9e6a458a2d07f2a234046b56cf5e6325899297bf16c7f0a385e40
                                                          • Instruction ID: 350616de25c62d4e5ee7ed34f8e5eb3b43a44b8a73af855b943bdc8926f42cce
                                                          • Opcode Fuzzy Hash: 3f57cfaddbf9e6a458a2d07f2a234046b56cf5e6325899297bf16c7f0a385e40
                                                          • Instruction Fuzzy Hash: E9F0157150A752CFDB34DF64D4908A6BBF4EF18329324896EE1EB83622C7319848DF20
                                                          APIs
                                                          • Shell_NotifyIconW.SHELL32(00000002,?), ref: 00DB314E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_
                                                          • String ID:
                                                          • API String ID: 1144537725-0
                                                          • Opcode ID: bec16070b034475c68d6e76b8da1fb0281b183a736ffa37454807531081d0b13
                                                          • Instruction ID: e3223e26b3f6ffcbc8d25aa4c63d82fd80fce02ed6652969c9b0f5ef3a8ee5ca
                                                          • Opcode Fuzzy Hash: bec16070b034475c68d6e76b8da1fb0281b183a736ffa37454807531081d0b13
                                                          • Instruction Fuzzy Hash: F5F030709143189FEB529B25DC4A7DA7BBCAB0170CF0400E9A68DB7292EB745B8DCF51
                                                          APIs
                                                          • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00DB2DC4
                                                            • Part of subcall function 00DB6B57: _wcslen.LIBCMT ref: 00DB6B6A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: LongNamePath_wcslen
                                                          • String ID:
                                                          • API String ID: 541455249-0
                                                          • Opcode ID: c1940dd6d32b26be59c73d616b007a65fafbf81ae9587ff7ac945a1f7c96dd16
                                                          • Instruction ID: 36aba2aeecbd729a252d36381456a52484e9f02b97124b0b32b7341d63b9f582
                                                          • Opcode Fuzzy Hash: c1940dd6d32b26be59c73d616b007a65fafbf81ae9587ff7ac945a1f7c96dd16
                                                          • Instruction Fuzzy Hash: 58E0CD766051245BC71092599C05FEA77EDDFC8790F054071FD09E7258D9A4ED848574
                                                          APIs
                                                            • Part of subcall function 00DB3837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00DB3908
                                                            • Part of subcall function 00DBD730: GetInputState.USER32 ref: 00DBD807
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00DB2B6B
                                                            • Part of subcall function 00DB30F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 00DB314E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                          • String ID:
                                                          • API String ID: 3667716007-0
                                                          • Opcode ID: 01d3b30307c7ace4bad63ccddbb99f13b67555f747a45258a0aef9cc35e6fddb
                                                          • Instruction ID: af15dab5f6d2c8bcf5a815c4ec1e26fa6e7afb3574a3e32b289d874bffd5690e
                                                          • Opcode Fuzzy Hash: 01d3b30307c7ace4bad63ccddbb99f13b67555f747a45258a0aef9cc35e6fddb
                                                          • Instruction Fuzzy Hash: 30E0262630024486C608BF7198628FDB359CBD1311F00157EF14753163CE20494A4332
                                                          APIs
                                                          • CreateFileW.KERNELBASE(00000000,00000000,?,00DF0704,?,?,00000000,?,00DF0704,00000000,0000000C), ref: 00DF03B7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateFile
                                                          • String ID:
                                                          • API String ID: 823142352-0
                                                          • Opcode ID: b315b51213f8681a6934c15448bfdb0deaa4e570b4b4a2f42a370fbf6c73ca2f
                                                          • Instruction ID: 69cc975cc750f6a9aa7f94c99a48027926f644166e1d169937359a666828c28b
                                                          • Opcode Fuzzy Hash: b315b51213f8681a6934c15448bfdb0deaa4e570b4b4a2f42a370fbf6c73ca2f
                                                          • Instruction Fuzzy Hash: 28D06C3204010DBFDF028F85DD06EDA3BAAFB48714F114000BE5866120C732E822AB90
                                                          APIs
                                                          • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00DB1CBC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: InfoParametersSystem
                                                          • String ID:
                                                          • API String ID: 3098949447-0
                                                          • Opcode ID: 4634499f9da850df8444a91ff1f83f7d95e7817474cd9330384540e70bf3ec73
                                                          • Instruction ID: 969a3d2e6ad9a9de3bb06949faaecad8fa06bea02da9eabc79548447e1a46b4f
                                                          • Opcode Fuzzy Hash: 4634499f9da850df8444a91ff1f83f7d95e7817474cd9330384540e70bf3ec73
                                                          • Instruction Fuzzy Hash: 87C0923A2C0304AFF2148BC2FC4AF547768A34CB00F148001F70DBA5E3C3A22829EB51
                                                          APIs
                                                            • Part of subcall function 00DC9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DC9BB2
                                                          • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00E4961A
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00E4965B
                                                          • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00E4969F
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00E496C9
                                                          • SendMessageW.USER32 ref: 00E496F2
                                                          • GetKeyState.USER32(00000011), ref: 00E4978B
                                                          • GetKeyState.USER32(00000009), ref: 00E49798
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00E497AE
                                                          • GetKeyState.USER32(00000010), ref: 00E497B8
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00E497E9
                                                          • SendMessageW.USER32 ref: 00E49810
                                                          • SendMessageW.USER32(?,00001030,?,00E47E95), ref: 00E49918
                                                          • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00E4992E
                                                          • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00E49941
                                                          • SetCapture.USER32(?), ref: 00E4994A
                                                          • ClientToScreen.USER32(?,?), ref: 00E499AF
                                                          • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00E499BC
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00E499D6
                                                          • ReleaseCapture.USER32 ref: 00E499E1
                                                          • GetCursorPos.USER32(?), ref: 00E49A19
                                                          • ScreenToClient.USER32(?,?), ref: 00E49A26
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 00E49A80
                                                          • SendMessageW.USER32 ref: 00E49AAE
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00E49AEB
                                                          • SendMessageW.USER32 ref: 00E49B1A
                                                          • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00E49B3B
                                                          • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00E49B4A
                                                          • GetCursorPos.USER32(?), ref: 00E49B68
                                                          • ScreenToClient.USER32(?,?), ref: 00E49B75
                                                          • GetParent.USER32(?), ref: 00E49B93
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 00E49BFA
                                                          • SendMessageW.USER32 ref: 00E49C2B
                                                          • ClientToScreen.USER32(?,?), ref: 00E49C84
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00E49CB4
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00E49CDE
                                                          • SendMessageW.USER32 ref: 00E49D01
                                                          • ClientToScreen.USER32(?,?), ref: 00E49D4E
                                                          • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00E49D82
                                                            • Part of subcall function 00DC9944: GetWindowLongW.USER32(?,000000EB), ref: 00DC9952
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00E49E05
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                          • String ID: @GUI_DRAGID$F$p#
                                                          • API String ID: 3429851547-638943876
                                                          • Opcode ID: 16cbc55ce6c3622ecc1357c07fc52e45552412e1a41bb57ec0fe159ca7b34cd0
                                                          • Instruction ID: fae8280d050c19d6166041c931cb4306efba56d860afc8499d157eb651be9f6e
                                                          • Opcode Fuzzy Hash: 16cbc55ce6c3622ecc1357c07fc52e45552412e1a41bb57ec0fe159ca7b34cd0
                                                          • Instruction Fuzzy Hash: 2442CC34204201AFDB20CF24DC48EABBBE5FF89314F115699F699B72A2D731A855CF52
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 00E448F3
                                                          • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00E44908
                                                          • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00E44927
                                                          • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 00E4494B
                                                          • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 00E4495C
                                                          • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 00E4497B
                                                          • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 00E449AE
                                                          • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 00E449D4
                                                          • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00E44A0F
                                                          • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00E44A56
                                                          • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00E44A7E
                                                          • IsMenu.USER32(?), ref: 00E44A97
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00E44AF2
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00E44B20
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00E44B94
                                                          • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00E44BE3
                                                          • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00E44C82
                                                          • wsprintfW.USER32 ref: 00E44CAE
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00E44CC9
                                                          • GetWindowTextW.USER32(?,00000000,00000001), ref: 00E44CF1
                                                          • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00E44D13
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00E44D33
                                                          • GetWindowTextW.USER32(?,00000000,00000001), ref: 00E44D5A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                          • String ID: %d/%02d/%02d
                                                          • API String ID: 4054740463-328681919
                                                          • Opcode ID: 1ff03a4c7bfb6ba1da2958eb722a729fdfdbfe8faa69126877e39483a425978c
                                                          • Instruction ID: c0323217b18b9dc5ecf8fdaba8b35a379805be7152af8aa1e466bb0c5d994fc1
                                                          • Opcode Fuzzy Hash: 1ff03a4c7bfb6ba1da2958eb722a729fdfdbfe8faa69126877e39483a425978c
                                                          • Instruction Fuzzy Hash: E512FFB1600204AFEB248F25EC49FAE7BE8EF85714F105119F916FB2E1DB749A45CB60
                                                          APIs
                                                          • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 00DCF998
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00E0F474
                                                          • IsIconic.USER32(00000000), ref: 00E0F47D
                                                          • ShowWindow.USER32(00000000,00000009), ref: 00E0F48A
                                                          • SetForegroundWindow.USER32(00000000), ref: 00E0F494
                                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00E0F4AA
                                                          • GetCurrentThreadId.KERNEL32 ref: 00E0F4B1
                                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00E0F4BD
                                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 00E0F4CE
                                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 00E0F4D6
                                                          • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 00E0F4DE
                                                          • SetForegroundWindow.USER32(00000000), ref: 00E0F4E1
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00E0F4F6
                                                          • keybd_event.USER32(00000012,00000000), ref: 00E0F501
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00E0F50B
                                                          • keybd_event.USER32(00000012,00000000), ref: 00E0F510
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00E0F519
                                                          • keybd_event.USER32(00000012,00000000), ref: 00E0F51E
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00E0F528
                                                          • keybd_event.USER32(00000012,00000000), ref: 00E0F52D
                                                          • SetForegroundWindow.USER32(00000000), ref: 00E0F530
                                                          • AttachThreadInput.USER32(?,000000FF,00000000), ref: 00E0F557
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 4125248594-2988720461
                                                          • Opcode ID: cd6cb3cdf71e9b8e17c20d346f5879890c49ab64ad9ea70f51fcedb70b55f4a4
                                                          • Instruction ID: 6a28b56e719f2d194d8bb2516a9ea92d15e594c27fdad87f1063008aaefff0cb
                                                          • Opcode Fuzzy Hash: cd6cb3cdf71e9b8e17c20d346f5879890c49ab64ad9ea70f51fcedb70b55f4a4
                                                          • Instruction Fuzzy Hash: AD31A375A41218BFEB306BB64C4AFBF7E6CEB45B54F210066FA00F71D1C6B09D51AA60
                                                          APIs
                                                            • Part of subcall function 00E116C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00E1170D
                                                            • Part of subcall function 00E116C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00E1173A
                                                            • Part of subcall function 00E116C3: GetLastError.KERNEL32 ref: 00E1174A
                                                          • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00E11286
                                                          • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 00E112A8
                                                          • CloseHandle.KERNEL32(?), ref: 00E112B9
                                                          • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00E112D1
                                                          • GetProcessWindowStation.USER32 ref: 00E112EA
                                                          • SetProcessWindowStation.USER32(00000000), ref: 00E112F4
                                                          • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00E11310
                                                            • Part of subcall function 00E110BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00E111FC), ref: 00E110D4
                                                            • Part of subcall function 00E110BF: CloseHandle.KERNEL32(?,?,00E111FC), ref: 00E110E9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                          • String ID: $default$winsta0$Z
                                                          • API String ID: 22674027-1808616255
                                                          • Opcode ID: 8e22e607fcc2e0e1ed13e8f042e3d78dd9345f2c4d027a7c82b731eb34b6d8ae
                                                          • Instruction ID: 3989d1c2fc0ed22575ca30e7629fdde7c6074254c8c8e1d9535d8d3782a0a4f8
                                                          • Opcode Fuzzy Hash: 8e22e607fcc2e0e1ed13e8f042e3d78dd9345f2c4d027a7c82b731eb34b6d8ae
                                                          • Instruction Fuzzy Hash: D281B171901209AFDF209FA5DC49FEE7BB9EF05B04F1451A9FA20F61A0D7718985CB21
                                                          APIs
                                                            • Part of subcall function 00E110F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00E11114
                                                            • Part of subcall function 00E110F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00E10B9B,?,?,?), ref: 00E11120
                                                            • Part of subcall function 00E110F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00E10B9B,?,?,?), ref: 00E1112F
                                                            • Part of subcall function 00E110F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00E10B9B,?,?,?), ref: 00E11136
                                                            • Part of subcall function 00E110F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00E1114D
                                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00E10BCC
                                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00E10C00
                                                          • GetLengthSid.ADVAPI32(?), ref: 00E10C17
                                                          • GetAce.ADVAPI32(?,00000000,?), ref: 00E10C51
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00E10C6D
                                                          • GetLengthSid.ADVAPI32(?), ref: 00E10C84
                                                          • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00E10C8C
                                                          • HeapAlloc.KERNEL32(00000000), ref: 00E10C93
                                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00E10CB4
                                                          • CopySid.ADVAPI32(00000000), ref: 00E10CBB
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00E10CEA
                                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00E10D0C
                                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00E10D1E
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E10D45
                                                          • HeapFree.KERNEL32(00000000), ref: 00E10D4C
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E10D55
                                                          • HeapFree.KERNEL32(00000000), ref: 00E10D5C
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E10D65
                                                          • HeapFree.KERNEL32(00000000), ref: 00E10D6C
                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 00E10D78
                                                          • HeapFree.KERNEL32(00000000), ref: 00E10D7F
                                                            • Part of subcall function 00E11193: GetProcessHeap.KERNEL32(00000008,00E10BB1,?,00000000,?,00E10BB1,?), ref: 00E111A1
                                                            • Part of subcall function 00E11193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00E10BB1,?), ref: 00E111A8
                                                            • Part of subcall function 00E11193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00E10BB1,?), ref: 00E111B7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                          • String ID:
                                                          • API String ID: 4175595110-0
                                                          • Opcode ID: a1f62fd99d881975cd6e0a38f45869bc9a6cb743a48e85dfe99d83826180bf27
                                                          • Instruction ID: 49afb4ec6a6bec219403875a8ebe4d49a110e5706a636b94fcaa957a742f9c1b
                                                          • Opcode Fuzzy Hash: a1f62fd99d881975cd6e0a38f45869bc9a6cb743a48e85dfe99d83826180bf27
                                                          • Instruction Fuzzy Hash: C0717CB690120AAFDF10DFA5EC44BEEBBB8BF05304F144515E914B7291D7B1A986CBA0
                                                          APIs
                                                          • OpenClipboard.USER32(00E4CC08), ref: 00E2EB29
                                                          • IsClipboardFormatAvailable.USER32(0000000D), ref: 00E2EB37
                                                          • GetClipboardData.USER32(0000000D), ref: 00E2EB43
                                                          • CloseClipboard.USER32 ref: 00E2EB4F
                                                          • GlobalLock.KERNEL32(00000000), ref: 00E2EB87
                                                          • CloseClipboard.USER32 ref: 00E2EB91
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00E2EBBC
                                                          • IsClipboardFormatAvailable.USER32(00000001), ref: 00E2EBC9
                                                          • GetClipboardData.USER32(00000001), ref: 00E2EBD1
                                                          • GlobalLock.KERNEL32(00000000), ref: 00E2EBE2
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00E2EC22
                                                          • IsClipboardFormatAvailable.USER32(0000000F), ref: 00E2EC38
                                                          • GetClipboardData.USER32(0000000F), ref: 00E2EC44
                                                          • GlobalLock.KERNEL32(00000000), ref: 00E2EC55
                                                          • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 00E2EC77
                                                          • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00E2EC94
                                                          • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00E2ECD2
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00E2ECF3
                                                          • CountClipboardFormats.USER32 ref: 00E2ED14
                                                          • CloseClipboard.USER32 ref: 00E2ED59
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                          • String ID:
                                                          • API String ID: 420908878-0
                                                          • Opcode ID: d2f722e98d3035d377270782c142c71e0bc469529650d5c15e62015fe860ae1e
                                                          • Instruction ID: 966948ad05bc24c787aec582e282031de084f0adffd94254a35dd0b74d68a654
                                                          • Opcode Fuzzy Hash: d2f722e98d3035d377270782c142c71e0bc469529650d5c15e62015fe860ae1e
                                                          • Instruction Fuzzy Hash: 5E61F0382043219FD310EF25E899F6AB7A4EF85708F245459F456A73A1CB71DD0ACB62
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00E269BE
                                                          • FindClose.KERNEL32(00000000), ref: 00E26A12
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00E26A4E
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00E26A75
                                                            • Part of subcall function 00DB9CB3: _wcslen.LIBCMT ref: 00DB9CBD
                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00E26AB2
                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00E26ADF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                          • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                          • API String ID: 3830820486-3289030164
                                                          • Opcode ID: aef66aecc40a240be490f8fe3d7f729e172bb52dff1c2e1e250e9f8dfe859dba
                                                          • Instruction ID: a846a567e9f3b227f3eee25e2d4c60aed1e771c725cf6619090c15612544b3e3
                                                          • Opcode Fuzzy Hash: aef66aecc40a240be490f8fe3d7f729e172bb52dff1c2e1e250e9f8dfe859dba
                                                          • Instruction Fuzzy Hash: E4D12EB2508340AFC714EBA4D891EABB7E8EF88704F44491DF58AD7191EB74DA44CB72
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 00E29663
                                                          • GetFileAttributesW.KERNEL32(?), ref: 00E296A1
                                                          • SetFileAttributesW.KERNEL32(?,?), ref: 00E296BB
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00E296D3
                                                          • FindClose.KERNEL32(00000000), ref: 00E296DE
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 00E296FA
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00E2974A
                                                          • SetCurrentDirectoryW.KERNEL32(00E76B7C), ref: 00E29768
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00E29772
                                                          • FindClose.KERNEL32(00000000), ref: 00E2977F
                                                          • FindClose.KERNEL32(00000000), ref: 00E2978F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                          • String ID: *.*
                                                          • API String ID: 1409584000-438819550
                                                          • Opcode ID: b83a12e970319fe3ac98967ff8389eea43804a8021190158304cbe8ccbaa3a7a
                                                          • Instruction ID: 3a2ce3a6b419245f4434cb3b5652603a6dbd1e9ac2246645219ebbbd54e76b98
                                                          • Opcode Fuzzy Hash: b83a12e970319fe3ac98967ff8389eea43804a8021190158304cbe8ccbaa3a7a
                                                          • Instruction Fuzzy Hash: 1031F3365016296FDB10AFB5FC48ADE77ACAF0A324F206056F904F31A1DB74DD498A24
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 00E297BE
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00E29819
                                                          • FindClose.KERNEL32(00000000), ref: 00E29824
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 00E29840
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00E29890
                                                          • SetCurrentDirectoryW.KERNEL32(00E76B7C), ref: 00E298AE
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00E298B8
                                                          • FindClose.KERNEL32(00000000), ref: 00E298C5
                                                          • FindClose.KERNEL32(00000000), ref: 00E298D5
                                                            • Part of subcall function 00E1DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00E1DB00
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                          • String ID: *.*
                                                          • API String ID: 2640511053-438819550
                                                          • Opcode ID: e13efe3af0c441073dad9b447543ea6b7ade383554e4c4d4723fcd513cd376b5
                                                          • Instruction ID: d6a34095dbce6073289ab9c33e08bd6b2e00f98c78349a4f7691058f18eef67c
                                                          • Opcode Fuzzy Hash: e13efe3af0c441073dad9b447543ea6b7ade383554e4c4d4723fcd513cd376b5
                                                          • Instruction Fuzzy Hash: B831F4315016296EDB18EFB5FC48ADE77ACEF06324F286156E814F31A2DB70D949CB24
                                                          APIs
                                                            • Part of subcall function 00E3C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00E3B6AE,?,?), ref: 00E3C9B5
                                                            • Part of subcall function 00E3C998: _wcslen.LIBCMT ref: 00E3C9F1
                                                            • Part of subcall function 00E3C998: _wcslen.LIBCMT ref: 00E3CA68
                                                            • Part of subcall function 00E3C998: _wcslen.LIBCMT ref: 00E3CA9E
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E3BF3E
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 00E3BFA9
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00E3BFCD
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00E3C02C
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00E3C0E7
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00E3C154
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00E3C1E9
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 00E3C23A
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00E3C2E3
                                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00E3C382
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00E3C38F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                                          • String ID:
                                                          • API String ID: 3102970594-0
                                                          • Opcode ID: b5748c67d5b197fcbe8e1d278bb83dedfcd3099374bfd90a3c6aa54518079727
                                                          • Instruction ID: b8be0850b761ad2c3a4fea7d0a6f04bcc5668ad4210da95887947205fda3bed9
                                                          • Opcode Fuzzy Hash: b5748c67d5b197fcbe8e1d278bb83dedfcd3099374bfd90a3c6aa54518079727
                                                          • Instruction Fuzzy Hash: 47025E71604200DFC714DF28C895E2ABBE5EF89308F18949DF84AEB2A2D731EC45CB61
                                                          APIs
                                                          • GetLocalTime.KERNEL32(?), ref: 00E28257
                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 00E28267
                                                          • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00E28273
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00E28310
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00E28324
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00E28356
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00E2838C
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00E28395
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectoryTime$File$Local$System
                                                          • String ID: *.*
                                                          • API String ID: 1464919966-438819550
                                                          • Opcode ID: bf7655d32a5c0a4e8784fb2401d58108727d24120a008905cf06309afc91e1e3
                                                          • Instruction ID: dd324d95df3a4114b1ea4a64817d89cc8ed9ae0e7fa59fdd1bd88a4a8f0bc97f
                                                          • Opcode Fuzzy Hash: bf7655d32a5c0a4e8784fb2401d58108727d24120a008905cf06309afc91e1e3
                                                          • Instruction Fuzzy Hash: BF618D725053159FCB10EF60D8409AEB3E8FF89314F14891EF98AE7251EB31E945CBA2
                                                          APIs
                                                            • Part of subcall function 00DB3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00DB3A97,?,?,00DB2E7F,?,?,?,00000000), ref: 00DB3AC2
                                                            • Part of subcall function 00E1E199: GetFileAttributesW.KERNEL32(?,00E1CF95), ref: 00E1E19A
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00E1D122
                                                          • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 00E1D1DD
                                                          • MoveFileW.KERNEL32(?,?), ref: 00E1D1F0
                                                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 00E1D20D
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00E1D237
                                                            • Part of subcall function 00E1D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00E1D21C,?,?), ref: 00E1D2B2
                                                          • FindClose.KERNEL32(00000000,?,?,?), ref: 00E1D253
                                                          • FindClose.KERNEL32(00000000), ref: 00E1D264
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                          • String ID: \*.*
                                                          • API String ID: 1946585618-1173974218
                                                          • Opcode ID: ca36c4f4cc11cbf2d2ee10b0c9cb23ed5fbdc253f9f6fcf161bfdc11f78d6979
                                                          • Instruction ID: cb946333946c2e4009395366a9e8977fde394e2a9a73085fadad6f6537266f39
                                                          • Opcode Fuzzy Hash: ca36c4f4cc11cbf2d2ee10b0c9cb23ed5fbdc253f9f6fcf161bfdc11f78d6979
                                                          • Instruction Fuzzy Hash: BC61773180614DAACF05EBA4CE929EDB7B9EF15304F604069E412731A2EB30AF49DB70
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                          • String ID:
                                                          • API String ID: 1737998785-0
                                                          • Opcode ID: 471186dcffc33d768e0ade42f1365710a1500fd3a28f125277927b250f2c1b40
                                                          • Instruction ID: 881d42546b4d36b570e30f7e5d6262218ccfd1b682417ec53cacacd277eb8c1a
                                                          • Opcode Fuzzy Hash: 471186dcffc33d768e0ade42f1365710a1500fd3a28f125277927b250f2c1b40
                                                          • Instruction Fuzzy Hash: B141C1352056219FD310CF16E848B59BBE5FF45318F16D099E41AAB762C771EC42CB90
                                                          APIs
                                                            • Part of subcall function 00E116C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00E1170D
                                                            • Part of subcall function 00E116C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00E1173A
                                                            • Part of subcall function 00E116C3: GetLastError.KERNEL32 ref: 00E1174A
                                                          • ExitWindowsEx.USER32(?,00000000), ref: 00E1E932
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                          • String ID: $ $@$SeShutdownPrivilege
                                                          • API String ID: 2234035333-3163812486
                                                          • Opcode ID: 2f27c895738944e7176703e19ee3c4af752949bcf78a4f3560a3173bcbd06b6a
                                                          • Instruction ID: 0034ad720edb1fe25043a8229bd3d7f82934ab67c08f85449dbf16e164fb837f
                                                          • Opcode Fuzzy Hash: 2f27c895738944e7176703e19ee3c4af752949bcf78a4f3560a3173bcbd06b6a
                                                          • Instruction Fuzzy Hash: 2E017D73A10311AFEB5422B59C86FFF729CAB48744F242462FD13F32D1D5A55CC481A4
                                                          APIs
                                                          • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00E31276
                                                          • WSAGetLastError.WSOCK32 ref: 00E31283
                                                          • bind.WSOCK32(00000000,?,00000010), ref: 00E312BA
                                                          • WSAGetLastError.WSOCK32 ref: 00E312C5
                                                          • closesocket.WSOCK32(00000000), ref: 00E312F4
                                                          • listen.WSOCK32(00000000,00000005), ref: 00E31303
                                                          • WSAGetLastError.WSOCK32 ref: 00E3130D
                                                          • closesocket.WSOCK32(00000000), ref: 00E3133C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$closesocket$bindlistensocket
                                                          • String ID:
                                                          • API String ID: 540024437-0
                                                          • Opcode ID: 6d4b627233029d5cd87db566fe8b7a0ded4f7e53cfeee5e28ebae59f9401dcbb
                                                          • Instruction ID: 9b4e6295ec725d6e4928372cf60064dc9f41938b60b1c69ac21a64a7d407ae6b
                                                          • Opcode Fuzzy Hash: 6d4b627233029d5cd87db566fe8b7a0ded4f7e53cfeee5e28ebae59f9401dcbb
                                                          • Instruction Fuzzy Hash: 5A4184356001409FD714DF24C488B6ABBE5AF46318F2891CCD856AF2A6C771EC86CBA1
                                                          APIs
                                                          • _free.LIBCMT ref: 00DEB9D4
                                                          • _free.LIBCMT ref: 00DEB9F8
                                                          • _free.LIBCMT ref: 00DEBB7F
                                                          • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00E53700), ref: 00DEBB91
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00E8121C,000000FF,00000000,0000003F,00000000,?,?), ref: 00DEBC09
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00E81270,000000FF,?,0000003F,00000000,?), ref: 00DEBC36
                                                          • _free.LIBCMT ref: 00DEBD4B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                          • String ID:
                                                          • API String ID: 314583886-0
                                                          • Opcode ID: 449c480f0b384d495d8d22ec763ca83ce70ca92fbeaafa14b121f40ef67d6e78
                                                          • Instruction ID: fe16ba9b4ca35d528688d562960bf00f1a41e9d5f8f1c8c6fe7014e243122c05
                                                          • Opcode Fuzzy Hash: 449c480f0b384d495d8d22ec763ca83ce70ca92fbeaafa14b121f40ef67d6e78
                                                          • Instruction Fuzzy Hash: 8BC1E8719042859FDB10FF7B9C41AAB7BA9EF45330F2841ABE49497251D770AE418BB0
                                                          APIs
                                                            • Part of subcall function 00DB3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00DB3A97,?,?,00DB2E7F,?,?,?,00000000), ref: 00DB3AC2
                                                            • Part of subcall function 00E1E199: GetFileAttributesW.KERNEL32(?,00E1CF95), ref: 00E1E19A
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00E1D420
                                                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 00E1D470
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00E1D481
                                                          • FindClose.KERNEL32(00000000), ref: 00E1D498
                                                          • FindClose.KERNEL32(00000000), ref: 00E1D4A1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                          • String ID: \*.*
                                                          • API String ID: 2649000838-1173974218
                                                          • Opcode ID: ff573b0f4db60d820c72a5bb0ca72817ca3281bb754e604be8cf9f8354a0eb69
                                                          • Instruction ID: d9b609c3039984f3a94fec2979eff48e60f57572de25751065f6a9b556d5dd98
                                                          • Opcode Fuzzy Hash: ff573b0f4db60d820c72a5bb0ca72817ca3281bb754e604be8cf9f8354a0eb69
                                                          • Instruction Fuzzy Hash: EE318F3100D381AFC304EF64D8918EFB7E8EE96304F545A1DF4E263191EB20AA099B73
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: __floor_pentium4
                                                          • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                          • API String ID: 4168288129-2761157908
                                                          • Opcode ID: 5e64702bb1ed7bf2d3661679865967bff64106c3137444d80a9d4d38b1831fa7
                                                          • Instruction ID: ee3d93411d18800a31a5eef41dc3fe526b416c957e70bfbaa370db3f325ce6c8
                                                          • Opcode Fuzzy Hash: 5e64702bb1ed7bf2d3661679865967bff64106c3137444d80a9d4d38b1831fa7
                                                          • Instruction Fuzzy Hash: 1EC28D72E046688FDB25EF29DD407EAB7B5EB48305F1841EAD44DE7240E774AE818F60
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 00E264DC
                                                          • CoInitialize.OLE32(00000000), ref: 00E26639
                                                          • CoCreateInstance.OLE32(00E4FCF8,00000000,00000001,00E4FB68,?), ref: 00E26650
                                                          • CoUninitialize.OLE32 ref: 00E268D4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                          • String ID: .lnk
                                                          • API String ID: 886957087-24824748
                                                          • Opcode ID: 4686878a8a939712ef2d13dfbb3181e8e7b76ee562abc4b068f49f1cad9efb52
                                                          • Instruction ID: e90f529b4cad996fb2dac61b5e64b733d08ee7861f14627e765ff93e4af6194e
                                                          • Opcode Fuzzy Hash: 4686878a8a939712ef2d13dfbb3181e8e7b76ee562abc4b068f49f1cad9efb52
                                                          • Instruction Fuzzy Hash: 76D15971508351AFC304EF24D8919ABB7E8FF98704F10496DF5969B2A1EB70ED05CBA2
                                                          APIs
                                                          • GetForegroundWindow.USER32(?,?,00000000), ref: 00E322E8
                                                            • Part of subcall function 00E2E4EC: GetWindowRect.USER32(?,?), ref: 00E2E504
                                                          • GetDesktopWindow.USER32 ref: 00E32312
                                                          • GetWindowRect.USER32(00000000), ref: 00E32319
                                                          • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00E32355
                                                          • GetCursorPos.USER32(?), ref: 00E32381
                                                          • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00E323DF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                          • String ID:
                                                          • API String ID: 2387181109-0
                                                          • Opcode ID: 51f233fe7ec18dae86f11a9ff5fe3895be11b6a3e09e15ee02b7b01942a988c0
                                                          • Instruction ID: 122518acde7ce86f35b0a43fa2896a2e713caf08701c2586c95ab7173f56baec
                                                          • Opcode Fuzzy Hash: 51f233fe7ec18dae86f11a9ff5fe3895be11b6a3e09e15ee02b7b01942a988c0
                                                          • Instruction Fuzzy Hash: 5F312032505316AFCB20DF15C848B9BBBE9FF84314F00191DFA85A7281CB35EA09CB92
                                                          APIs
                                                            • Part of subcall function 00DB9CB3: _wcslen.LIBCMT ref: 00DB9CBD
                                                          • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00E29B78
                                                          • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00E29C8B
                                                            • Part of subcall function 00E23874: GetInputState.USER32 ref: 00E238CB
                                                            • Part of subcall function 00E23874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00E23966
                                                          • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00E29BA8
                                                          • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00E29C75
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                          • String ID: *.*
                                                          • API String ID: 1972594611-438819550
                                                          • Opcode ID: 85f23849b0e2e101f4c7c166d2bf531b4bdc2146ffc7f0a658d65f66a7901fcb
                                                          • Instruction ID: 202e54de0887cde89deb4d09ac69766a8112f90fc2569cf29cebbd5e788b03fc
                                                          • Opcode Fuzzy Hash: 85f23849b0e2e101f4c7c166d2bf531b4bdc2146ffc7f0a658d65f66a7901fcb
                                                          • Instruction Fuzzy Hash: DB417071901219AFDF54DF64D886AEEBBB4FF05314F24605AE405B3192EB309E84CF64
                                                          APIs
                                                            • Part of subcall function 00DC9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DC9BB2
                                                          • DefDlgProcW.USER32(?,?,?,?,?), ref: 00DC9A4E
                                                          • GetSysColor.USER32(0000000F), ref: 00DC9B23
                                                          • SetBkColor.GDI32(?,00000000), ref: 00DC9B36
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Color$LongProcWindow
                                                          • String ID:
                                                          • API String ID: 3131106179-0
                                                          • Opcode ID: 772aa565d00161cc8d89a92ccecc47727f0186753a8b6f5d6eb7845795874805
                                                          • Instruction ID: 2c553f449ac9fe7520ee37fc25396f58f148df456ab213973f2640128cfb234b
                                                          • Opcode Fuzzy Hash: 772aa565d00161cc8d89a92ccecc47727f0186753a8b6f5d6eb7845795874805
                                                          • Instruction Fuzzy Hash: 80A13971608405BEE728AA2D9CADF7BA69DEB82354F18110DF082F76D1CA35ED41D371
                                                          APIs
                                                            • Part of subcall function 00E3304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00E3307A
                                                            • Part of subcall function 00E3304E: _wcslen.LIBCMT ref: 00E3309B
                                                          • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00E3185D
                                                          • WSAGetLastError.WSOCK32 ref: 00E31884
                                                          • bind.WSOCK32(00000000,?,00000010), ref: 00E318DB
                                                          • WSAGetLastError.WSOCK32 ref: 00E318E6
                                                          • closesocket.WSOCK32(00000000), ref: 00E31915
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 1601658205-0
                                                          • Opcode ID: b811392e0e7b16c728124d227bf1c9edd2338b3682fc1720622e32eef3a1f3ca
                                                          • Instruction ID: a0ac72ef650008a01a043f6e726639c7644ffc0bce14f3309330953d5f1b837e
                                                          • Opcode Fuzzy Hash: b811392e0e7b16c728124d227bf1c9edd2338b3682fc1720622e32eef3a1f3ca
                                                          • Instruction Fuzzy Hash: 8D519375A002009FD714AF24C88AF6A7BE5EB89718F18809CF9066F293C675AD41CBB1
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                          • String ID:
                                                          • API String ID: 292994002-0
                                                          • Opcode ID: 4bdb7fc8e263a0d30b1f20490b511f4f84c70cbb826642bdc6d8ff50599be645
                                                          • Instruction ID: 181211469821dd3c4ec1b6d7edd95d16637d6c328c9fc1b5c9f6dd8609340ff3
                                                          • Opcode Fuzzy Hash: 4bdb7fc8e263a0d30b1f20490b511f4f84c70cbb826642bdc6d8ff50599be645
                                                          • Instruction Fuzzy Hash: 1521A6357412115FDB248F1AEC84B6ABBE5EF89319B19A09CE846AB351C771DC82CB90
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                          • API String ID: 0-1546025612
                                                          • Opcode ID: f6eab82f3c68005a95cff78477460caece879b88944d8901619192f904c0d76e
                                                          • Instruction ID: 81b2435954c8a57f252fa282ac84f62bee50a6933dc0fed61c291cbb46dc3b9d
                                                          • Opcode Fuzzy Hash: f6eab82f3c68005a95cff78477460caece879b88944d8901619192f904c0d76e
                                                          • Instruction Fuzzy Hash: 1EA26D70A0021ACBDF24CF58C8407FDB7B5BF54314F2981AAEA56A7685DB30DD81DB60
                                                          APIs
                                                          • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00E182AA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: lstrlen
                                                          • String ID: ($tb$|
                                                          • API String ID: 1659193697-1968160224
                                                          • Opcode ID: f4b0102846b73974389658e322d5724074051bc1b3eb3426d82490e8b2d4fb10
                                                          • Instruction ID: 596300d2e2c16f5b8251b4efa694a1e4f3c8605103089b867ef943fb8d52ec7b
                                                          • Opcode Fuzzy Hash: f4b0102846b73974389658e322d5724074051bc1b3eb3426d82490e8b2d4fb10
                                                          • Instruction Fuzzy Hash: C0324874A007059FC728CF19C581AAAB7F0FF48714B15D56EE49AEB3A1EB70E981CB50
                                                          APIs
                                                          • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 00E1AAAC
                                                          • SetKeyboardState.USER32(00000080), ref: 00E1AAC8
                                                          • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 00E1AB36
                                                          • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 00E1AB88
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: 6b7c0a7b24ad524e4157266ec2cbc9cebb86edb98f8a4364d99c75882b140d9b
                                                          • Instruction ID: 0abcf4c18ecdf62b5fa542f18db3e1338161984cb771c621ea124803a912aabb
                                                          • Opcode Fuzzy Hash: 6b7c0a7b24ad524e4157266ec2cbc9cebb86edb98f8a4364d99c75882b140d9b
                                                          • Instruction Fuzzy Hash: 7B312670A46288AEFB30CA65CC05FFA7BA6AF45314F1C622AF081B21D1D37589C5C762
                                                          APIs
                                                          • InternetReadFile.WININET(?,?,00000400,?), ref: 00E2CE89
                                                          • GetLastError.KERNEL32(?,00000000), ref: 00E2CEEA
                                                          • SetEvent.KERNEL32(?,?,00000000), ref: 00E2CEFE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorEventFileInternetLastRead
                                                          • String ID:
                                                          • API String ID: 234945975-0
                                                          • Opcode ID: 8dacec2a9da7e36155fc1a0090822777e8a945054aa1dccedb316b514c175062
                                                          • Instruction ID: 5648978bdef056b4df76eb04fe9ebfca1c063470b9c89581a3ddb74e9089ffef
                                                          • Opcode Fuzzy Hash: 8dacec2a9da7e36155fc1a0090822777e8a945054aa1dccedb316b514c175062
                                                          • Instruction Fuzzy Hash: A921AFB16007159FEB20DFA5E948BAB77FCEB40358F20441EE646E2151E7B0EE498B64
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00E25CC1
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00E25D17
                                                          • FindClose.KERNEL32(?), ref: 00E25D5F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Find$File$CloseFirstNext
                                                          • String ID:
                                                          • API String ID: 3541575487-0
                                                          • Opcode ID: aac2e5e37c31620e344ec8acc5a7e534615d8590685e38fab829fbc5b572bf5a
                                                          • Instruction ID: 51dc3a4ed6c3d04deb270f5dccb5571b0aa5e3f1eab5a72b610efb7c3b888a5a
                                                          • Opcode Fuzzy Hash: aac2e5e37c31620e344ec8acc5a7e534615d8590685e38fab829fbc5b572bf5a
                                                          • Instruction Fuzzy Hash: 05518835604A019FC714CF28D494A9AB7E4FF4A318F14855EE95A9B3A2DB30ED05CFA1
                                                          APIs
                                                          • IsDebuggerPresent.KERNEL32 ref: 00DE271A
                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00DE2724
                                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 00DE2731
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                          • String ID:
                                                          • API String ID: 3906539128-0
                                                          • Opcode ID: 2a11947f4f5cce2981ce3667b1c7516ab4caf5c19e35247ea1c4ae518ce89c79
                                                          • Instruction ID: fa1a80a111cea35816859cdcddf4bd1201e049f65c89b75dbe96469e71247244
                                                          • Opcode Fuzzy Hash: 2a11947f4f5cce2981ce3667b1c7516ab4caf5c19e35247ea1c4ae518ce89c79
                                                          • Instruction Fuzzy Hash: 4D31D5749012189BCB21DF65DC8879CBBB8EF08310F5041EAE40CA7260E7709F858F54
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 00E251DA
                                                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00E25238
                                                          • SetErrorMode.KERNEL32(00000000), ref: 00E252A1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DiskFreeSpace
                                                          • String ID:
                                                          • API String ID: 1682464887-0
                                                          • Opcode ID: 01cb16eeabc696bea7a2012a9b3c52c1bce3ecd1163d3b29e02b45d1f3d0994d
                                                          • Instruction ID: d778dee5d973802dd99da56b82529ff8be5eebb664cf8c62114a8cb0f92c63c4
                                                          • Opcode Fuzzy Hash: 01cb16eeabc696bea7a2012a9b3c52c1bce3ecd1163d3b29e02b45d1f3d0994d
                                                          • Instruction Fuzzy Hash: 4B312F75A00518DFDB00DF55D884EEDBBB4FF49318F148099E905AB3A2DB31E856CB60
                                                          APIs
                                                            • Part of subcall function 00DCFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00DD0668
                                                            • Part of subcall function 00DCFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00DD0685
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00E1170D
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00E1173A
                                                          • GetLastError.KERNEL32 ref: 00E1174A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                          • String ID:
                                                          • API String ID: 577356006-0
                                                          • Opcode ID: 288f6b7349b7e6de7cf77fee2d96b3d334c659606e399135f06b43c407d9efec
                                                          • Instruction ID: ee0b1745fa02d23f9ad94641bc3c5eb26394bc640fcfb1e8febbceff705ca1ed
                                                          • Opcode Fuzzy Hash: 288f6b7349b7e6de7cf77fee2d96b3d334c659606e399135f06b43c407d9efec
                                                          • Instruction Fuzzy Hash: D011CEB2400305AFD718AF54DC86EAAB7B9EB05714B20856EE05663291EB70BC828A30
                                                          APIs
                                                          • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00E1D608
                                                          • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00E1D645
                                                          • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00E1D650
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseControlCreateDeviceFileHandle
                                                          • String ID:
                                                          • API String ID: 33631002-0
                                                          • Opcode ID: 2d3f94bf343011d093edaca90ca03989544638bc7928456704bddb2511b29753
                                                          • Instruction ID: 55efc843c0932820ec5fe344149d49bbf7f76e1f348f1285ede94828957b3c85
                                                          • Opcode Fuzzy Hash: 2d3f94bf343011d093edaca90ca03989544638bc7928456704bddb2511b29753
                                                          • Instruction Fuzzy Hash: 9E117CB5E05228BFDB208F959C44FEFBBBCEB45B50F108111F914F7290C2B05A058BA1
                                                          APIs
                                                          • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00E1168C
                                                          • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00E116A1
                                                          • FreeSid.ADVAPI32(?), ref: 00E116B1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: AllocateCheckFreeInitializeMembershipToken
                                                          • String ID:
                                                          • API String ID: 3429775523-0
                                                          • Opcode ID: fe37a6f9b4233c9e29b4a23cdad220958a0e5ff74995a3ecf525aa7c3b75ba8d
                                                          • Instruction ID: 5489f0fef49bfce6c70252b243519b5af621a83879709e056588a632b1024096
                                                          • Opcode Fuzzy Hash: fe37a6f9b4233c9e29b4a23cdad220958a0e5ff74995a3ecf525aa7c3b75ba8d
                                                          • Instruction Fuzzy Hash: C5F04475A41308FFDB00CFE08C89AAEBBBCFB08204F1048A0E500E2180E330AA488A50
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: /
                                                          • API String ID: 0-2043925204
                                                          • Opcode ID: 073eeb8442e466c641074fe29fd8035384f0e4ba5d1ee837db934bcc49e49685
                                                          • Instruction ID: 8dc5125a467be24d845c11472d5005bddc1b7c3843bfe211c74a28313a7209f1
                                                          • Opcode Fuzzy Hash: 073eeb8442e466c641074fe29fd8035384f0e4ba5d1ee837db934bcc49e49685
                                                          • Instruction Fuzzy Hash: 45412976500259AFCB20AFBACC49DBB7778EB84714F1442A9F915D7180E6709D828B74
                                                          APIs
                                                          • GetUserNameW.ADVAPI32(?,?), ref: 00E0D28C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: NameUser
                                                          • String ID: X64
                                                          • API String ID: 2645101109-893830106
                                                          • Opcode ID: 5093262625114c564e19045b4537474f22387a94adebf993c7cca22ad1e9c20f
                                                          • Instruction ID: 3dce8db8ce26ff344a211562850fc1a66c16eaf36873e5e47fe8b12e149b3414
                                                          • Opcode Fuzzy Hash: 5093262625114c564e19045b4537474f22387a94adebf993c7cca22ad1e9c20f
                                                          • Instruction Fuzzy Hash: 58D0C9B480611DEFCB90CB90DC88DD9B37CBB04305F100155F106B2040D73095899F20
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                          • Instruction ID: 703789242b196df0efe21cc9bb3d5683b3d7e98c45a0db58f4451f597366e8d4
                                                          • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                          • Instruction Fuzzy Hash: E9022E71E1111A9FDF14CFA9C9806ADFBF1EF48314F29816AE919E7380D731AA41CB90
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Variable is not of type 'Object'.$p#
                                                          • API String ID: 0-1086706999
                                                          • Opcode ID: 6b7e33e2ef438ad28d57e13447d4fae3033312222a0c3ed89d1348e820a90232
                                                          • Instruction ID: bd37d373e6d83e0113b54179b677ff6a20509f1f4e5d8345c18b8c0c1330114a
                                                          • Opcode Fuzzy Hash: 6b7e33e2ef438ad28d57e13447d4fae3033312222a0c3ed89d1348e820a90232
                                                          • Instruction Fuzzy Hash: E1325874910219DBDF14DF94C881BEDBBB5FF08308F146069E846BB292D775AA86CB70
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00E26918
                                                          • FindClose.KERNEL32(00000000), ref: 00E26961
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Find$CloseFileFirst
                                                          • String ID:
                                                          • API String ID: 2295610775-0
                                                          • Opcode ID: fa0cfd6e6db350490837f89ad7d2e9e3cae4446521f5fec719197c02a782bf38
                                                          • Instruction ID: 834e80a45f6f6b7dcf003e0fbb12027d8a0122fafedffcdfe6a0e4698a466c7d
                                                          • Opcode Fuzzy Hash: fa0cfd6e6db350490837f89ad7d2e9e3cae4446521f5fec719197c02a782bf38
                                                          • Instruction Fuzzy Hash: 8D11D0356046109FC710CF2AD484A26BBE0FF89328F14C699F4699F2A2CB70EC45CBA0
                                                          APIs
                                                          • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00E34891,?,?,00000035,?), ref: 00E237E4
                                                          • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00E34891,?,?,00000035,?), ref: 00E237F4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorFormatLastMessage
                                                          • String ID:
                                                          • API String ID: 3479602957-0
                                                          • Opcode ID: 7fe4ca2d13517696ae80a91bbfbf9b38ae9fd07dca032121c2f0304141262421
                                                          • Instruction ID: ca5946f63679d8b2698bac57cd3f255a93e75eb144f71587fb9dcc38faed5e1e
                                                          • Opcode Fuzzy Hash: 7fe4ca2d13517696ae80a91bbfbf9b38ae9fd07dca032121c2f0304141262421
                                                          • Instruction Fuzzy Hash: B7F05CB46052286BDB1017B65C4CFEB3A5DDFC5760F000162F105E3190C5608904C6B0
                                                          APIs
                                                          • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00E1B25D
                                                          • keybd_event.USER32(?,7694C0D0,?,00000000), ref: 00E1B270
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: InputSendkeybd_event
                                                          • String ID:
                                                          • API String ID: 3536248340-0
                                                          • Opcode ID: 81d66f49a7a5ce7532b4cad984766d9a11c8320fe5458813576fae25e0f44df8
                                                          • Instruction ID: 563fa364d579582f585273ef1aedf865ab80f4e4b51c020db3a50095e8977f80
                                                          • Opcode Fuzzy Hash: 81d66f49a7a5ce7532b4cad984766d9a11c8320fe5458813576fae25e0f44df8
                                                          • Instruction Fuzzy Hash: 96F06D7480424DAFDB058FA1C805BEE7BB4FF08309F10800AF961A61A1C3798205DF94
                                                          APIs
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00E111FC), ref: 00E110D4
                                                          • CloseHandle.KERNEL32(?,?,00E111FC), ref: 00E110E9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: AdjustCloseHandlePrivilegesToken
                                                          • String ID:
                                                          • API String ID: 81990902-0
                                                          • Opcode ID: 9733873a378bdfcb9c4acda85fd62cce0024fd28bf8eca399193705277211906
                                                          • Instruction ID: 474c11f80bd3e97cc6a44d3187e2a38005b6d8210dcb457b35cc1182a2e2e965
                                                          • Opcode Fuzzy Hash: 9733873a378bdfcb9c4acda85fd62cce0024fd28bf8eca399193705277211906
                                                          • Instruction Fuzzy Hash: E0E04F32009611AEE7252B11FC05FB377AAEB04310F20882DF5A6914B1DB626C91DB20
                                                          APIs
                                                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00DE6766,?,?,00000008,?,?,00DEFEFE,00000000), ref: 00DE6998
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ExceptionRaise
                                                          • String ID:
                                                          • API String ID: 3997070919-0
                                                          • Opcode ID: d027690648fa01e49981e8d1121103eb2e0ed7d4b9c8e9c9005b51ea43816331
                                                          • Instruction ID: 03f33718b570fe3dbc761eab7851208fe2f15e2f5a4dc68c2e2e1ed9a6e0e6f0
                                                          • Opcode Fuzzy Hash: d027690648fa01e49981e8d1121103eb2e0ed7d4b9c8e9c9005b51ea43816331
                                                          • Instruction Fuzzy Hash: C8B15A316106489FD719DF29C48AB657BE0FF153A4F298658E8D9CF2E2C335E981CB50
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID: 0-3916222277
                                                          • Opcode ID: 8bd8ed2ee5919b6e022c379369ebef8d24a1db30c656d4a0c486f9b1c82656be
                                                          • Instruction ID: 58c0e8916484685cc91c400d099b51d919f944636dadce95a91e301a3cca8bc1
                                                          • Opcode Fuzzy Hash: 8bd8ed2ee5919b6e022c379369ebef8d24a1db30c656d4a0c486f9b1c82656be
                                                          • Instruction Fuzzy Hash: 87123F719042299FCB14CF58C981BEEB7B5FF48714F14819AE849EB295DB34DA81CFA0
                                                          APIs
                                                          • BlockInput.USER32(00000001), ref: 00E2EABD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: BlockInput
                                                          • String ID:
                                                          • API String ID: 3456056419-0
                                                          • Opcode ID: 2393e076550ac2b0af20c3c5e10bdd7aabe1cf4d52cce3bd4e7126369d480726
                                                          • Instruction ID: 8398342cc2d1ce106bee58ec4d34ec6baa5fc9f96e4e4d8ebc7e84304308bda5
                                                          • Opcode Fuzzy Hash: 2393e076550ac2b0af20c3c5e10bdd7aabe1cf4d52cce3bd4e7126369d480726
                                                          • Instruction Fuzzy Hash: F4E012752112149FC710DF59D404D9AB7E9EF99760F01845AFC4AD7351D670A8418BA1
                                                          APIs
                                                          • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,00DD03EE), ref: 00DD09DA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled
                                                          • String ID:
                                                          • API String ID: 3192549508-0
                                                          • Opcode ID: cb790afdefb3a63624a893a4f9a03fe29ff8c5dae2d0c5d9cf3d2c9ce3553107
                                                          • Instruction ID: c25a734baeb08fcb11c8cf9bb9963ac68e04aa83c785bfb0f06b8c3899305439
                                                          • Opcode Fuzzy Hash: cb790afdefb3a63624a893a4f9a03fe29ff8c5dae2d0c5d9cf3d2c9ce3553107
                                                          • Instruction Fuzzy Hash:
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 0
                                                          • API String ID: 0-4108050209
                                                          • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                          • Instruction ID: da3dfbd1b2121ea90d2e46e0230cdeaa8811098f753ab80bb159d2cf932a094b
                                                          • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                          • Instruction Fuzzy Hash: 40515572A0C7455BDB388568886ABBE6399DB02300F5C05CBD8C6D7382FA15EE05F776
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 0&
                                                          • API String ID: 0-2523485602
                                                          • Opcode ID: 4871b300ea99100f31dc289362addf64377579db00b01b6e705b86864547f71a
                                                          • Instruction ID: 90df74c9fc63f1c6955e2b9151958f83237b0be5c3b4f1d4ae00c10b00c9a9c2
                                                          • Opcode Fuzzy Hash: 4871b300ea99100f31dc289362addf64377579db00b01b6e705b86864547f71a
                                                          • Instruction Fuzzy Hash: 3021E7327206118BDB28CF79C82367E73E5A754310F14862EE5A7E77D0DE35A904DB90
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5a26085a90d175aa90ad887fe410e7ad6354b3edffbbf368c5d83faab2d1eddd
                                                          • Instruction ID: 8cda0cbd7641c30f69a4f7dbbe8b84bc68545255770c40229135ce22df7c8a86
                                                          • Opcode Fuzzy Hash: 5a26085a90d175aa90ad887fe410e7ad6354b3edffbbf368c5d83faab2d1eddd
                                                          • Instruction Fuzzy Hash: D3325822D29F414DD767A636DC223356299AFB73C6F24CB37F81AB59A5EF28C4834100
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 260136e5c0e741575c5abb56fc90fdf25ba00ee16d041a974ba50cfb5059d739
                                                          • Instruction ID: 8460e2fd063f439414da183e03c9fe3ff9b6ea5145efe49add848c51d5287215
                                                          • Opcode Fuzzy Hash: 260136e5c0e741575c5abb56fc90fdf25ba00ee16d041a974ba50cfb5059d739
                                                          • Instruction Fuzzy Hash: 20321631A001168BDF28CB69C594BBDB7A1EB85304F38A66AD58EEB2D1D230DDC1DB51
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 65fdb15b7b5287ebb9153c964cea76fc72bacc7589dcb3fb193e41639f9ac2a5
                                                          • Instruction ID: 953aa0c8ce75a60d4f377cc2b6d56209aba4f0dac3d5e2342169ae43ce7741c4
                                                          • Opcode Fuzzy Hash: 65fdb15b7b5287ebb9153c964cea76fc72bacc7589dcb3fb193e41639f9ac2a5
                                                          • Instruction Fuzzy Hash: 33229D70A0460ADFDF14CF68D881AEEB7F5FF44300F148529E956A7295EB359950CB70
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 013b59ce0f541693989c9d8c8b85983e005abb5d659526a46ad01052cbeb6073
                                                          • Instruction ID: d874be3f3b240f340fda105da318ccbac24ca2d6119a557c91efba64b8194c8c
                                                          • Opcode Fuzzy Hash: 013b59ce0f541693989c9d8c8b85983e005abb5d659526a46ad01052cbeb6073
                                                          • Instruction Fuzzy Hash: 8002B6B0E0020AEFDB04DF64D881AADB7B5FF44300F558169F9569B3A1E731EA50CBA5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 45e8ecf8bd0efa88566d8d6fe8750f07d43f922c395b31f521e5661840375a7f
                                                          • Instruction ID: 2015fc8bd3d518fc9025ddc87901d76e60362f590e9fbf5b4abff98d519d670a
                                                          • Opcode Fuzzy Hash: 45e8ecf8bd0efa88566d8d6fe8750f07d43f922c395b31f521e5661840375a7f
                                                          • Instruction Fuzzy Hash: DDB10420D2AF414DD323A63A8831336B75CAFBB6D6F91D71BFC2674D22EB2185874140
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 3340b1784fc3a941dabd3cd09dd88be1aed56ad5cce8fa485055d223a2a4f170
                                                          • Instruction ID: 8715ae07640e3e5ca273153f2768834b49c0f7a801c0883f920bb0ababb9c447
                                                          • Opcode Fuzzy Hash: 3340b1784fc3a941dabd3cd09dd88be1aed56ad5cce8fa485055d223a2a4f170
                                                          • Instruction Fuzzy Hash: BC61677160870996DE349A2C8CA6BBF2394DF41700F2919DBE886DB381FA11EE42C375
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 309309809de1334490c3461b8ca0d66b084fac03e09145cbe24d2860ace7e78b
                                                          • Instruction ID: 3b5c890b3ab689bd842f9fec19bf5bed112ca0ad82d285dda0179058e50cd0bd
                                                          • Opcode Fuzzy Hash: 309309809de1334490c3461b8ca0d66b084fac03e09145cbe24d2860ace7e78b
                                                          • Instruction Fuzzy Hash: D5617C3164870AD7DE394A288851BBF639AEF42704F1809DBF883DB381F612ED469375
                                                          APIs
                                                          • DeleteObject.GDI32(00000000), ref: 00E32B30
                                                          • DeleteObject.GDI32(00000000), ref: 00E32B43
                                                          • DestroyWindow.USER32 ref: 00E32B52
                                                          • GetDesktopWindow.USER32 ref: 00E32B6D
                                                          • GetWindowRect.USER32(00000000), ref: 00E32B74
                                                          • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00E32CA3
                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00E32CB1
                                                          • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E32CF8
                                                          • GetClientRect.USER32(00000000,?), ref: 00E32D04
                                                          • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00E32D40
                                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E32D62
                                                          • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E32D75
                                                          • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E32D80
                                                          • GlobalLock.KERNEL32(00000000), ref: 00E32D89
                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E32D98
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00E32DA1
                                                          • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E32DA8
                                                          • GlobalFree.KERNEL32(00000000), ref: 00E32DB3
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E32DC5
                                                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,00E4FC38,00000000), ref: 00E32DDB
                                                          • GlobalFree.KERNEL32(00000000), ref: 00E32DEB
                                                          • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00E32E11
                                                          • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00E32E30
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E32E52
                                                          • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E3303F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                          • String ID: $AutoIt v3$DISPLAY$static
                                                          • API String ID: 2211948467-2373415609
                                                          • Opcode ID: 67d0eec488efab5692068edccef0fa1d30c8429f015b70dfc232358a44e8df2b
                                                          • Instruction ID: eec0f78600b98794e3282cc39d4f6bb6cb54a1aa2a5257b1981a3d72dedbac37
                                                          • Opcode Fuzzy Hash: 67d0eec488efab5692068edccef0fa1d30c8429f015b70dfc232358a44e8df2b
                                                          • Instruction Fuzzy Hash: B1027B75A00204EFDB14DFA5CC89EAE7BB9EB49714F148158F915BB2A1CB70AD06CF60
                                                          APIs
                                                          • SetTextColor.GDI32(?,00000000), ref: 00E4712F
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00E47160
                                                          • GetSysColor.USER32(0000000F), ref: 00E4716C
                                                          • SetBkColor.GDI32(?,000000FF), ref: 00E47186
                                                          • SelectObject.GDI32(?,?), ref: 00E47195
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 00E471C0
                                                          • GetSysColor.USER32(00000010), ref: 00E471C8
                                                          • CreateSolidBrush.GDI32(00000000), ref: 00E471CF
                                                          • FrameRect.USER32(?,?,00000000), ref: 00E471DE
                                                          • DeleteObject.GDI32(00000000), ref: 00E471E5
                                                          • InflateRect.USER32(?,000000FE,000000FE), ref: 00E47230
                                                          • FillRect.USER32(?,?,?), ref: 00E47262
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00E47284
                                                            • Part of subcall function 00E473E8: GetSysColor.USER32(00000012), ref: 00E47421
                                                            • Part of subcall function 00E473E8: SetTextColor.GDI32(?,?), ref: 00E47425
                                                            • Part of subcall function 00E473E8: GetSysColorBrush.USER32(0000000F), ref: 00E4743B
                                                            • Part of subcall function 00E473E8: GetSysColor.USER32(0000000F), ref: 00E47446
                                                            • Part of subcall function 00E473E8: GetSysColor.USER32(00000011), ref: 00E47463
                                                            • Part of subcall function 00E473E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00E47471
                                                            • Part of subcall function 00E473E8: SelectObject.GDI32(?,00000000), ref: 00E47482
                                                            • Part of subcall function 00E473E8: SetBkColor.GDI32(?,00000000), ref: 00E4748B
                                                            • Part of subcall function 00E473E8: SelectObject.GDI32(?,?), ref: 00E47498
                                                            • Part of subcall function 00E473E8: InflateRect.USER32(?,000000FF,000000FF), ref: 00E474B7
                                                            • Part of subcall function 00E473E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00E474CE
                                                            • Part of subcall function 00E473E8: GetWindowLongW.USER32(00000000,000000F0), ref: 00E474DB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                          • String ID:
                                                          • API String ID: 4124339563-0
                                                          • Opcode ID: 20d9274bf1d6c73bab1bf9e1f72feea56ce8caf93229d2aa34446f6fbe432538
                                                          • Instruction ID: 632cdea02c09bcda4db4e3b8773b7c54daf2f75b27e28d1fa937ece6beeb8842
                                                          • Opcode Fuzzy Hash: 20d9274bf1d6c73bab1bf9e1f72feea56ce8caf93229d2aa34446f6fbe432538
                                                          • Instruction Fuzzy Hash: D6A1B07600A301AFD7509F61DC48E5B7BB9FB4A320F201A19F9A2B71E1D774E849CB91
                                                          APIs
                                                          • DestroyWindow.USER32(00000000), ref: 00E3273E
                                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00E3286A
                                                          • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 00E328A9
                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00E328B9
                                                          • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00E32900
                                                          • GetClientRect.USER32(00000000,?), ref: 00E3290C
                                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00E32955
                                                          • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00E32964
                                                          • GetStockObject.GDI32(00000011), ref: 00E32974
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00E32978
                                                          • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00E32988
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00E32991
                                                          • DeleteDC.GDI32(00000000), ref: 00E3299A
                                                          • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00E329C6
                                                          • SendMessageW.USER32(00000030,00000000,00000001), ref: 00E329DD
                                                          • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00E32A1D
                                                          • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00E32A31
                                                          • SendMessageW.USER32(00000404,00000001,00000000), ref: 00E32A42
                                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00E32A77
                                                          • GetStockObject.GDI32(00000011), ref: 00E32A82
                                                          • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00E32A8D
                                                          • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00E32A97
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                          • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                          • API String ID: 2910397461-517079104
                                                          • Opcode ID: f5753d988d3d979a41b348abaf6660e2f5120e434c69a8340bf5e306630540af
                                                          • Instruction ID: d8fb87821e7388cff9a04a25bce03b1fb8f60beebc005156fac6717ab485e48d
                                                          • Opcode Fuzzy Hash: f5753d988d3d979a41b348abaf6660e2f5120e434c69a8340bf5e306630540af
                                                          • Instruction Fuzzy Hash: DBB17C75A00205AFEB14DFA9CC4AFAE7BB9EB08710F108559FA15F7290D770AD05CBA0
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 00E24AED
                                                          • GetDriveTypeW.KERNEL32(?,00E4CB68,?,\\.\,00E4CC08), ref: 00E24BCA
                                                          • SetErrorMode.KERNEL32(00000000,00E4CB68,?,\\.\,00E4CC08), ref: 00E24D36
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DriveType
                                                          • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                          • API String ID: 2907320926-4222207086
                                                          • Opcode ID: ac849032ab8fc1265f84bb9b1d5d8b7d91e40570550cfa2782bd080169e44fba
                                                          • Instruction ID: ef7ba08f7fe48413a3e5369351b91e575895ec6791490a1b2ba5a8f73ee2c402
                                                          • Opcode Fuzzy Hash: ac849032ab8fc1265f84bb9b1d5d8b7d91e40570550cfa2782bd080169e44fba
                                                          • Instruction Fuzzy Hash: 1261F4B1605615DBDB15EF18EA83AACF7A0EB44308B25A016F80ABB2D1DB31DD41DB61
                                                          APIs
                                                          • GetSysColor.USER32(00000012), ref: 00E47421
                                                          • SetTextColor.GDI32(?,?), ref: 00E47425
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00E4743B
                                                          • GetSysColor.USER32(0000000F), ref: 00E47446
                                                          • CreateSolidBrush.GDI32(?), ref: 00E4744B
                                                          • GetSysColor.USER32(00000011), ref: 00E47463
                                                          • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00E47471
                                                          • SelectObject.GDI32(?,00000000), ref: 00E47482
                                                          • SetBkColor.GDI32(?,00000000), ref: 00E4748B
                                                          • SelectObject.GDI32(?,?), ref: 00E47498
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 00E474B7
                                                          • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00E474CE
                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00E474DB
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00E4752A
                                                          • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00E47554
                                                          • InflateRect.USER32(?,000000FD,000000FD), ref: 00E47572
                                                          • DrawFocusRect.USER32(?,?), ref: 00E4757D
                                                          • GetSysColor.USER32(00000011), ref: 00E4758E
                                                          • SetTextColor.GDI32(?,00000000), ref: 00E47596
                                                          • DrawTextW.USER32(?,00E470F5,000000FF,?,00000000), ref: 00E475A8
                                                          • SelectObject.GDI32(?,?), ref: 00E475BF
                                                          • DeleteObject.GDI32(?), ref: 00E475CA
                                                          • SelectObject.GDI32(?,?), ref: 00E475D0
                                                          • DeleteObject.GDI32(?), ref: 00E475D5
                                                          • SetTextColor.GDI32(?,?), ref: 00E475DB
                                                          • SetBkColor.GDI32(?,?), ref: 00E475E5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                          • String ID:
                                                          • API String ID: 1996641542-0
                                                          • Opcode ID: a9689f382f9e72380614c1d78c32b2c91e22efa8597fd49ec3353decbc964e78
                                                          • Instruction ID: 323cc01c3dec24538700bf3d3fc64da802cb1b8ee6cf0d88796cf70ead7b2844
                                                          • Opcode Fuzzy Hash: a9689f382f9e72380614c1d78c32b2c91e22efa8597fd49ec3353decbc964e78
                                                          • Instruction Fuzzy Hash: 26618D76901218AFDF009FA5DC48EEEBFB9EB09320F214115F915BB2A1D774A941CF90
                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 00E41128
                                                          • GetDesktopWindow.USER32 ref: 00E4113D
                                                          • GetWindowRect.USER32(00000000), ref: 00E41144
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00E41199
                                                          • DestroyWindow.USER32(?), ref: 00E411B9
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00E411ED
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00E4120B
                                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00E4121D
                                                          • SendMessageW.USER32(00000000,00000421,?,?), ref: 00E41232
                                                          • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00E41245
                                                          • IsWindowVisible.USER32(00000000), ref: 00E412A1
                                                          • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 00E412BC
                                                          • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 00E412D0
                                                          • GetWindowRect.USER32(00000000,?), ref: 00E412E8
                                                          • MonitorFromPoint.USER32(?,?,00000002), ref: 00E4130E
                                                          • GetMonitorInfoW.USER32(00000000,?), ref: 00E41328
                                                          • CopyRect.USER32(?,?), ref: 00E4133F
                                                          • SendMessageW.USER32(00000000,00000412,00000000), ref: 00E413AA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                          • String ID: ($0$tooltips_class32
                                                          • API String ID: 698492251-4156429822
                                                          • Opcode ID: 0a83f31ae31c352dae2432a7d8d34f4ec3c9d0fe2a2e55e8c4ab10d6227fec85
                                                          • Instruction ID: 8af13c74f0ed48522765171a916f3310f6c64b9e09778ef105f546254303ce06
                                                          • Opcode Fuzzy Hash: 0a83f31ae31c352dae2432a7d8d34f4ec3c9d0fe2a2e55e8c4ab10d6227fec85
                                                          • Instruction Fuzzy Hash: 1BB1BE71604340AFDB10DF65D884BAEBBE4FF84754F008958F99AAB261C771E845CBA2
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?), ref: 00E402E5
                                                          • _wcslen.LIBCMT ref: 00E4031F
                                                          • _wcslen.LIBCMT ref: 00E40389
                                                          • _wcslen.LIBCMT ref: 00E403F1
                                                          • _wcslen.LIBCMT ref: 00E40475
                                                          • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00E404C5
                                                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00E40504
                                                            • Part of subcall function 00DCF9F2: _wcslen.LIBCMT ref: 00DCF9FD
                                                            • Part of subcall function 00E1223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00E12258
                                                            • Part of subcall function 00E1223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00E1228A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$MessageSend$BuffCharUpper
                                                          • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                          • API String ID: 1103490817-719923060
                                                          • Opcode ID: 238a52b3c73d8d349496ceddccf8904edff7b9c58e5d2be5ac47de61dc2a8cd9
                                                          • Instruction ID: a1a6492f88f35bb4c652794189b0a3083ad41136589fbcd9983df0ccb6a5c207
                                                          • Opcode Fuzzy Hash: 238a52b3c73d8d349496ceddccf8904edff7b9c58e5d2be5ac47de61dc2a8cd9
                                                          • Instruction Fuzzy Hash: 9FE1CF312082018FC724DF24D85196EB7E6FFC8318F14996DF996AB2A1DB30ED45CB62
                                                          APIs
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00DC8968
                                                          • GetSystemMetrics.USER32(00000007), ref: 00DC8970
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00DC899B
                                                          • GetSystemMetrics.USER32(00000008), ref: 00DC89A3
                                                          • GetSystemMetrics.USER32(00000004), ref: 00DC89C8
                                                          • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00DC89E5
                                                          • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00DC89F5
                                                          • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00DC8A28
                                                          • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00DC8A3C
                                                          • GetClientRect.USER32(00000000,000000FF), ref: 00DC8A5A
                                                          • GetStockObject.GDI32(00000011), ref: 00DC8A76
                                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 00DC8A81
                                                            • Part of subcall function 00DC912D: GetCursorPos.USER32(?), ref: 00DC9141
                                                            • Part of subcall function 00DC912D: ScreenToClient.USER32(00000000,?), ref: 00DC915E
                                                            • Part of subcall function 00DC912D: GetAsyncKeyState.USER32(00000001), ref: 00DC9183
                                                            • Part of subcall function 00DC912D: GetAsyncKeyState.USER32(00000002), ref: 00DC919D
                                                          • SetTimer.USER32(00000000,00000000,00000028,00DC90FC), ref: 00DC8AA8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                          • String ID: AutoIt v3 GUI
                                                          • API String ID: 1458621304-248962490
                                                          • Opcode ID: e70cd66e1e106d7fe0fe1b1a89fcc4b43c0ba2fe55a3b5c308b2fb63961950f3
                                                          • Instruction ID: 090c2306f77cd622fbbad0d6e6979359121a7aacd3bf317e0594ad2f244ac8c7
                                                          • Opcode Fuzzy Hash: e70cd66e1e106d7fe0fe1b1a89fcc4b43c0ba2fe55a3b5c308b2fb63961950f3
                                                          • Instruction Fuzzy Hash: DEB17B35A0020AAFDB14DFA9CC45FAE3BB5FB48314F14426AFA15A7290DB34E851CF60
                                                          APIs
                                                            • Part of subcall function 00E110F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00E11114
                                                            • Part of subcall function 00E110F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00E10B9B,?,?,?), ref: 00E11120
                                                            • Part of subcall function 00E110F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00E10B9B,?,?,?), ref: 00E1112F
                                                            • Part of subcall function 00E110F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00E10B9B,?,?,?), ref: 00E11136
                                                            • Part of subcall function 00E110F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00E1114D
                                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00E10DF5
                                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00E10E29
                                                          • GetLengthSid.ADVAPI32(?), ref: 00E10E40
                                                          • GetAce.ADVAPI32(?,00000000,?), ref: 00E10E7A
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00E10E96
                                                          • GetLengthSid.ADVAPI32(?), ref: 00E10EAD
                                                          • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00E10EB5
                                                          • HeapAlloc.KERNEL32(00000000), ref: 00E10EBC
                                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00E10EDD
                                                          • CopySid.ADVAPI32(00000000), ref: 00E10EE4
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00E10F13
                                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00E10F35
                                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00E10F47
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E10F6E
                                                          • HeapFree.KERNEL32(00000000), ref: 00E10F75
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E10F7E
                                                          • HeapFree.KERNEL32(00000000), ref: 00E10F85
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E10F8E
                                                          • HeapFree.KERNEL32(00000000), ref: 00E10F95
                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 00E10FA1
                                                          • HeapFree.KERNEL32(00000000), ref: 00E10FA8
                                                            • Part of subcall function 00E11193: GetProcessHeap.KERNEL32(00000008,00E10BB1,?,00000000,?,00E10BB1,?), ref: 00E111A1
                                                            • Part of subcall function 00E11193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00E10BB1,?), ref: 00E111A8
                                                            • Part of subcall function 00E11193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00E10BB1,?), ref: 00E111B7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                          • String ID:
                                                          • API String ID: 4175595110-0
                                                          • Opcode ID: 582f69d37a92f8f60f995c2e09ce41b6a6b7d1f1d68092f66d5e42ee24b8725f
                                                          • Instruction ID: c7774748fd9b004ffc4292af1f41b725e11953c3a5cd16d559068c6d64f5e88f
                                                          • Opcode Fuzzy Hash: 582f69d37a92f8f60f995c2e09ce41b6a6b7d1f1d68092f66d5e42ee24b8725f
                                                          • Instruction Fuzzy Hash: E0718DB1A0120AEFDF209FA5DC45BEEBBB8BF09304F144115F919B7291D770998ACB60
                                                          APIs
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E3C4BD
                                                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,00E4CC08,00000000,?,00000000,?,?), ref: 00E3C544
                                                          • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 00E3C5A4
                                                          • _wcslen.LIBCMT ref: 00E3C5F4
                                                          • _wcslen.LIBCMT ref: 00E3C66F
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 00E3C6B2
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 00E3C7C1
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 00E3C84D
                                                          • RegCloseKey.ADVAPI32(?), ref: 00E3C881
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00E3C88E
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 00E3C960
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                          • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                          • API String ID: 9721498-966354055
                                                          • Opcode ID: e8d15b2c7e853131f71d02d7cd4ecdc653fa9f2b345d5c8a74d987bfe1b1891f
                                                          • Instruction ID: ff437d5c71f6c46e5876199a261167c9b55ffe7c593e21fdc9c7854312083f74
                                                          • Opcode Fuzzy Hash: e8d15b2c7e853131f71d02d7cd4ecdc653fa9f2b345d5c8a74d987bfe1b1891f
                                                          • Instruction Fuzzy Hash: E1125A35604201DFD714DF14C895A6ABBE5EF88714F14889DF88AAB3A2DB31FD41CBA1
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?), ref: 00E409C6
                                                          • _wcslen.LIBCMT ref: 00E40A01
                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00E40A54
                                                          • _wcslen.LIBCMT ref: 00E40A8A
                                                          • _wcslen.LIBCMT ref: 00E40B06
                                                          • _wcslen.LIBCMT ref: 00E40B81
                                                            • Part of subcall function 00DCF9F2: _wcslen.LIBCMT ref: 00DCF9FD
                                                            • Part of subcall function 00E12BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00E12BFA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$MessageSend$BuffCharUpper
                                                          • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                          • API String ID: 1103490817-4258414348
                                                          • Opcode ID: ad6a1fa82856b6be697b3082f3f3f4fa58e1bd20cbc6238cd620cd187c8940b7
                                                          • Instruction ID: 8dff07585b2b192a5dbc6bb7f828216d61756a26cefb765781427578c8184b24
                                                          • Opcode Fuzzy Hash: ad6a1fa82856b6be697b3082f3f3f4fa58e1bd20cbc6238cd620cd187c8940b7
                                                          • Instruction Fuzzy Hash: 32E18B316083018FC714DF24D45196AB7E2FFD8318B14996DF99AAB362DB30ED45CBA1
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharUpper
                                                          • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                          • API String ID: 1256254125-909552448
                                                          • Opcode ID: 4b1254e25123cdaf8eb5c688c72375d43b5aeb2a6fc0cab5627b96216b98db5a
                                                          • Instruction ID: 64611fe4eae1fadf35500670cee209e71d4ff4bb76b0323235627762be5db913
                                                          • Opcode Fuzzy Hash: 4b1254e25123cdaf8eb5c688c72375d43b5aeb2a6fc0cab5627b96216b98db5a
                                                          • Instruction Fuzzy Hash: 3371E73260012A8BCB10DE7CCD565FE7B919FA0758F356529F85AB7284EA31CD45C7B0
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 00E4835A
                                                          • _wcslen.LIBCMT ref: 00E4836E
                                                          • _wcslen.LIBCMT ref: 00E48391
                                                          • _wcslen.LIBCMT ref: 00E483B4
                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00E483F2
                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00E45BF2), ref: 00E4844E
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00E48487
                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00E484CA
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00E48501
                                                          • FreeLibrary.KERNEL32(?), ref: 00E4850D
                                                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00E4851D
                                                          • DestroyIcon.USER32(?,?,?,?,?,00E45BF2), ref: 00E4852C
                                                          • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00E48549
                                                          • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00E48555
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                          • String ID: .dll$.exe$.icl
                                                          • API String ID: 799131459-1154884017
                                                          • Opcode ID: b97f46b18b3e8a10ea34eb2b0cd66dbff69e35701281b07b4007fe48ce6869b5
                                                          • Instruction ID: 5ee3832870a7e6f59a0e1bf2e2dd5a3d55511ca12896f4dc670b054e9150085b
                                                          • Opcode Fuzzy Hash: b97f46b18b3e8a10ea34eb2b0cd66dbff69e35701281b07b4007fe48ce6869b5
                                                          • Instruction Fuzzy Hash: 4E61EE71900215BFEB14DF65DD81BFE77A8FB08B21F10560AF815E61D1DBB4AA80CBA0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                          • API String ID: 0-1645009161
                                                          • Opcode ID: 136355eb9df95f141c29b3dcb00eddbdc3f773a5c2859a04c7ac5cc4210fe417
                                                          • Instruction ID: e2d108fd0b49855a371492343a535343494e8675e296e343ad9c0d805f1fb4b7
                                                          • Opcode Fuzzy Hash: 136355eb9df95f141c29b3dcb00eddbdc3f773a5c2859a04c7ac5cc4210fe417
                                                          • Instruction Fuzzy Hash: ED81E370A44709FBDB21AF60DC42FEE77A8EF45300F058025FA06AB296EB71D911D6B0
                                                          APIs
                                                          • CharLowerBuffW.USER32(?,?), ref: 00E23EF8
                                                          • _wcslen.LIBCMT ref: 00E23F03
                                                          • _wcslen.LIBCMT ref: 00E23F5A
                                                          • _wcslen.LIBCMT ref: 00E23F98
                                                          • GetDriveTypeW.KERNEL32(?), ref: 00E23FD6
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00E2401E
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00E24059
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00E24087
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: SendString_wcslen$BuffCharDriveLowerType
                                                          • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                          • API String ID: 1839972693-4113822522
                                                          • Opcode ID: bbf47a0269e1e419ed936ad9c916a7e33bc436cff9b13e61b8e9ef5dbfc19683
                                                          • Instruction ID: 6cd753ab7469a41e4e642bec6416240dc61e5e2fb5a86f266bf7e872fdba9434
                                                          • Opcode Fuzzy Hash: bbf47a0269e1e419ed936ad9c916a7e33bc436cff9b13e61b8e9ef5dbfc19683
                                                          • Instruction Fuzzy Hash: 4971FF716043119FC310EF34D8818AAB7F4EF94758F10992DF996A7291EB30ED49CB62
                                                          APIs
                                                          • LoadIconW.USER32(00000063), ref: 00E15A2E
                                                          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00E15A40
                                                          • SetWindowTextW.USER32(?,?), ref: 00E15A57
                                                          • GetDlgItem.USER32(?,000003EA), ref: 00E15A6C
                                                          • SetWindowTextW.USER32(00000000,?), ref: 00E15A72
                                                          • GetDlgItem.USER32(?,000003E9), ref: 00E15A82
                                                          • SetWindowTextW.USER32(00000000,?), ref: 00E15A88
                                                          • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00E15AA9
                                                          • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00E15AC3
                                                          • GetWindowRect.USER32(?,?), ref: 00E15ACC
                                                          • _wcslen.LIBCMT ref: 00E15B33
                                                          • SetWindowTextW.USER32(?,?), ref: 00E15B6F
                                                          • GetDesktopWindow.USER32 ref: 00E15B75
                                                          • GetWindowRect.USER32(00000000), ref: 00E15B7C
                                                          • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00E15BD3
                                                          • GetClientRect.USER32(?,?), ref: 00E15BE0
                                                          • PostMessageW.USER32(?,00000005,00000000,?), ref: 00E15C05
                                                          • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00E15C2F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                          • String ID:
                                                          • API String ID: 895679908-0
                                                          • Opcode ID: 6003c11b5b96b7ea3804f02c9938494257887c0725a7d8970320e47bd5892091
                                                          • Instruction ID: 2d6c5ca81d7e28b404b4a6200ae6503497d8bd5c04399ecf104c9cad5820d61a
                                                          • Opcode Fuzzy Hash: 6003c11b5b96b7ea3804f02c9938494257887c0725a7d8970320e47bd5892091
                                                          • Instruction Fuzzy Hash: 06714A32900A09EFDB20DFA9CE85EAEBBF5EF88704F105519E542B35A0D775A984CB50
                                                          APIs
                                                          • LoadCursorW.USER32(00000000,00007F89), ref: 00E2FE27
                                                          • LoadCursorW.USER32(00000000,00007F8A), ref: 00E2FE32
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00E2FE3D
                                                          • LoadCursorW.USER32(00000000,00007F03), ref: 00E2FE48
                                                          • LoadCursorW.USER32(00000000,00007F8B), ref: 00E2FE53
                                                          • LoadCursorW.USER32(00000000,00007F01), ref: 00E2FE5E
                                                          • LoadCursorW.USER32(00000000,00007F81), ref: 00E2FE69
                                                          • LoadCursorW.USER32(00000000,00007F88), ref: 00E2FE74
                                                          • LoadCursorW.USER32(00000000,00007F80), ref: 00E2FE7F
                                                          • LoadCursorW.USER32(00000000,00007F86), ref: 00E2FE8A
                                                          • LoadCursorW.USER32(00000000,00007F83), ref: 00E2FE95
                                                          • LoadCursorW.USER32(00000000,00007F85), ref: 00E2FEA0
                                                          • LoadCursorW.USER32(00000000,00007F82), ref: 00E2FEAB
                                                          • LoadCursorW.USER32(00000000,00007F84), ref: 00E2FEB6
                                                          • LoadCursorW.USER32(00000000,00007F04), ref: 00E2FEC1
                                                          • LoadCursorW.USER32(00000000,00007F02), ref: 00E2FECC
                                                          • GetCursorInfo.USER32(?), ref: 00E2FEDC
                                                          • GetLastError.KERNEL32 ref: 00E2FF1E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Cursor$Load$ErrorInfoLast
                                                          • String ID:
                                                          • API String ID: 3215588206-0
                                                          • Opcode ID: a14c072c9e3d0a3f59f57675940b7a557d2f82af8b7c519aba97fa6e63405b3d
                                                          • Instruction ID: 33db335093ce7bad1c9c29f01a318700c8d681c89ea6c671be2f185b2f8ef6fe
                                                          • Opcode Fuzzy Hash: a14c072c9e3d0a3f59f57675940b7a557d2f82af8b7c519aba97fa6e63405b3d
                                                          • Instruction Fuzzy Hash: ED4162B0E05319AADB109FBA9C8985EBFF8FF04754B50453AE119E7281DB7899018EA0
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT$[
                                                          • API String ID: 176396367-1901692981
                                                          • Opcode ID: 354e0158d9aa6c727ce4f3033cf74bbd9bd74f7c73495b22c49e145f1e1ce19c
                                                          • Instruction ID: a79fa866058dd39dce0bf0075fca9f90da7059f76dd96c0befdcaee3f308268a
                                                          • Opcode Fuzzy Hash: 354e0158d9aa6c727ce4f3033cf74bbd9bd74f7c73495b22c49e145f1e1ce19c
                                                          • Instruction Fuzzy Hash: 44E1C532A00516ABCB18DF78C451AEDFBB5FF54714F64912AE466B7240DB30AEC5CBA0
                                                          APIs
                                                          • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00DD00C6
                                                            • Part of subcall function 00DD00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(00E8070C,00000FA0,6DB2C945,?,?,?,?,00DF23B3,000000FF), ref: 00DD011C
                                                            • Part of subcall function 00DD00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00DF23B3,000000FF), ref: 00DD0127
                                                            • Part of subcall function 00DD00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00DF23B3,000000FF), ref: 00DD0138
                                                            • Part of subcall function 00DD00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00DD014E
                                                            • Part of subcall function 00DD00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00DD015C
                                                            • Part of subcall function 00DD00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00DD016A
                                                            • Part of subcall function 00DD00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00DD0195
                                                            • Part of subcall function 00DD00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00DD01A0
                                                          • ___scrt_fastfail.LIBCMT ref: 00DD00E7
                                                            • Part of subcall function 00DD00A3: __onexit.LIBCMT ref: 00DD00A9
                                                          Strings
                                                          • kernel32.dll, xrefs: 00DD0133
                                                          • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00DD0122
                                                          • SleepConditionVariableCS, xrefs: 00DD0154
                                                          • WakeAllConditionVariable, xrefs: 00DD0162
                                                          • InitializeConditionVariable, xrefs: 00DD0148
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                          • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                          • API String ID: 66158676-1714406822
                                                          • Opcode ID: 9f8798284c8063ce6d022c0108584de9da1116b473f3061f6f20a96626245373
                                                          • Instruction ID: 089de453ecbe5f5220c5237b98b327ee51e4923543a7c07794cfabb2e100ca77
                                                          • Opcode Fuzzy Hash: 9f8798284c8063ce6d022c0108584de9da1116b473f3061f6f20a96626245373
                                                          • Instruction Fuzzy Hash: 3D210B32A467116FE7606BA5AC05F6A3BE8EB85F51F14013BF905F3391DB719C048AB0
                                                          APIs
                                                          • CharLowerBuffW.USER32(00000000,00000000,00E4CC08), ref: 00E24527
                                                          • _wcslen.LIBCMT ref: 00E2453B
                                                          • _wcslen.LIBCMT ref: 00E24599
                                                          • _wcslen.LIBCMT ref: 00E245F4
                                                          • _wcslen.LIBCMT ref: 00E2463F
                                                          • _wcslen.LIBCMT ref: 00E246A7
                                                            • Part of subcall function 00DCF9F2: _wcslen.LIBCMT ref: 00DCF9FD
                                                          • GetDriveTypeW.KERNEL32(?,00E76BF0,00000061), ref: 00E24743
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharDriveLowerType
                                                          • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                          • API String ID: 2055661098-1000479233
                                                          • Opcode ID: 6cc1387373da2198ce47d3dad5b497ffbb1f4670fdf97c4429362200aa79882e
                                                          • Instruction ID: 841135647fa6833dc9f2b277eb9bc55a675308bbcb384d281c0bb71546e2e1e1
                                                          • Opcode Fuzzy Hash: 6cc1387373da2198ce47d3dad5b497ffbb1f4670fdf97c4429362200aa79882e
                                                          • Instruction Fuzzy Hash: CEB113B16083229FC710DF28E890AAAB7E5FF95728F50691DF096E72D1D730D844CB62
                                                          APIs
                                                            • Part of subcall function 00DC9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DC9BB2
                                                          • DragQueryPoint.SHELL32(?,?), ref: 00E49147
                                                            • Part of subcall function 00E47674: ClientToScreen.USER32(?,?), ref: 00E4769A
                                                            • Part of subcall function 00E47674: GetWindowRect.USER32(?,?), ref: 00E47710
                                                            • Part of subcall function 00E47674: PtInRect.USER32(?,?,00E48B89), ref: 00E47720
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00E491B0
                                                          • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00E491BB
                                                          • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00E491DE
                                                          • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00E49225
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00E4923E
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 00E49255
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 00E49277
                                                          • DragFinish.SHELL32(?), ref: 00E4927E
                                                          • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00E49371
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                          • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$p#
                                                          • API String ID: 221274066-136824727
                                                          • Opcode ID: 5b543b4498686449f5fbd7ae2622cfb5e9f6fb00ad240fa3a001566646ed7f49
                                                          • Instruction ID: f44ba1d46d7673745bb10d349abad8532e21b03f349580afd89633cd2756079c
                                                          • Opcode Fuzzy Hash: 5b543b4498686449f5fbd7ae2622cfb5e9f6fb00ad240fa3a001566646ed7f49
                                                          • Instruction Fuzzy Hash: D4615771108301AFC701EF65DC85DABBBE8EFC9750F10095EF596A31A1DB709A49CB62
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00E4CC08), ref: 00E340BB
                                                          • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00E340CD
                                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,00E4CC08), ref: 00E340F2
                                                          • FreeLibrary.KERNEL32(00000000,?,00E4CC08), ref: 00E3413E
                                                          • StringFromGUID2.OLE32(?,?,00000028,?,00E4CC08), ref: 00E341A8
                                                          • SysFreeString.OLEAUT32(00000009), ref: 00E34262
                                                          • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00E342C8
                                                          • SysFreeString.OLEAUT32(?), ref: 00E342F2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                                                          • String ID: GetModuleHandleExW$kernel32.dll
                                                          • API String ID: 354098117-199464113
                                                          • Opcode ID: d8369e35a2b22ab3b5a91e869411cbd3f76c73c5dcc971a3c7c3419a6908438a
                                                          • Instruction ID: d4441b53ebe349c3ec0b9e7f88ea13a6e5af0322f257fe826d59663f98d74ccd
                                                          • Opcode Fuzzy Hash: d8369e35a2b22ab3b5a91e869411cbd3f76c73c5dcc971a3c7c3419a6908438a
                                                          • Instruction Fuzzy Hash: B3124EB5A00115EFDB14DF94C888EAEBBB5FF45318F248098E915AB291D731FD46CBA0
                                                          APIs
                                                          • GetMenuItemCount.USER32(00E81990), ref: 00DF2F8D
                                                          • GetMenuItemCount.USER32(00E81990), ref: 00DF303D
                                                          • GetCursorPos.USER32(?), ref: 00DF3081
                                                          • SetForegroundWindow.USER32(00000000), ref: 00DF308A
                                                          • TrackPopupMenuEx.USER32(00E81990,00000000,?,00000000,00000000,00000000), ref: 00DF309D
                                                          • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00DF30A9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                          • String ID: 0
                                                          • API String ID: 36266755-4108050209
                                                          • Opcode ID: ffe78e74c235170de1a1dc731de4476a163232a353ed107be419c62d3606f8db
                                                          • Instruction ID: 01508b2e3afdcca1642e0634f7c79f098f8e119adbf07d51e6b8ced0e1f4e989
                                                          • Opcode Fuzzy Hash: ffe78e74c235170de1a1dc731de4476a163232a353ed107be419c62d3606f8db
                                                          • Instruction Fuzzy Hash: 3F712870640209BEEB218F65CC49FFABF64FF05364F248216F615AA1E0C7B1AD54DBA0
                                                          APIs
                                                          • DestroyWindow.USER32(00000000,?), ref: 00E46DEB
                                                            • Part of subcall function 00DB6B57: _wcslen.LIBCMT ref: 00DB6B6A
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00E46E5F
                                                          • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00E46E81
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00E46E94
                                                          • DestroyWindow.USER32(?), ref: 00E46EB5
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00DB0000,00000000), ref: 00E46EE4
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00E46EFD
                                                          • GetDesktopWindow.USER32 ref: 00E46F16
                                                          • GetWindowRect.USER32(00000000), ref: 00E46F1D
                                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00E46F35
                                                          • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00E46F4D
                                                            • Part of subcall function 00DC9944: GetWindowLongW.USER32(?,000000EB), ref: 00DC9952
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                          • String ID: 0$tooltips_class32
                                                          • API String ID: 2429346358-3619404913
                                                          • Opcode ID: 18977d54e83f777fa3a76656af513fed9df404f5cd3b16eb13d419cbb625064d
                                                          • Instruction ID: a14eb8b64797db577014b75fb971883b0c6e3af9ae3ce97118fa74fdd263b5af
                                                          • Opcode Fuzzy Hash: 18977d54e83f777fa3a76656af513fed9df404f5cd3b16eb13d419cbb625064d
                                                          • Instruction Fuzzy Hash: D4716D74204340AFDB21CF19E844EA6BBF9FB8A708F14545DF999A7261C770E90ACB16
                                                          APIs
                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00E2C4B0
                                                          • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00E2C4C3
                                                          • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00E2C4D7
                                                          • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00E2C4F0
                                                          • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 00E2C533
                                                          • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00E2C549
                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00E2C554
                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00E2C584
                                                          • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00E2C5DC
                                                          • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00E2C5F0
                                                          • InternetCloseHandle.WININET(00000000), ref: 00E2C5FB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                          • String ID:
                                                          • API String ID: 3800310941-3916222277
                                                          • Opcode ID: dc2249a76c5df9603df980f0b00ffe609af81f74d091be5c6f27f3e79b8ec4cc
                                                          • Instruction ID: 8cd0fe12502681857a28ac2a1348db47a819c82378637e29b549ad3632e8aef5
                                                          • Opcode Fuzzy Hash: dc2249a76c5df9603df980f0b00ffe609af81f74d091be5c6f27f3e79b8ec4cc
                                                          • Instruction Fuzzy Hash: 4B519DB4140618BFDB218F61DD48AAF7BFCFF09748F20501AF946A7210DB74E9099B60
                                                          APIs
                                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 00E48592
                                                          • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00E485A2
                                                          • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00E485AD
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00E485BA
                                                          • GlobalLock.KERNEL32(00000000), ref: 00E485C8
                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00E485D7
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00E485E0
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00E485E7
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00E485F8
                                                          • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,00E4FC38,?), ref: 00E48611
                                                          • GlobalFree.KERNEL32(00000000), ref: 00E48621
                                                          • GetObjectW.GDI32(?,00000018,?), ref: 00E48641
                                                          • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00E48671
                                                          • DeleteObject.GDI32(?), ref: 00E48699
                                                          • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00E486AF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                          • String ID:
                                                          • API String ID: 3840717409-0
                                                          • Opcode ID: 5393cd85994f7a0187a3ca58db9f6ea5bb770d33a4f4b52bc715b155c3d8668e
                                                          • Instruction ID: 46babce7e9acc61876b1280685943a1ac9934fd8e258cba29ffd54e4b920bf9a
                                                          • Opcode Fuzzy Hash: 5393cd85994f7a0187a3ca58db9f6ea5bb770d33a4f4b52bc715b155c3d8668e
                                                          • Instruction Fuzzy Hash: 17412B75601204AFDB519FA6DD48EAE7BB8EF8AB15F114058F905F7260DB709906CB20
                                                          APIs
                                                          • VariantInit.OLEAUT32(00000000), ref: 00E21502
                                                          • VariantCopy.OLEAUT32(?,?), ref: 00E2150B
                                                          • VariantClear.OLEAUT32(?), ref: 00E21517
                                                          • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00E215FB
                                                          • VarR8FromDec.OLEAUT32(?,?), ref: 00E21657
                                                          • VariantInit.OLEAUT32(?), ref: 00E21708
                                                          • SysFreeString.OLEAUT32(?), ref: 00E2178C
                                                          • VariantClear.OLEAUT32(?), ref: 00E217D8
                                                          • VariantClear.OLEAUT32(?), ref: 00E217E7
                                                          • VariantInit.OLEAUT32(00000000), ref: 00E21823
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                          • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                          • API String ID: 1234038744-3931177956
                                                          • Opcode ID: c75af82ea3b4ee84e980d6be147cbd72ed143585c3a5426d8fc927413953e2a6
                                                          • Instruction ID: 2ea0faa379e536fd022257d559cb5eb42049de91d0b8a45c49585514c08b74d4
                                                          • Opcode Fuzzy Hash: c75af82ea3b4ee84e980d6be147cbd72ed143585c3a5426d8fc927413953e2a6
                                                          • Instruction Fuzzy Hash: 49D1BC71A00225EBDB109F65E885BB9B7B5FF95704F2090DAE406BB180DB30EE45DBB1
                                                          APIs
                                                            • Part of subcall function 00DB9CB3: _wcslen.LIBCMT ref: 00DB9CBD
                                                            • Part of subcall function 00E3C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00E3B6AE,?,?), ref: 00E3C9B5
                                                            • Part of subcall function 00E3C998: _wcslen.LIBCMT ref: 00E3C9F1
                                                            • Part of subcall function 00E3C998: _wcslen.LIBCMT ref: 00E3CA68
                                                            • Part of subcall function 00E3C998: _wcslen.LIBCMT ref: 00E3CA9E
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E3B6F4
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00E3B772
                                                          • RegDeleteValueW.ADVAPI32(?,?), ref: 00E3B80A
                                                          • RegCloseKey.ADVAPI32(?), ref: 00E3B87E
                                                          • RegCloseKey.ADVAPI32(?), ref: 00E3B89C
                                                          • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00E3B8F2
                                                          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00E3B904
                                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00E3B922
                                                          • FreeLibrary.KERNEL32(00000000), ref: 00E3B983
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00E3B994
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                                          • API String ID: 146587525-4033151799
                                                          • Opcode ID: d27709b35d8b2401a3b289f7bc98f40a523f9b6e9f7de3da5c7ec863bd637233
                                                          • Instruction ID: a1e25eb97eeb41e8dbcdf33a7dd93f7c7421c3aa5955af5374eadd96864b7909
                                                          • Opcode Fuzzy Hash: d27709b35d8b2401a3b289f7bc98f40a523f9b6e9f7de3da5c7ec863bd637233
                                                          • Instruction Fuzzy Hash: 4BC17B34204201EFD714DF14C499F6ABBE5FF84308F14959DF59AAB2A2CB31E946CBA1
                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 00E325D8
                                                          • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00E325E8
                                                          • CreateCompatibleDC.GDI32(?), ref: 00E325F4
                                                          • SelectObject.GDI32(00000000,?), ref: 00E32601
                                                          • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00E3266D
                                                          • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00E326AC
                                                          • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 00E326D0
                                                          • SelectObject.GDI32(?,?), ref: 00E326D8
                                                          • DeleteObject.GDI32(?), ref: 00E326E1
                                                          • DeleteDC.GDI32(?), ref: 00E326E8
                                                          • ReleaseDC.USER32(00000000,?), ref: 00E326F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                          • String ID: (
                                                          • API String ID: 2598888154-3887548279
                                                          • Opcode ID: aca4dcf99b93adba252bff41fc6df1642e12614c17225e0e3ea12382ebc20c78
                                                          • Instruction ID: 9ac606f3235c2b3d77e284cec70e52bf73f118b378cb39feccab7d3612f2a07c
                                                          • Opcode Fuzzy Hash: aca4dcf99b93adba252bff41fc6df1642e12614c17225e0e3ea12382ebc20c78
                                                          • Instruction Fuzzy Hash: E761D175D01219EFCB14CFA4D889AAEBBF6FF48310F208529EA55B7250D770A941CFA0
                                                          APIs
                                                          • ___free_lconv_mon.LIBCMT ref: 00DEDAA1
                                                            • Part of subcall function 00DED63C: _free.LIBCMT ref: 00DED659
                                                            • Part of subcall function 00DED63C: _free.LIBCMT ref: 00DED66B
                                                            • Part of subcall function 00DED63C: _free.LIBCMT ref: 00DED67D
                                                            • Part of subcall function 00DED63C: _free.LIBCMT ref: 00DED68F
                                                            • Part of subcall function 00DED63C: _free.LIBCMT ref: 00DED6A1
                                                            • Part of subcall function 00DED63C: _free.LIBCMT ref: 00DED6B3
                                                            • Part of subcall function 00DED63C: _free.LIBCMT ref: 00DED6C5
                                                            • Part of subcall function 00DED63C: _free.LIBCMT ref: 00DED6D7
                                                            • Part of subcall function 00DED63C: _free.LIBCMT ref: 00DED6E9
                                                            • Part of subcall function 00DED63C: _free.LIBCMT ref: 00DED6FB
                                                            • Part of subcall function 00DED63C: _free.LIBCMT ref: 00DED70D
                                                            • Part of subcall function 00DED63C: _free.LIBCMT ref: 00DED71F
                                                            • Part of subcall function 00DED63C: _free.LIBCMT ref: 00DED731
                                                          • _free.LIBCMT ref: 00DEDA96
                                                            • Part of subcall function 00DE29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00DED7D1,00000000,00000000,00000000,00000000,?,00DED7F8,00000000,00000007,00000000,?,00DEDBF5,00000000), ref: 00DE29DE
                                                            • Part of subcall function 00DE29C8: GetLastError.KERNEL32(00000000,?,00DED7D1,00000000,00000000,00000000,00000000,?,00DED7F8,00000000,00000007,00000000,?,00DEDBF5,00000000,00000000), ref: 00DE29F0
                                                          • _free.LIBCMT ref: 00DEDAB8
                                                          • _free.LIBCMT ref: 00DEDACD
                                                          • _free.LIBCMT ref: 00DEDAD8
                                                          • _free.LIBCMT ref: 00DEDAFA
                                                          • _free.LIBCMT ref: 00DEDB0D
                                                          • _free.LIBCMT ref: 00DEDB1B
                                                          • _free.LIBCMT ref: 00DEDB26
                                                          • _free.LIBCMT ref: 00DEDB5E
                                                          • _free.LIBCMT ref: 00DEDB65
                                                          • _free.LIBCMT ref: 00DEDB82
                                                          • _free.LIBCMT ref: 00DEDB9A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                          • String ID:
                                                          • API String ID: 161543041-0
                                                          • Opcode ID: a90e40a96bbdbf11f343260b79861bac4b4a33b6c2b8f5da9ad6f28c3f68aee4
                                                          • Instruction ID: f1097d054e96856f0fbcc5598e00bc73c7c73db9e76567aab2f9176442d8dd22
                                                          • Opcode Fuzzy Hash: a90e40a96bbdbf11f343260b79861bac4b4a33b6c2b8f5da9ad6f28c3f68aee4
                                                          • Instruction Fuzzy Hash: 43316F316447889FEB21BA3ADC46B6A77EAFF10310F195429E459D7192EF35AD408B30
                                                          APIs
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 00E1369C
                                                          • _wcslen.LIBCMT ref: 00E136A7
                                                          • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00E13797
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 00E1380C
                                                          • GetDlgCtrlID.USER32(?), ref: 00E1385D
                                                          • GetWindowRect.USER32(?,?), ref: 00E13882
                                                          • GetParent.USER32(?), ref: 00E138A0
                                                          • ScreenToClient.USER32(00000000), ref: 00E138A7
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 00E13921
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 00E1395D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                          • String ID: %s%u
                                                          • API String ID: 4010501982-679674701
                                                          • Opcode ID: 671dd3267be2865f8f8b532e765c9bc40bfc42aeadede230c1eab05e2b0a9f03
                                                          • Instruction ID: 208d4ae9f4fde12894466d440ab9c4e8486778d22cb434fad202366920f57ffd
                                                          • Opcode Fuzzy Hash: 671dd3267be2865f8f8b532e765c9bc40bfc42aeadede230c1eab05e2b0a9f03
                                                          • Instruction Fuzzy Hash: E191C471204606AFD719DF34C885FEAF7A8FF44354F109529F999E2190DB30EA85CBA1
                                                          APIs
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 00E14994
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 00E149DA
                                                          • _wcslen.LIBCMT ref: 00E149EB
                                                          • CharUpperBuffW.USER32(?,00000000), ref: 00E149F7
                                                          • _wcsstr.LIBVCRUNTIME ref: 00E14A2C
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 00E14A64
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 00E14A9D
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 00E14AE6
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 00E14B20
                                                          • GetWindowRect.USER32(?,?), ref: 00E14B8B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                          • String ID: ThumbnailClass
                                                          • API String ID: 1311036022-1241985126
                                                          • Opcode ID: 4ea8073282e774cc3d966e85a791b1eb9e60db342a33e00ac6c0611a38c49111
                                                          • Instruction ID: 0033bdf5c07ff805aff6e0ca0aaa46f235c8efb2de9b7e53f47ec722dddf31a9
                                                          • Opcode Fuzzy Hash: 4ea8073282e774cc3d966e85a791b1eb9e60db342a33e00ac6c0611a38c49111
                                                          • Instruction Fuzzy Hash: 699190B10082059FDB04DF14C985FEAB7E8FF44758F049469FD85AA296EB30ED85CBA1
                                                          APIs
                                                            • Part of subcall function 00DC9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DC9BB2
                                                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00E48D5A
                                                          • GetFocus.USER32 ref: 00E48D6A
                                                          • GetDlgCtrlID.USER32(00000000), ref: 00E48D75
                                                          • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 00E48E1D
                                                          • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00E48ECF
                                                          • GetMenuItemCount.USER32(?), ref: 00E48EEC
                                                          • GetMenuItemID.USER32(?,00000000), ref: 00E48EFC
                                                          • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00E48F2E
                                                          • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00E48F70
                                                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00E48FA1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                                          • String ID: 0
                                                          • API String ID: 1026556194-4108050209
                                                          • Opcode ID: 6230dfa497e4dbb76fc6867b5bd2bf0a5fbfbe44ee346f55ec40a59b93fef0d4
                                                          • Instruction ID: 80697578f3797283797e93f5dfd420392b323ce239955d39eb76d0cfc10f94ed
                                                          • Opcode Fuzzy Hash: 6230dfa497e4dbb76fc6867b5bd2bf0a5fbfbe44ee346f55ec40a59b93fef0d4
                                                          • Instruction Fuzzy Hash: 8381CC71604305AFD710CF25ED84AAF7BE9FB88718F141919F984A7291DB30D909CBA2
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(00E81990,000000FF,00000000,00000030), ref: 00E1BFAC
                                                          • SetMenuItemInfoW.USER32(00E81990,00000004,00000000,00000030), ref: 00E1BFE1
                                                          • Sleep.KERNEL32(000001F4), ref: 00E1BFF3
                                                          • GetMenuItemCount.USER32(?), ref: 00E1C039
                                                          • GetMenuItemID.USER32(?,00000000), ref: 00E1C056
                                                          • GetMenuItemID.USER32(?,-00000001), ref: 00E1C082
                                                          • GetMenuItemID.USER32(?,?), ref: 00E1C0C9
                                                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00E1C10F
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00E1C124
                                                          • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00E1C145
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$CheckCountRadioSleep
                                                          • String ID: 0
                                                          • API String ID: 1460738036-4108050209
                                                          • Opcode ID: a7781f8de45f5bf340d5371c1d04bbe47e020eebdc535cf83828cea525cb088c
                                                          • Instruction ID: 6d2141bbd3dcbfeded899b2d3db9566b27f09a96a0cffa76b91e3b72acfdfbd6
                                                          • Opcode Fuzzy Hash: a7781f8de45f5bf340d5371c1d04bbe47e020eebdc535cf83828cea525cb088c
                                                          • Instruction Fuzzy Hash: AB617FB0A8124AAFDF11CF64CC88AEE7BB9EB09348F205155E851F3291C735AD85CB61
                                                          APIs
                                                          • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00E1DC20
                                                          • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00E1DC46
                                                          • _wcslen.LIBCMT ref: 00E1DC50
                                                          • _wcsstr.LIBVCRUNTIME ref: 00E1DCA0
                                                          • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00E1DCBC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                                                          • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                          • API String ID: 1939486746-1459072770
                                                          • Opcode ID: d049bd89b0f19c8603c64c3d0fd9358f0002138f047e9444d7e31cfc76146fbd
                                                          • Instruction ID: 68fc64fc0fd312c0209cf6df86147e2464894c95d272e841c99e7a7065f8d287
                                                          • Opcode Fuzzy Hash: d049bd89b0f19c8603c64c3d0fd9358f0002138f047e9444d7e31cfc76146fbd
                                                          • Instruction Fuzzy Hash: B541FF32A402017AEB14A775AC47FFF77ACEF52710F20546AF901B7282EB71990197B5
                                                          APIs
                                                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00E3CC64
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 00E3CC8D
                                                          • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00E3CD48
                                                            • Part of subcall function 00E3CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 00E3CCAA
                                                            • Part of subcall function 00E3CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 00E3CCBD
                                                            • Part of subcall function 00E3CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00E3CCCF
                                                            • Part of subcall function 00E3CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00E3CD05
                                                            • Part of subcall function 00E3CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00E3CD28
                                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00E3CCF3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                                          • API String ID: 2734957052-4033151799
                                                          • Opcode ID: 43981d8650014d10f4eb6c2a053342e4060f84048bc225fa638b891a3ea476f1
                                                          • Instruction ID: 1485af339a8294be371e72fb18619335ae2ce9d5561d9bfa6a15db436d592301
                                                          • Opcode Fuzzy Hash: 43981d8650014d10f4eb6c2a053342e4060f84048bc225fa638b891a3ea476f1
                                                          • Instruction Fuzzy Hash: 81315A75A02128BBDB208B51DC8CEEFBF7CEF46744F201165B905F3240DA349A4ADBA1
                                                          APIs
                                                          • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00E23D40
                                                          • _wcslen.LIBCMT ref: 00E23D6D
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00E23D9D
                                                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00E23DBE
                                                          • RemoveDirectoryW.KERNEL32(?), ref: 00E23DCE
                                                          • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00E23E55
                                                          • CloseHandle.KERNEL32(00000000), ref: 00E23E60
                                                          • CloseHandle.KERNEL32(00000000), ref: 00E23E6B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                          • String ID: :$\$\??\%s
                                                          • API String ID: 1149970189-3457252023
                                                          • Opcode ID: b369ebb85f52425867ae363615df1f47e55555d1822c36e819fa9f6eef3c810b
                                                          • Instruction ID: baee620891e5b7f4c397e06e75c00dadee85cfff0887d511445dd121d63ded42
                                                          • Opcode Fuzzy Hash: b369ebb85f52425867ae363615df1f47e55555d1822c36e819fa9f6eef3c810b
                                                          • Instruction Fuzzy Hash: 5A31C376A00219ABDB209FA1DC48FEB37BDEF89704F2040A5F509E2160E77497458F34
                                                          APIs
                                                          • timeGetTime.WINMM ref: 00E1E6B4
                                                            • Part of subcall function 00DCE551: timeGetTime.WINMM(?,?,00E1E6D4), ref: 00DCE555
                                                          • Sleep.KERNEL32(0000000A), ref: 00E1E6E1
                                                          • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 00E1E705
                                                          • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 00E1E727
                                                          • SetActiveWindow.USER32 ref: 00E1E746
                                                          • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00E1E754
                                                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 00E1E773
                                                          • Sleep.KERNEL32(000000FA), ref: 00E1E77E
                                                          • IsWindow.USER32 ref: 00E1E78A
                                                          • EndDialog.USER32(00000000), ref: 00E1E79B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                          • String ID: BUTTON
                                                          • API String ID: 1194449130-3405671355
                                                          • Opcode ID: b5ada97997f87f1dfdd72b1aaf8c485e93b6716adde76a7d23cb0eb0b674599f
                                                          • Instruction ID: 6ee06ba3162190e05c217df219c639b50be6cd7d102cfe68edb9b787b0bf20b5
                                                          • Opcode Fuzzy Hash: b5ada97997f87f1dfdd72b1aaf8c485e93b6716adde76a7d23cb0eb0b674599f
                                                          • Instruction Fuzzy Hash: B421DB74201201AFFB005F32EC89E653BA9F75674CF146429FD19B32B1EB719C49AB25
                                                          APIs
                                                            • Part of subcall function 00DB9CB3: _wcslen.LIBCMT ref: 00DB9CBD
                                                          • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00E1EA5D
                                                          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00E1EA73
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00E1EA84
                                                          • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00E1EA96
                                                          • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00E1EAA7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: SendString$_wcslen
                                                          • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                          • API String ID: 2420728520-1007645807
                                                          • Opcode ID: ca5ef73965242c72b8341effb3a1d3ecb2f328fcd987428761743533de0910f8
                                                          • Instruction ID: cb09abd33443a485387f90961481daca2767b46db4c892809ff2f2f176d877da
                                                          • Opcode Fuzzy Hash: ca5ef73965242c72b8341effb3a1d3ecb2f328fcd987428761743533de0910f8
                                                          • Instruction Fuzzy Hash: E7119131A50359B9D720A7A1DC4ADFF6B7CEFD1F08F405429B906B20D1EE704945C9B0
                                                          APIs
                                                          • GetKeyboardState.USER32(?), ref: 00E1A012
                                                          • SetKeyboardState.USER32(?), ref: 00E1A07D
                                                          • GetAsyncKeyState.USER32(000000A0), ref: 00E1A09D
                                                          • GetKeyState.USER32(000000A0), ref: 00E1A0B4
                                                          • GetAsyncKeyState.USER32(000000A1), ref: 00E1A0E3
                                                          • GetKeyState.USER32(000000A1), ref: 00E1A0F4
                                                          • GetAsyncKeyState.USER32(00000011), ref: 00E1A120
                                                          • GetKeyState.USER32(00000011), ref: 00E1A12E
                                                          • GetAsyncKeyState.USER32(00000012), ref: 00E1A157
                                                          • GetKeyState.USER32(00000012), ref: 00E1A165
                                                          • GetAsyncKeyState.USER32(0000005B), ref: 00E1A18E
                                                          • GetKeyState.USER32(0000005B), ref: 00E1A19C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: State$Async$Keyboard
                                                          • String ID:
                                                          • API String ID: 541375521-0
                                                          • Opcode ID: 0148bbd9b74e010eee4c6e6a784607df1fc1ede5c76ca7038516431a3878263b
                                                          • Instruction ID: e306a1cd2f599dbfebbf21dab7da08d419b808984d0baacc1932dade69ee5397
                                                          • Opcode Fuzzy Hash: 0148bbd9b74e010eee4c6e6a784607df1fc1ede5c76ca7038516431a3878263b
                                                          • Instruction Fuzzy Hash: 2051C770A0678429FB35EB708810BFAAFF55F16384F0C95A9D5C2671C3DA649ACCC762
                                                          APIs
                                                          • GetDlgItem.USER32(?,00000001), ref: 00E15CE2
                                                          • GetWindowRect.USER32(00000000,?), ref: 00E15CFB
                                                          • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00E15D59
                                                          • GetDlgItem.USER32(?,00000002), ref: 00E15D69
                                                          • GetWindowRect.USER32(00000000,?), ref: 00E15D7B
                                                          • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00E15DCF
                                                          • GetDlgItem.USER32(?,000003E9), ref: 00E15DDD
                                                          • GetWindowRect.USER32(00000000,?), ref: 00E15DEF
                                                          • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00E15E31
                                                          • GetDlgItem.USER32(?,000003EA), ref: 00E15E44
                                                          • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00E15E5A
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00E15E67
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ItemMoveRect$Invalidate
                                                          • String ID:
                                                          • API String ID: 3096461208-0
                                                          • Opcode ID: c5987b03010f17804984b677197d5f7d6af62c6758fd26e08be4d2e54db2201e
                                                          • Instruction ID: 222306b02004c294d59afaa7bfbed377fe3df0b72d553d7fe2aaf6af602b0cd2
                                                          • Opcode Fuzzy Hash: c5987b03010f17804984b677197d5f7d6af62c6758fd26e08be4d2e54db2201e
                                                          • Instruction Fuzzy Hash: 37513CB5B00605AFDB18CF69DD89AAEBBB5EB88700F208129F915F7290D7709E45CB50
                                                          APIs
                                                            • Part of subcall function 00DC8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00DC8BE8,?,00000000,?,?,?,?,00DC8BBA,00000000,?), ref: 00DC8FC5
                                                          • DestroyWindow.USER32(?), ref: 00DC8C81
                                                          • KillTimer.USER32(00000000,?,?,?,?,00DC8BBA,00000000,?), ref: 00DC8D1B
                                                          • DestroyAcceleratorTable.USER32(00000000), ref: 00E06973
                                                          • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00DC8BBA,00000000,?), ref: 00E069A1
                                                          • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00DC8BBA,00000000,?), ref: 00E069B8
                                                          • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00DC8BBA,00000000), ref: 00E069D4
                                                          • DeleteObject.GDI32(00000000), ref: 00E069E6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                          • String ID:
                                                          • API String ID: 641708696-0
                                                          • Opcode ID: f7f23b7ca51162fb9ac883802926249d2be500e05c90ae795af858102a16b0db
                                                          • Instruction ID: c4ed8abdf24211724bedc4c19c284dd0d3da645eaec7692283391bc170ef54e4
                                                          • Opcode Fuzzy Hash: f7f23b7ca51162fb9ac883802926249d2be500e05c90ae795af858102a16b0db
                                                          • Instruction Fuzzy Hash: 3A61AC30502702DFCB259F16DA48F2577F1FB81316F14555DE086AB9A0CB35AC9AEFA0
                                                          APIs
                                                            • Part of subcall function 00DC9944: GetWindowLongW.USER32(?,000000EB), ref: 00DC9952
                                                          • GetSysColor.USER32(0000000F), ref: 00DC9862
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ColorLongWindow
                                                          • String ID:
                                                          • API String ID: 259745315-0
                                                          • Opcode ID: fa059b0c4a089d5f2c7e7dc675bc501923a5f06f267fde6fa91b232c618cf965
                                                          • Instruction ID: 414e2f8856594c406eb4222fc298edeb0cc13b932433b2a60f2cf3e752e25d32
                                                          • Opcode Fuzzy Hash: fa059b0c4a089d5f2c7e7dc675bc501923a5f06f267fde6fa91b232c618cf965
                                                          • Instruction Fuzzy Hash: 4841B1355056419FDF205F399C98FB97B65AB07330F284649F9A2A72E2C7319D42DB20
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,00DFF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00E19717
                                                          • LoadStringW.USER32(00000000,?,00DFF7F8,00000001), ref: 00E19720
                                                            • Part of subcall function 00DB9CB3: _wcslen.LIBCMT ref: 00DB9CBD
                                                          • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,00DFF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00E19742
                                                          • LoadStringW.USER32(00000000,?,00DFF7F8,00000001), ref: 00E19745
                                                          • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00E19866
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString$Message_wcslen
                                                          • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                          • API String ID: 747408836-2268648507
                                                          • Opcode ID: f1c3b8ded7c1283c50192e137fed088aa9786bb73f8d24fa7c2f9c2334342885
                                                          • Instruction ID: 6b45a813604bd7a21566f3efd4bab68c7051e806b1745fe2bc686e11984421ef
                                                          • Opcode Fuzzy Hash: f1c3b8ded7c1283c50192e137fed088aa9786bb73f8d24fa7c2f9c2334342885
                                                          • Instruction Fuzzy Hash: 38414C72800209AACB04EBE4DD96DEEB7B8EF55340F600065F60672192EB356F48CB71
                                                          APIs
                                                            • Part of subcall function 00DB6B57: _wcslen.LIBCMT ref: 00DB6B6A
                                                          • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00E107A2
                                                          • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00E107BE
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00E107DA
                                                          • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00E10804
                                                          • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 00E1082C
                                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00E10837
                                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00E1083C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                          • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                          • API String ID: 323675364-22481851
                                                          • Opcode ID: 3691ae8c3088a7037c2d21b5911922320eb7ff99d41f30100e60af54f84aad46
                                                          • Instruction ID: a15e88f04a06a41e4bf690b20cfb3d37dcca128cc50a1d6489926cef798bb7cd
                                                          • Opcode Fuzzy Hash: 3691ae8c3088a7037c2d21b5911922320eb7ff99d41f30100e60af54f84aad46
                                                          • Instruction Fuzzy Hash: CA412976C00228EFDF15EBA4DC958EDB778FF04340B54412AE916B31A0EB70AE44CBA0
                                                          APIs
                                                          • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00E4403B
                                                          • CreateCompatibleDC.GDI32(00000000), ref: 00E44042
                                                          • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00E44055
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00E4405D
                                                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 00E44068
                                                          • DeleteDC.GDI32(00000000), ref: 00E44072
                                                          • GetWindowLongW.USER32(?,000000EC), ref: 00E4407C
                                                          • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 00E44092
                                                          • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 00E4409E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                          • String ID: static
                                                          • API String ID: 2559357485-2160076837
                                                          • Opcode ID: f5678afadb71371197776d6650b56009e9316f236c1b8e270ca55de5e59a964a
                                                          • Instruction ID: ac6e4230ee2e694edb2fb0acc260df435b4c67f62ba488ea43941920c23d95c4
                                                          • Opcode Fuzzy Hash: f5678afadb71371197776d6650b56009e9316f236c1b8e270ca55de5e59a964a
                                                          • Instruction Fuzzy Hash: 47317C76202215AFDF219FA5DC09FDA3BA8EF0E724F111211FA18B61A0C775D825DB64
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 00E33C5C
                                                          • CoInitialize.OLE32(00000000), ref: 00E33C8A
                                                          • CoUninitialize.OLE32 ref: 00E33C94
                                                          • _wcslen.LIBCMT ref: 00E33D2D
                                                          • GetRunningObjectTable.OLE32(00000000,?), ref: 00E33DB1
                                                          • SetErrorMode.KERNEL32(00000001,00000029), ref: 00E33ED5
                                                          • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00E33F0E
                                                          • CoGetObject.OLE32(?,00000000,00E4FB98,?), ref: 00E33F2D
                                                          • SetErrorMode.KERNEL32(00000000), ref: 00E33F40
                                                          • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00E33FC4
                                                          • VariantClear.OLEAUT32(?), ref: 00E33FD8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                          • String ID:
                                                          • API String ID: 429561992-0
                                                          • Opcode ID: 9269ddc1f1a69f1e6d5331225590ce979a24f0ff63d37d26143649644f7e916c
                                                          • Instruction ID: c4b3f39e7758794241d42e2e5da90c7c700ea6c1fae9561451a6f7e347354a8d
                                                          • Opcode Fuzzy Hash: 9269ddc1f1a69f1e6d5331225590ce979a24f0ff63d37d26143649644f7e916c
                                                          • Instruction Fuzzy Hash: 26C122716083019FD700DF69C888D6ABBE9FF89748F10591DF98AAB250D731EE45CB62
                                                          APIs
                                                          • CoInitialize.OLE32(00000000), ref: 00E27AF3
                                                          • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00E27B8F
                                                          • SHGetDesktopFolder.SHELL32(?), ref: 00E27BA3
                                                          • CoCreateInstance.OLE32(00E4FD08,00000000,00000001,00E76E6C,?), ref: 00E27BEF
                                                          • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00E27C74
                                                          • CoTaskMemFree.OLE32(?,?), ref: 00E27CCC
                                                          • SHBrowseForFolderW.SHELL32(?), ref: 00E27D57
                                                          • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00E27D7A
                                                          • CoTaskMemFree.OLE32(00000000), ref: 00E27D81
                                                          • CoTaskMemFree.OLE32(00000000), ref: 00E27DD6
                                                          • CoUninitialize.OLE32 ref: 00E27DDC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                          • String ID:
                                                          • API String ID: 2762341140-0
                                                          • Opcode ID: 3c7a1e2c9ddfa0d2b4a2700032636381e7456ab034040120370ab4a5cb7b193d
                                                          • Instruction ID: 05bbd182a02a5b097e097c466ffe660ad9c0428ed7696e786db890bb3523173a
                                                          • Opcode Fuzzy Hash: 3c7a1e2c9ddfa0d2b4a2700032636381e7456ab034040120370ab4a5cb7b193d
                                                          • Instruction Fuzzy Hash: FEC15C75A00119EFCB14DF64D884DAEBBF9FF49304B148499E416EB261D730EE45CBA0
                                                          APIs
                                                          • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00E45504
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00E45515
                                                          • CharNextW.USER32(00000158), ref: 00E45544
                                                          • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00E45585
                                                          • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00E4559B
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00E455AC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CharNext
                                                          • String ID:
                                                          • API String ID: 1350042424-0
                                                          • Opcode ID: 735f07ca7f2f94ad8926acf8339926711ef0b34eb80eff32a1a12e5e6c3051a9
                                                          • Instruction ID: b8babaa96e31f69ad6e9ce3bce3b6f9e4b4f12319475912e84d831cd67f9fb11
                                                          • Opcode Fuzzy Hash: 735f07ca7f2f94ad8926acf8339926711ef0b34eb80eff32a1a12e5e6c3051a9
                                                          • Instruction Fuzzy Hash: 1461C136904608EFDF108F61EC849FE3BB9EF06724F109145FA25BB292D7349A85DB61
                                                          APIs
                                                          • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00E0FAAF
                                                          • SafeArrayAllocData.OLEAUT32(?), ref: 00E0FB08
                                                          • VariantInit.OLEAUT32(?), ref: 00E0FB1A
                                                          • SafeArrayAccessData.OLEAUT32(?,?), ref: 00E0FB3A
                                                          • VariantCopy.OLEAUT32(?,?), ref: 00E0FB8D
                                                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 00E0FBA1
                                                          • VariantClear.OLEAUT32(?), ref: 00E0FBB6
                                                          • SafeArrayDestroyData.OLEAUT32(?), ref: 00E0FBC3
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00E0FBCC
                                                          • VariantClear.OLEAUT32(?), ref: 00E0FBDE
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00E0FBE9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                          • String ID:
                                                          • API String ID: 2706829360-0
                                                          • Opcode ID: ecf6a2d2689262f6970ea0da81414e8b93ca5208fa412c836c4657849db6c888
                                                          • Instruction ID: 7f948aef32d6baa2602c3e5b0f8e0b0d100beb918fa6787ecc6e8697f78706f5
                                                          • Opcode Fuzzy Hash: ecf6a2d2689262f6970ea0da81414e8b93ca5208fa412c836c4657849db6c888
                                                          • Instruction Fuzzy Hash: 01417135A01219DFCB10DF65C8549EDBBB9FF48354F108069E956B72A1CB30A986CFA0
                                                          APIs
                                                          • GetKeyboardState.USER32(?), ref: 00E19CA1
                                                          • GetAsyncKeyState.USER32(000000A0), ref: 00E19D22
                                                          • GetKeyState.USER32(000000A0), ref: 00E19D3D
                                                          • GetAsyncKeyState.USER32(000000A1), ref: 00E19D57
                                                          • GetKeyState.USER32(000000A1), ref: 00E19D6C
                                                          • GetAsyncKeyState.USER32(00000011), ref: 00E19D84
                                                          • GetKeyState.USER32(00000011), ref: 00E19D96
                                                          • GetAsyncKeyState.USER32(00000012), ref: 00E19DAE
                                                          • GetKeyState.USER32(00000012), ref: 00E19DC0
                                                          • GetAsyncKeyState.USER32(0000005B), ref: 00E19DD8
                                                          • GetKeyState.USER32(0000005B), ref: 00E19DEA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: State$Async$Keyboard
                                                          • String ID:
                                                          • API String ID: 541375521-0
                                                          • Opcode ID: 5410ec333ee31cf240bd108855afb1d4d2bb03a602c2c1e0e174fde14aa9ec7d
                                                          • Instruction ID: 42f886934ef98aec2cd4e8fb143e9802d6b798745022a35bac18a58f01c28768
                                                          • Opcode Fuzzy Hash: 5410ec333ee31cf240bd108855afb1d4d2bb03a602c2c1e0e174fde14aa9ec7d
                                                          • Instruction Fuzzy Hash: 8E41D5346047C96DFF708A65D8243F5FEE06B12348F48905ADAC67B5C3DBA499C8C7A2
                                                          APIs
                                                          • WSAStartup.WSOCK32(00000101,?), ref: 00E305BC
                                                          • inet_addr.WSOCK32(?), ref: 00E3061C
                                                          • gethostbyname.WSOCK32(?), ref: 00E30628
                                                          • IcmpCreateFile.IPHLPAPI ref: 00E30636
                                                          • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00E306C6
                                                          • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00E306E5
                                                          • IcmpCloseHandle.IPHLPAPI(?), ref: 00E307B9
                                                          • WSACleanup.WSOCK32 ref: 00E307BF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                          • String ID: Ping
                                                          • API String ID: 1028309954-2246546115
                                                          • Opcode ID: 64b4d020e5bed17e5a35a2964cd8d06e5e7db37cf68af0f8ac7672917811235f
                                                          • Instruction ID: 033815879702bd3837dc8933b821d0e524268c9bed11d5c4fa2032827e6fbe92
                                                          • Opcode Fuzzy Hash: 64b4d020e5bed17e5a35a2964cd8d06e5e7db37cf68af0f8ac7672917811235f
                                                          • Instruction Fuzzy Hash: 89918C35605201AFD320DF15C499F5ABBE0EF88318F1495AAF46AAB6A2C730EC45CF91
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharLower
                                                          • String ID: cdecl$none$stdcall$winapi
                                                          • API String ID: 707087890-567219261
                                                          • Opcode ID: 2048911632f1384db9e84ec179c9d9c75c7e00d340cc9a8e47888840a2c6b1f3
                                                          • Instruction ID: b61782d3ba17d7169c5a322efaf843a0e54e2c5486966961a266cbce7ceca258
                                                          • Opcode Fuzzy Hash: 2048911632f1384db9e84ec179c9d9c75c7e00d340cc9a8e47888840a2c6b1f3
                                                          • Instruction Fuzzy Hash: A0519F31A002169BCF14DF69CE548BEBBA5EF64728F605229F426B7284DB34DD40C7A0
                                                          APIs
                                                          • CoInitialize.OLE32 ref: 00E33774
                                                          • CoUninitialize.OLE32 ref: 00E3377F
                                                          • CoCreateInstance.OLE32(?,00000000,00000017,00E4FB78,?), ref: 00E337D9
                                                          • IIDFromString.OLE32(?,?), ref: 00E3384C
                                                          • VariantInit.OLEAUT32(?), ref: 00E338E4
                                                          • VariantClear.OLEAUT32(?), ref: 00E33936
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                          • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                          • API String ID: 636576611-1287834457
                                                          • Opcode ID: e16e8f13dc5610733d9e7df1dbaf173b92d21ffd267d32efc1f2fc088ccb9fcf
                                                          • Instruction ID: 8879f2c89b8f660dd3039741d1fd7170aa27d846ec39a6ea27d5bb523a5fe422
                                                          • Opcode Fuzzy Hash: e16e8f13dc5610733d9e7df1dbaf173b92d21ffd267d32efc1f2fc088ccb9fcf
                                                          • Instruction Fuzzy Hash: B561A274608301AFD314DF64C889F9ABBE4EF89715F10581EF585A7291C770EE49CBA2
                                                          APIs
                                                            • Part of subcall function 00DC9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DC9BB2
                                                            • Part of subcall function 00DC912D: GetCursorPos.USER32(?), ref: 00DC9141
                                                            • Part of subcall function 00DC912D: ScreenToClient.USER32(00000000,?), ref: 00DC915E
                                                            • Part of subcall function 00DC912D: GetAsyncKeyState.USER32(00000001), ref: 00DC9183
                                                            • Part of subcall function 00DC912D: GetAsyncKeyState.USER32(00000002), ref: 00DC919D
                                                          • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 00E48B6B
                                                          • ImageList_EndDrag.COMCTL32 ref: 00E48B71
                                                          • ReleaseCapture.USER32 ref: 00E48B77
                                                          • SetWindowTextW.USER32(?,00000000), ref: 00E48C12
                                                          • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00E48C25
                                                          • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 00E48CFF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                          • String ID: @GUI_DRAGFILE$@GUI_DROPID$p#
                                                          • API String ID: 1924731296-655930031
                                                          • Opcode ID: 30976f11a09f9d763ce190b5182631b9cd97ba8d4aef8dee5647df32f3abb5e3
                                                          • Instruction ID: bdc07ced848ca54fb4dba7922b1167711332cc755502badd049bb4dd98b035a7
                                                          • Opcode Fuzzy Hash: 30976f11a09f9d763ce190b5182631b9cd97ba8d4aef8dee5647df32f3abb5e3
                                                          • Instruction Fuzzy Hash: 8C518A70205300AFD704EF24DC96BAEB7E4FB88714F10066DF996672E1CB709909CB62
                                                          APIs
                                                          • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00E233CF
                                                            • Part of subcall function 00DB9CB3: _wcslen.LIBCMT ref: 00DB9CBD
                                                          • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00E233F0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: LoadString$_wcslen
                                                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                          • API String ID: 4099089115-3080491070
                                                          • Opcode ID: 01a03498ab417b1ff9ec037922f081a889fd8ca93563c6b2942b47fdb58cc120
                                                          • Instruction ID: 44fbd6194a697cd22f43b08b0ff5d4201ca718e5e4c6ff12e52a86db95b13d6f
                                                          • Opcode Fuzzy Hash: 01a03498ab417b1ff9ec037922f081a889fd8ca93563c6b2942b47fdb58cc120
                                                          • Instruction Fuzzy Hash: 6F519C71800219AADF15EBA0DD52EEEB7B9EF04344F204065F10A72052EB256F98DF70
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharUpper
                                                          • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                          • API String ID: 1256254125-769500911
                                                          • Opcode ID: 29cee087d1e03cc1d44dc8e8e6ce1d62ec0c52f750fc6ac95e29eb475fb38b5e
                                                          • Instruction ID: eb5d99563d0b41409d4c21ff386eafc3f2929c3b55ec0011c7f45f1b9ac1c8d2
                                                          • Opcode Fuzzy Hash: 29cee087d1e03cc1d44dc8e8e6ce1d62ec0c52f750fc6ac95e29eb475fb38b5e
                                                          • Instruction Fuzzy Hash: F541C932A001269BCB105F7DC9915FE77A5ABB076CB25522AE465E7284E731CDC1C7A0
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 00E253A0
                                                          • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00E25416
                                                          • GetLastError.KERNEL32 ref: 00E25420
                                                          • SetErrorMode.KERNEL32(00000000,READY), ref: 00E254A7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Error$Mode$DiskFreeLastSpace
                                                          • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                          • API String ID: 4194297153-14809454
                                                          • Opcode ID: 0f40d7fc631d30c2a52d00edeb84cecd6abfb5d0252231a874f8a22e63a8a086
                                                          • Instruction ID: 1437472f8676d6be8b0494d4a16f45ec62681ff1835b446fc9a9b0e4f5dadbba
                                                          • Opcode Fuzzy Hash: 0f40d7fc631d30c2a52d00edeb84cecd6abfb5d0252231a874f8a22e63a8a086
                                                          • Instruction Fuzzy Hash: D731F236A00514DFC710EF68D585AEEBBB4EF45309F149066E517EB292D730DD86CBA0
                                                          APIs
                                                          • CreateMenu.USER32 ref: 00E43C79
                                                          • SetMenu.USER32(?,00000000), ref: 00E43C88
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00E43D10
                                                          • IsMenu.USER32(?), ref: 00E43D24
                                                          • CreatePopupMenu.USER32 ref: 00E43D2E
                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00E43D5B
                                                          • DrawMenuBar.USER32 ref: 00E43D63
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                          • String ID: 0$F
                                                          • API String ID: 161812096-3044882817
                                                          • Opcode ID: d032eba9f81f55f24d1f14ab16f7057aea865b9ef0f97d21dd22e8b0a31149f1
                                                          • Instruction ID: 2a0eefd63c013cfbfe1a037b8ec099f7339439d4616743b0ddd7dbc2dd7dfe21
                                                          • Opcode Fuzzy Hash: d032eba9f81f55f24d1f14ab16f7057aea865b9ef0f97d21dd22e8b0a31149f1
                                                          • Instruction Fuzzy Hash: 60417A79A02209EFDB14CF65E884AEE7BB9FF49354F140029F946A7360D730AA15CF94
                                                          APIs
                                                            • Part of subcall function 00DB9CB3: _wcslen.LIBCMT ref: 00DB9CBD
                                                            • Part of subcall function 00E13CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00E13CCA
                                                          • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 00E11F64
                                                          • GetDlgCtrlID.USER32 ref: 00E11F6F
                                                          • GetParent.USER32 ref: 00E11F8B
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00E11F8E
                                                          • GetDlgCtrlID.USER32(?), ref: 00E11F97
                                                          • GetParent.USER32(?), ref: 00E11FAB
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00E11FAE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 711023334-1403004172
                                                          • Opcode ID: 5359525d45cb4f9952ccd7912a3414edb6f11f7abdd4a64e75ad3dea5bae2d74
                                                          • Instruction ID: f065652b44e38667a266b19b52d2afc9f00b00b569221891098bb3861bbe5208
                                                          • Opcode Fuzzy Hash: 5359525d45cb4f9952ccd7912a3414edb6f11f7abdd4a64e75ad3dea5bae2d74
                                                          • Instruction Fuzzy Hash: 5F21D074A00214BFCF00AFA0CC849EEBBB8EF0A300F105185BA6673291DB7489598B71
                                                          APIs
                                                            • Part of subcall function 00DB9CB3: _wcslen.LIBCMT ref: 00DB9CBD
                                                            • Part of subcall function 00E13CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00E13CCA
                                                          • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 00E12043
                                                          • GetDlgCtrlID.USER32 ref: 00E1204E
                                                          • GetParent.USER32 ref: 00E1206A
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00E1206D
                                                          • GetDlgCtrlID.USER32(?), ref: 00E12076
                                                          • GetParent.USER32(?), ref: 00E1208A
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00E1208D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 711023334-1403004172
                                                          • Opcode ID: 003462f21eeb5db654d055d240b8b02d0f95dfc17d98ededdd856986d36f3ac4
                                                          • Instruction ID: 79c3bf706045b3e262dda12c364467366f63eeb6990aba7ed9d586948950f7d8
                                                          • Opcode Fuzzy Hash: 003462f21eeb5db654d055d240b8b02d0f95dfc17d98ededdd856986d36f3ac4
                                                          • Instruction Fuzzy Hash: B521D4B5900218BFCF14AFA0CC85EFEBBB8EF09340F105045BA56B71A1DA758959DB71
                                                          APIs
                                                          • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00E43A9D
                                                          • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00E43AA0
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00E43AC7
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00E43AEA
                                                          • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00E43B62
                                                          • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00E43BAC
                                                          • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00E43BC7
                                                          • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00E43BE2
                                                          • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00E43BF6
                                                          • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00E43C13
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$LongWindow
                                                          • String ID:
                                                          • API String ID: 312131281-0
                                                          • Opcode ID: 54f8495de6aa6138b4a1fe51cf65f70629d01a616bcd42c83a4ed5bcc645bf76
                                                          • Instruction ID: 91535e784a867ab3c1dbe4bba5d26120ab0e27166b5ccb0991f6e8c86abd6cdf
                                                          • Opcode Fuzzy Hash: 54f8495de6aa6138b4a1fe51cf65f70629d01a616bcd42c83a4ed5bcc645bf76
                                                          • Instruction Fuzzy Hash: 9A616A75900208AFDB10DFA8DC81EEE77B8EB49704F104199FA15B72A1C770AE46DF60
                                                          APIs
                                                          • _free.LIBCMT ref: 00DE2C94
                                                            • Part of subcall function 00DE29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00DED7D1,00000000,00000000,00000000,00000000,?,00DED7F8,00000000,00000007,00000000,?,00DEDBF5,00000000), ref: 00DE29DE
                                                            • Part of subcall function 00DE29C8: GetLastError.KERNEL32(00000000,?,00DED7D1,00000000,00000000,00000000,00000000,?,00DED7F8,00000000,00000007,00000000,?,00DEDBF5,00000000,00000000), ref: 00DE29F0
                                                          • _free.LIBCMT ref: 00DE2CA0
                                                          • _free.LIBCMT ref: 00DE2CAB
                                                          • _free.LIBCMT ref: 00DE2CB6
                                                          • _free.LIBCMT ref: 00DE2CC1
                                                          • _free.LIBCMT ref: 00DE2CCC
                                                          • _free.LIBCMT ref: 00DE2CD7
                                                          • _free.LIBCMT ref: 00DE2CE2
                                                          • _free.LIBCMT ref: 00DE2CED
                                                          • _free.LIBCMT ref: 00DE2CFB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: ee6df7a3ed0f594ca8493ec94e3326424c69f2714278a8fdc3e6593906a56964
                                                          • Instruction ID: 99b378e9f8cb2da642cc7accb673c4e2f210def5686c99190db4a38c04745ef3
                                                          • Opcode Fuzzy Hash: ee6df7a3ed0f594ca8493ec94e3326424c69f2714278a8fdc3e6593906a56964
                                                          • Instruction Fuzzy Hash: C6118076140148AFCB02FF56DC82CAD3BA9FF05350F5254A5FA489B222DB35EA509FB0
                                                          APIs
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00E27FAD
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00E27FC1
                                                          • GetFileAttributesW.KERNEL32(?), ref: 00E27FEB
                                                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 00E28005
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00E28017
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00E28060
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00E280B0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectory$AttributesFile
                                                          • String ID: *.*
                                                          • API String ID: 769691225-438819550
                                                          • Opcode ID: d9d7417ed9f0d13c10b3db6eb75f80a8614d5820993718792eb61c9ba3f6c9fa
                                                          • Instruction ID: c7bbc06746cff5c0b48fc5c3c692c72a161b4b803a57b4011b0b750d1e7f2371
                                                          • Opcode Fuzzy Hash: d9d7417ed9f0d13c10b3db6eb75f80a8614d5820993718792eb61c9ba3f6c9fa
                                                          • Instruction Fuzzy Hash: 8F81CF725082519BDB20EF14D8509AEB3E8FF89314F15585EF8C5E7250EB34ED49CBA2
                                                          APIs
                                                          • SetWindowLongW.USER32(?,000000EB), ref: 00DB5C7A
                                                            • Part of subcall function 00DB5D0A: GetClientRect.USER32(?,?), ref: 00DB5D30
                                                            • Part of subcall function 00DB5D0A: GetWindowRect.USER32(?,?), ref: 00DB5D71
                                                            • Part of subcall function 00DB5D0A: ScreenToClient.USER32(?,?), ref: 00DB5D99
                                                          • GetDC.USER32 ref: 00DF46F5
                                                          • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00DF4708
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00DF4716
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00DF472B
                                                          • ReleaseDC.USER32(?,00000000), ref: 00DF4733
                                                          • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00DF47C4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                          • String ID: U
                                                          • API String ID: 4009187628-3372436214
                                                          • Opcode ID: 9695cd0714af9e400feb008b5ce16596c21ac2bd1a5cfb8b5d16375d9427d218
                                                          • Instruction ID: d1a3ba2afb213b3b954f1603961b8beaa61c438913cb52e923dc2fecdef4cdaa
                                                          • Opcode Fuzzy Hash: 9695cd0714af9e400feb008b5ce16596c21ac2bd1a5cfb8b5d16375d9427d218
                                                          • Instruction Fuzzy Hash: 4C71E334400209DFCF219F64D984AFB3BB6FF4A350F198269EA566A166C730C841DFB0
                                                          APIs
                                                          • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 00E235E4
                                                            • Part of subcall function 00DB9CB3: _wcslen.LIBCMT ref: 00DB9CBD
                                                          • LoadStringW.USER32(00E82390,?,00000FFF,?), ref: 00E2360A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: LoadString$_wcslen
                                                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                          • API String ID: 4099089115-2391861430
                                                          • Opcode ID: f254f249af4a0efe64f01706eb02e4cfab8a233a0cd334c8c1109fa2f4b7289e
                                                          • Instruction ID: a1b9ccf80c4ab31b708e8fc4feb537080d55b42f229c5bcbeef47f3fc606290f
                                                          • Opcode Fuzzy Hash: f254f249af4a0efe64f01706eb02e4cfab8a233a0cd334c8c1109fa2f4b7289e
                                                          • Instruction Fuzzy Hash: 68515B71800219FACF15EBA0DC92EEEBB78EF04304F145165F106721A2EB356A99DFB0
                                                          APIs
                                                          • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00E2C272
                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00E2C29A
                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00E2C2CA
                                                          • GetLastError.KERNEL32 ref: 00E2C322
                                                          • SetEvent.KERNEL32(?), ref: 00E2C336
                                                          • InternetCloseHandle.WININET(00000000), ref: 00E2C341
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                          • String ID:
                                                          • API String ID: 3113390036-3916222277
                                                          • Opcode ID: b89db3e54a49f37ff5ffbc64b96f1557cc74bc9c19c48bbbbe169c429cc482f4
                                                          • Instruction ID: 0d6f1907c2cfc711433ea9cd936d6375142e191950742f587c7d33d214aad6e5
                                                          • Opcode Fuzzy Hash: b89db3e54a49f37ff5ffbc64b96f1557cc74bc9c19c48bbbbe169c429cc482f4
                                                          • Instruction Fuzzy Hash: 2231B171500618AFD721DF65EC88AAF7BFCEB4A744B24991EF446A3210DB70DD098B60
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00DF3AAF,?,?,Bad directive syntax error,00E4CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 00E198BC
                                                          • LoadStringW.USER32(00000000,?,00DF3AAF,?), ref: 00E198C3
                                                            • Part of subcall function 00DB9CB3: _wcslen.LIBCMT ref: 00DB9CBD
                                                          • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00E19987
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadMessageModuleString_wcslen
                                                          • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                          • API String ID: 858772685-4153970271
                                                          • Opcode ID: d21d2a374517fee1f8365638510e3bc6a49741136fc4b97b7146a7466d1389ce
                                                          • Instruction ID: 3a31ec11295015d56bd1b9ec6ba45fba4ecff332b1c0ac950370fcb858c61d86
                                                          • Opcode Fuzzy Hash: d21d2a374517fee1f8365638510e3bc6a49741136fc4b97b7146a7466d1389ce
                                                          • Instruction Fuzzy Hash: A0213C3180021AFBCF15AF90CC5AEEE7B75FF18704F045469B61A760A2EB719A58DB70
                                                          APIs
                                                          • GetParent.USER32 ref: 00E120AB
                                                          • GetClassNameW.USER32(00000000,?,00000100), ref: 00E120C0
                                                          • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00E1214D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameParentSend
                                                          • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                          • API String ID: 1290815626-3381328864
                                                          • Opcode ID: 6befbab217d74a87522846d53802261c042059f10662b64c2c90c13c7c27c827
                                                          • Instruction ID: 120a8a589009c8a5ffb6cd99eae80dc7fcf202c7ba3abb11323e68de5d77c8d8
                                                          • Opcode Fuzzy Hash: 6befbab217d74a87522846d53802261c042059f10662b64c2c90c13c7c27c827
                                                          • Instruction Fuzzy Hash: DE110A7BBC5706BAF605A220DC06DFA379CCB05728B20711FFB08B91D1FAA15C965524
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 8fea9fdb561ded63d949c8c088dd06362e2cf257797f14bf7a5280c601d33784
                                                          • Instruction ID: 2c3181059c3675309ccaf706e23b3ea365c11af54196b733c733a04b3f6bc9d0
                                                          • Opcode Fuzzy Hash: 8fea9fdb561ded63d949c8c088dd06362e2cf257797f14bf7a5280c601d33784
                                                          • Instruction Fuzzy Hash: 01C1F274A05289AFCB11FFAACC51BADBFB0AF09310F584199F559AB392C7309941CB70
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                          • String ID:
                                                          • API String ID: 1282221369-0
                                                          • Opcode ID: 1caa6244b8212b1e3ae57ba5bb9fd37a185dfb7199cbe05b87277921bde88333
                                                          • Instruction ID: 082b9e6dc221eb0e56071e4fe456c51bf6ca2b90013be2f173181c6d33ce5146
                                                          • Opcode Fuzzy Hash: 1caa6244b8212b1e3ae57ba5bb9fd37a185dfb7199cbe05b87277921bde88333
                                                          • Instruction Fuzzy Hash: 58614772905384AFDB25BFB79C81A7D7BA9EF05320F18416DF944A7282DB319D0687B0
                                                          APIs
                                                          • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00E45186
                                                          • ShowWindow.USER32(?,00000000), ref: 00E451C7
                                                          • ShowWindow.USER32(?,00000005,?,00000000), ref: 00E451CD
                                                          • SetFocus.USER32(?,?,00000005,?,00000000), ref: 00E451D1
                                                            • Part of subcall function 00E46FBA: DeleteObject.GDI32(00000000), ref: 00E46FE6
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00E4520D
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00E4521A
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00E4524D
                                                          • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00E45287
                                                          • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00E45296
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                          • String ID:
                                                          • API String ID: 3210457359-0
                                                          • Opcode ID: 9058fcc54c444e80ab34b100d4e49eef6f423c801b21f4e99311452a1ed8cb75
                                                          • Instruction ID: 0a1e7253fe873c0f59b6f30459cdf18ba0c3c744d1e4a467feebfa0d5aa977b6
                                                          • Opcode Fuzzy Hash: 9058fcc54c444e80ab34b100d4e49eef6f423c801b21f4e99311452a1ed8cb75
                                                          • Instruction Fuzzy Hash: AE51D332A42A08FFEF209F25EC49BD93BB5EB05324F146002F515B63E2C3B5A984DB51
                                                          APIs
                                                          • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00E06890
                                                          • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 00E068A9
                                                          • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00E068B9
                                                          • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 00E068D1
                                                          • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00E068F2
                                                          • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00DC8874,00000000,00000000,00000000,000000FF,00000000), ref: 00E06901
                                                          • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00E0691E
                                                          • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00DC8874,00000000,00000000,00000000,000000FF,00000000), ref: 00E0692D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                          • String ID:
                                                          • API String ID: 1268354404-0
                                                          • Opcode ID: 1d7003f49db078a4f04a21303ab423c4d39fc728900272e716b74364423286bf
                                                          • Instruction ID: 109e1aa1f0b610986a1e90a206ebd220c0203c49fd32043da1800e6dd71616c7
                                                          • Opcode Fuzzy Hash: 1d7003f49db078a4f04a21303ab423c4d39fc728900272e716b74364423286bf
                                                          • Instruction Fuzzy Hash: 7151687060020AEFDB248F25CC55FAA7BB6EB88754F104518F956A72E0DB70ED91DB60
                                                          APIs
                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00E2C182
                                                          • GetLastError.KERNEL32 ref: 00E2C195
                                                          • SetEvent.KERNEL32(?), ref: 00E2C1A9
                                                            • Part of subcall function 00E2C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00E2C272
                                                            • Part of subcall function 00E2C253: GetLastError.KERNEL32 ref: 00E2C322
                                                            • Part of subcall function 00E2C253: SetEvent.KERNEL32(?), ref: 00E2C336
                                                            • Part of subcall function 00E2C253: InternetCloseHandle.WININET(00000000), ref: 00E2C341
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                          • String ID:
                                                          • API String ID: 337547030-0
                                                          • Opcode ID: 218a2233f6d597da84913237599e24da84a9aa5447a093a4adca1f4c7613928a
                                                          • Instruction ID: 8e1cc8b877951e9e55faf8ff580e1e635361fe20ff3d3b5b2d92ef766d81cd10
                                                          • Opcode Fuzzy Hash: 218a2233f6d597da84913237599e24da84a9aa5447a093a4adca1f4c7613928a
                                                          • Instruction Fuzzy Hash: A731A376101B11EFDB219FB5EC04A6A7BF8FF19304B20541DF556A3620DB31E815DB60
                                                          APIs
                                                            • Part of subcall function 00E13A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00E13A57
                                                            • Part of subcall function 00E13A3D: GetCurrentThreadId.KERNEL32 ref: 00E13A5E
                                                            • Part of subcall function 00E13A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00E125B3), ref: 00E13A65
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 00E125BD
                                                          • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00E125DB
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00E125DF
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 00E125E9
                                                          • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00E12601
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00E12605
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 00E1260F
                                                          • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00E12623
                                                          • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00E12627
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                          • String ID:
                                                          • API String ID: 2014098862-0
                                                          • Opcode ID: 18bc576e1e260b1d487495ba35b848c65d9bd63f3726e71eb59e9da7a0a9efcf
                                                          • Instruction ID: 720a7c3f49c8e197804f1255808897a5862d859b62ca2d567c36dfc7007713f3
                                                          • Opcode Fuzzy Hash: 18bc576e1e260b1d487495ba35b848c65d9bd63f3726e71eb59e9da7a0a9efcf
                                                          • Instruction Fuzzy Hash: 1401D830391210BBFB1067699C8AF997F99DF4EB11F201005F318BF1D1C9E114858AAA
                                                          APIs
                                                          • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00E11449,?,?,00000000), ref: 00E1180C
                                                          • HeapAlloc.KERNEL32(00000000,?,00E11449,?,?,00000000), ref: 00E11813
                                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00E11449,?,?,00000000), ref: 00E11828
                                                          • GetCurrentProcess.KERNEL32(?,00000000,?,00E11449,?,?,00000000), ref: 00E11830
                                                          • DuplicateHandle.KERNEL32(00000000,?,00E11449,?,?,00000000), ref: 00E11833
                                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00E11449,?,?,00000000), ref: 00E11843
                                                          • GetCurrentProcess.KERNEL32(00E11449,00000000,?,00E11449,?,?,00000000), ref: 00E1184B
                                                          • DuplicateHandle.KERNEL32(00000000,?,00E11449,?,?,00000000), ref: 00E1184E
                                                          • CreateThread.KERNEL32(00000000,00000000,00E11874,00000000,00000000,00000000), ref: 00E11868
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                          • String ID:
                                                          • API String ID: 1957940570-0
                                                          • Opcode ID: a46f36cd6572979747b137bbe00a334bc988549818ffcfbe29394c17997c2bd2
                                                          • Instruction ID: a578b68928b110fd513051117acb7f15f51800666cd08e67011f92b2b8632677
                                                          • Opcode Fuzzy Hash: a46f36cd6572979747b137bbe00a334bc988549818ffcfbe29394c17997c2bd2
                                                          • Instruction Fuzzy Hash: 7801BF75242304BFE750AFA5DC4DF573B6CEB8AB11F104451FA05EB292C6709805CB20
                                                          APIs
                                                            • Part of subcall function 00E1D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 00E1D501
                                                            • Part of subcall function 00E1D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 00E1D50F
                                                            • Part of subcall function 00E1D4DC: CloseHandle.KERNELBASE(00000000), ref: 00E1D5DC
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00E3A16D
                                                          • GetLastError.KERNEL32 ref: 00E3A180
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00E3A1B3
                                                          • TerminateProcess.KERNEL32(00000000,00000000), ref: 00E3A268
                                                          • GetLastError.KERNEL32(00000000), ref: 00E3A273
                                                          • CloseHandle.KERNEL32(00000000), ref: 00E3A2C4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                          • String ID: SeDebugPrivilege
                                                          • API String ID: 2533919879-2896544425
                                                          • Opcode ID: 7a868624d253654047848d3aafc2dd9cfcbb72f45d32d321fd3fc32c2812377d
                                                          • Instruction ID: 32a5ff9de39aabf2b401601edd3366cd6e82e24e952523078fdefda368d0f1c4
                                                          • Opcode Fuzzy Hash: 7a868624d253654047848d3aafc2dd9cfcbb72f45d32d321fd3fc32c2812377d
                                                          • Instruction Fuzzy Hash: A361B3742052419FD720DF15C498F66BBE1AF44318F18849CF4A69B7A3C776EC89CB92
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00E43925
                                                          • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 00E4393A
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00E43954
                                                          • _wcslen.LIBCMT ref: 00E43999
                                                          • SendMessageW.USER32(?,00001057,00000000,?), ref: 00E439C6
                                                          • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00E439F4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window_wcslen
                                                          • String ID: SysListView32
                                                          • API String ID: 2147712094-78025650
                                                          • Opcode ID: 4136a40d960facb4d7d54889aa479e287e5ffed4500d7c5379d24f83abd47da8
                                                          • Instruction ID: 8230aa87601c63e9225891f304d37aa3eec4f4bc17716b15cea19b168edab478
                                                          • Opcode Fuzzy Hash: 4136a40d960facb4d7d54889aa479e287e5ffed4500d7c5379d24f83abd47da8
                                                          • Instruction Fuzzy Hash: A941C371A00318ABEF219F64DC49BEA7BA9EF48354F101526F958F7281D771DE84CB90
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00E1BCFD
                                                          • IsMenu.USER32(00000000), ref: 00E1BD1D
                                                          • CreatePopupMenu.USER32 ref: 00E1BD53
                                                          • GetMenuItemCount.USER32(01007630), ref: 00E1BDA4
                                                          • InsertMenuItemW.USER32(01007630,?,00000001,00000030), ref: 00E1BDCC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                          • String ID: 0$2
                                                          • API String ID: 93392585-3793063076
                                                          • Opcode ID: a0e3b88e583b875be0c0cde8dd69c14450a099bba8e9c850f53f55d0ea6bc322
                                                          • Instruction ID: 2257e1711f34b6bf78f0576f3c6fcb3fac3d496ae85766ced566faea672b0cd1
                                                          • Opcode Fuzzy Hash: a0e3b88e583b875be0c0cde8dd69c14450a099bba8e9c850f53f55d0ea6bc322
                                                          • Instruction Fuzzy Hash: 6551BF70A002099BDF18CFA9E884BEEBBF8BF49318F245159E411F7290D77099C5CB61
                                                          APIs
                                                          • LoadIconW.USER32(00000000,00007F03), ref: 00E1C913
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: IconLoad
                                                          • String ID: blank$info$question$stop$warning
                                                          • API String ID: 2457776203-404129466
                                                          • Opcode ID: d484a9a4d782d017c5ea78c0cecd432ad53a9531974d50e38b85d702e2df01cb
                                                          • Instruction ID: 7c55158957cbcc235acd31ffcaf59c0ce95cc21914040e72254a21cfba2d7cc0
                                                          • Opcode Fuzzy Hash: d484a9a4d782d017c5ea78c0cecd432ad53a9531974d50e38b85d702e2df01cb
                                                          • Instruction Fuzzy Hash: 3611C6316C9706BBA7059B549CC2DEE679CDF1536CB70702BF504FA282D7706D815274
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                          • String ID: 0.0.0.0
                                                          • API String ID: 642191829-3771769585
                                                          • Opcode ID: 49b1b56fbb412bad071d0da4ba4b26d3f96fb1d1fb594ad18000382860a49ac9
                                                          • Instruction ID: 35d34ffb1409f98a2270bfbcf0ec71a513ec7b087acdc110d8233a4102a8035e
                                                          • Opcode Fuzzy Hash: 49b1b56fbb412bad071d0da4ba4b26d3f96fb1d1fb594ad18000382860a49ac9
                                                          • Instruction Fuzzy Hash: 33110331908209AFCB64AB719C4AEEE77ACDF15716F10016AF405BB191EF709AC5CA70
                                                          APIs
                                                            • Part of subcall function 00DC9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DC9BB2
                                                          • GetSystemMetrics.USER32(0000000F), ref: 00E49FC7
                                                          • GetSystemMetrics.USER32(0000000F), ref: 00E49FE7
                                                          • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00E4A224
                                                          • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00E4A242
                                                          • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00E4A263
                                                          • ShowWindow.USER32(00000003,00000000), ref: 00E4A282
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00E4A2A7
                                                          • DefDlgProcW.USER32(?,00000005,?,?), ref: 00E4A2CA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                          • String ID:
                                                          • API String ID: 1211466189-0
                                                          • Opcode ID: 3693491b1a2f57c66bc4606e67f6c23caa76c5996ae4e28922b15ba2cfe137cc
                                                          • Instruction ID: 65b7b39c3dd5d1fb541a48c46cf6300a3c23c607df79e38bc6e7c27b4c529a0a
                                                          • Opcode Fuzzy Hash: 3693491b1a2f57c66bc4606e67f6c23caa76c5996ae4e28922b15ba2cfe137cc
                                                          • Instruction Fuzzy Hash: 2BB1EB30A00215EFDF14CF68D9857AE3BB2FF48725F089079EC49AB2A5D771AA40DB51
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$LocalTime
                                                          • String ID:
                                                          • API String ID: 952045576-0
                                                          • Opcode ID: 84349266f36be0029f33dd59e73fd01c9f9287489df4d7b9ba7f1592e107dec5
                                                          • Instruction ID: 48eca031e9ca5df82eea5575223f8524bf2279ee61bc2f449bda47403d832638
                                                          • Opcode Fuzzy Hash: 84349266f36be0029f33dd59e73fd01c9f9287489df4d7b9ba7f1592e107dec5
                                                          • Instruction Fuzzy Hash: 8D418D65C1021866CB11ABF48C8A9CFB7A8EF45310F508467F918F3221EB34E285C7F9
                                                          APIs
                                                          • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00E0682C,00000004,00000000,00000000), ref: 00DCF953
                                                          • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,00E0682C,00000004,00000000,00000000), ref: 00E0F3D1
                                                          • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00E0682C,00000004,00000000,00000000), ref: 00E0F454
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ShowWindow
                                                          • String ID:
                                                          • API String ID: 1268545403-0
                                                          • Opcode ID: 1b9fa5d812ab3dcc3f9e4da204b8896c3f560c6b26ed6c671c984118285da7d1
                                                          • Instruction ID: 3455b3df20304ce8cee3a1ba705e3aa0516d3312ee501f22121eedc74b1f32eb
                                                          • Opcode Fuzzy Hash: 1b9fa5d812ab3dcc3f9e4da204b8896c3f560c6b26ed6c671c984118285da7d1
                                                          • Instruction Fuzzy Hash: 4A412B30604641BFCF788B298888FAE7B93AB56314F18553DE487779A0CE75A885CF31
                                                          APIs
                                                          • DeleteObject.GDI32(00000000), ref: 00E42D1B
                                                          • GetDC.USER32(00000000), ref: 00E42D23
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00E42D2E
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 00E42D3A
                                                          • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00E42D76
                                                          • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00E42D87
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00E45A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00E42DC2
                                                          • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00E42DE1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                          • String ID:
                                                          • API String ID: 3864802216-0
                                                          • Opcode ID: 8d728621c636023a6f9192051465e2c70dc35c4fee472422762371b3a685e106
                                                          • Instruction ID: a328962d7b3c9c9f0b2c3b2b71bd5b02c0ede62b4150939ff1fef7f9feb30c64
                                                          • Opcode Fuzzy Hash: 8d728621c636023a6f9192051465e2c70dc35c4fee472422762371b3a685e106
                                                          • Instruction Fuzzy Hash: 7A319F76202614BFEB214F51DC89FEB3FA9EF0A715F144055FE08AB291C6759C41C7A1
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: _memcmp
                                                          • String ID:
                                                          • API String ID: 2931989736-0
                                                          • Opcode ID: 8811823ccbde5e08527c3425006cab2c744b91e3970afc747a1c9e809a843320
                                                          • Instruction ID: 51cb786574eaa9ea70e1b77cc26f580d77a8808040995f10d8e429851a19417f
                                                          • Opcode Fuzzy Hash: 8811823ccbde5e08527c3425006cab2c744b91e3970afc747a1c9e809a843320
                                                          • Instruction Fuzzy Hash: EC21A477A40B09FBD21456219E82FFA735CEFA1788F542022FD05BA682F760ED5085F9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: NULL Pointer assignment$Not an Object type
                                                          • API String ID: 0-572801152
                                                          • Opcode ID: a2441635d2345b4c9e9325dca2ae631b6c98cba5f781f7ea3ff736ae00581966
                                                          • Instruction ID: a8dcf48c5e5d090e596a8157e21ec2832992944a89b21c2aeaa4d25b45fb7be1
                                                          • Opcode Fuzzy Hash: a2441635d2345b4c9e9325dca2ae631b6c98cba5f781f7ea3ff736ae00581966
                                                          • Instruction Fuzzy Hash: D0D1BF72A0060A9FDF14CFA8C884BAEBBB5BF48344F149469E915BB381D771DD45CBA0
                                                          APIs
                                                          • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,00DF17FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 00DF15CE
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00DF17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00DF1651
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00DF17FB,?,00DF17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00DF16E4
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00DF17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00DF16FB
                                                            • Part of subcall function 00DE3820: RtlAllocateHeap.NTDLL(00000000,?,00E81444,?,00DCFDF5,?,?,00DBA976,00000010,00E81440,00DB13FC,?,00DB13C6,?,00DB1129), ref: 00DE3852
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,00DF17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00DF1777
                                                          • __freea.LIBCMT ref: 00DF17A2
                                                          • __freea.LIBCMT ref: 00DF17AE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                          • String ID:
                                                          • API String ID: 2829977744-0
                                                          • Opcode ID: a2b829f1bd4b6c5ddfe3a2d89975b79cc87c059c86bce18534d7fccc5a923e5f
                                                          • Instruction ID: 6af7a92467edd4f0b040d056078b696e3b23eba5159d7139e1b224ce0603fdab
                                                          • Opcode Fuzzy Hash: a2b829f1bd4b6c5ddfe3a2d89975b79cc87c059c86bce18534d7fccc5a923e5f
                                                          • Instruction Fuzzy Hash: 0091D379E0021EDADB209E75C881AFE7BB5DF49310F1A8659EA05EB240DB35CD44CB70
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit
                                                          • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                          • API String ID: 2610073882-625585964
                                                          • Opcode ID: d1c0125f91216727620cc01102665a43b12177f75b0f757e2078d3519e2e085e
                                                          • Instruction ID: b12c9e6bd5f62fc9110eb5747da5cd43ac0d6e3384b869a4c21c1e4c6a213d51
                                                          • Opcode Fuzzy Hash: d1c0125f91216727620cc01102665a43b12177f75b0f757e2078d3519e2e085e
                                                          • Instruction Fuzzy Hash: 249192B1A00215AFDF24CFA5C849FEEBBB8EF46714F10955AF505BB280D770A945CBA0
                                                          APIs
                                                          • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 00E2125C
                                                          • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00E21284
                                                          • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 00E212A8
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00E212D8
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00E2135F
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00E213C4
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00E21430
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                          • String ID:
                                                          • API String ID: 2550207440-0
                                                          • Opcode ID: 997fb2653efb2201338493f0b1bb668c768dcdef261d2e5e56542b6a7b34a627
                                                          • Instruction ID: 71610b1443ca7f7feafd8e961d6118710ec54f3d68f55ff5900ddb99ab944134
                                                          • Opcode Fuzzy Hash: 997fb2653efb2201338493f0b1bb668c768dcdef261d2e5e56542b6a7b34a627
                                                          • Instruction Fuzzy Hash: 5E911276A002289FDB00DFA4E884BFEB7B5FF55314F205069E951F72A1D774AA41CBA0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ObjectSelect$BeginCreatePath
                                                          • String ID:
                                                          • API String ID: 3225163088-0
                                                          • Opcode ID: acf92bac2b0410ff2c357150a5720e3657c1a0108e38fa3427778fa192d62d78
                                                          • Instruction ID: 3eaff7cd1d8ef2d68ea77ab6098fad50d87eea530ed9a313a86c923f3ed95845
                                                          • Opcode Fuzzy Hash: acf92bac2b0410ff2c357150a5720e3657c1a0108e38fa3427778fa192d62d78
                                                          • Instruction Fuzzy Hash: AB912871D4421AEFCB14CFA9C888AEEBBB8FF49320F148459E515B7291D774A942CB60
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 00E3396B
                                                          • CharUpperBuffW.USER32(?,?), ref: 00E33A7A
                                                          • _wcslen.LIBCMT ref: 00E33A8A
                                                          • VariantClear.OLEAUT32(?), ref: 00E33C1F
                                                            • Part of subcall function 00E20CDF: VariantInit.OLEAUT32(00000000), ref: 00E20D1F
                                                            • Part of subcall function 00E20CDF: VariantCopy.OLEAUT32(?,?), ref: 00E20D28
                                                            • Part of subcall function 00E20CDF: VariantClear.OLEAUT32(?), ref: 00E20D34
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                          • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                          • API String ID: 4137639002-1221869570
                                                          • Opcode ID: fb1866657fa1d717499e649c73521795afa3a2f29da3bcf3aab30fcd9c51ad9f
                                                          • Instruction ID: 476f01b4b83bfd8e78e1e0040d24e72496d9223938564339bbb3913328dab8bf
                                                          • Opcode Fuzzy Hash: fb1866657fa1d717499e649c73521795afa3a2f29da3bcf3aab30fcd9c51ad9f
                                                          • Instruction Fuzzy Hash: 1E9156756083419FC700DF24C4959AABBE5FF89314F14986DF88AAB351DB30EE45CBA2
                                                          APIs
                                                            • Part of subcall function 00E1000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E0FF41,80070057,?,?,?,00E1035E), ref: 00E1002B
                                                            • Part of subcall function 00E1000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E0FF41,80070057,?,?), ref: 00E10046
                                                            • Part of subcall function 00E1000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E0FF41,80070057,?,?), ref: 00E10054
                                                            • Part of subcall function 00E1000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E0FF41,80070057,?), ref: 00E10064
                                                          • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00E34C51
                                                          • _wcslen.LIBCMT ref: 00E34D59
                                                          • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00E34DCF
                                                          • CoTaskMemFree.OLE32(?), ref: 00E34DDA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                          • String ID: NULL Pointer assignment
                                                          • API String ID: 614568839-2785691316
                                                          • Opcode ID: d7a286e70602fe7b997b637d64c48008764fc53ce0e8153e5e16527f5a6c7931
                                                          • Instruction ID: 1943a042187579929e94abf69d2fed8f728fc26965db78d674674b887a2f192c
                                                          • Opcode Fuzzy Hash: d7a286e70602fe7b997b637d64c48008764fc53ce0e8153e5e16527f5a6c7931
                                                          • Instruction Fuzzy Hash: 2E91F5B1D002199BDF14DFA4D895AEEBBB8FF08314F10416AE915BB291DB34AA45CF60
                                                          APIs
                                                          • GetMenu.USER32(?), ref: 00E42183
                                                          • GetMenuItemCount.USER32(00000000), ref: 00E421B5
                                                          • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00E421DD
                                                          • _wcslen.LIBCMT ref: 00E42213
                                                          • GetMenuItemID.USER32(?,?), ref: 00E4224D
                                                          • GetSubMenu.USER32(?,?), ref: 00E4225B
                                                            • Part of subcall function 00E13A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00E13A57
                                                            • Part of subcall function 00E13A3D: GetCurrentThreadId.KERNEL32 ref: 00E13A5E
                                                            • Part of subcall function 00E13A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00E125B3), ref: 00E13A65
                                                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00E422E3
                                                            • Part of subcall function 00E1E97B: Sleep.KERNEL32 ref: 00E1E9F3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                          • String ID:
                                                          • API String ID: 4196846111-0
                                                          • Opcode ID: 428438924c3a870db1bb549ac8784001bd21477a29e40ce9348fb4ddfc5c6518
                                                          • Instruction ID: 6f75b50cf0e162f6ee2b0f93ad1f944849d76ad4a2d8de160c4b4b9826b1a15a
                                                          • Opcode Fuzzy Hash: 428438924c3a870db1bb549ac8784001bd21477a29e40ce9348fb4ddfc5c6518
                                                          • Instruction Fuzzy Hash: C5719C35A00205AFCB10DF65D881AAEB7F5EF88314F50949DFA16FB351DB74AD418BA0
                                                          APIs
                                                          • IsWindow.USER32(01007568), ref: 00E47F37
                                                          • IsWindowEnabled.USER32(01007568), ref: 00E47F43
                                                          • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 00E4801E
                                                          • SendMessageW.USER32(01007568,000000B0,?,?), ref: 00E48051
                                                          • IsDlgButtonChecked.USER32(?,?), ref: 00E48089
                                                          • GetWindowLongW.USER32(01007568,000000EC), ref: 00E480AB
                                                          • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00E480C3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                          • String ID:
                                                          • API String ID: 4072528602-0
                                                          • Opcode ID: 8f9d859fe85dc9e8773028921b84166c05dcfd099af7d14236eb866017536abf
                                                          • Instruction ID: 419d9446a4df50edd77afd26919a639b7313885c44e61756f37abb6c87832277
                                                          • Opcode Fuzzy Hash: 8f9d859fe85dc9e8773028921b84166c05dcfd099af7d14236eb866017536abf
                                                          • Instruction Fuzzy Hash: F671B134608204AFEB219F64E884FFA7BB9FF09304F14549AF99577261CB31AC49DB60
                                                          APIs
                                                          • GetParent.USER32(?), ref: 00E1AEF9
                                                          • GetKeyboardState.USER32(?), ref: 00E1AF0E
                                                          • SetKeyboardState.USER32(?), ref: 00E1AF6F
                                                          • PostMessageW.USER32(?,00000101,00000010,?), ref: 00E1AF9D
                                                          • PostMessageW.USER32(?,00000101,00000011,?), ref: 00E1AFBC
                                                          • PostMessageW.USER32(?,00000101,00000012,?), ref: 00E1AFFD
                                                          • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00E1B020
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: 583bc3e97b3fa6c5db70301c4850c705a2fb6f4432ad6243ce16763489f2f60a
                                                          • Instruction ID: 0ebe71d65cec57d5388585e3ffc000271c8afdc2bf392baa14edccbb29f89403
                                                          • Opcode Fuzzy Hash: 583bc3e97b3fa6c5db70301c4850c705a2fb6f4432ad6243ce16763489f2f60a
                                                          • Instruction Fuzzy Hash: 6F51E2B06053D13DFB368234C845BFABEE95B0A308F0C9499F1D9654D2C3A8ACC9D761
                                                          APIs
                                                          • GetParent.USER32(00000000), ref: 00E1AD19
                                                          • GetKeyboardState.USER32(?), ref: 00E1AD2E
                                                          • SetKeyboardState.USER32(?), ref: 00E1AD8F
                                                          • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00E1ADBB
                                                          • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00E1ADD8
                                                          • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00E1AE17
                                                          • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00E1AE38
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: cff7b05906a63adb3fc76a82004527852d0e6985695bef4f47c269bb9d6aee88
                                                          • Instruction ID: 21dbf6f2373063101f7c86b9c0bd6e4a8b661029bebc17a50b69b931582fbd64
                                                          • Opcode Fuzzy Hash: cff7b05906a63adb3fc76a82004527852d0e6985695bef4f47c269bb9d6aee88
                                                          • Instruction Fuzzy Hash: A451E2B05067D13DFB3282349C45BFABEA86B46308F0C9498E0D5668C2C2A4ECD8D762
                                                          APIs
                                                          • GetConsoleCP.KERNEL32(00DF3CD6,?,?,?,?,?,?,?,?,00DE5BA3,?,?,00DF3CD6,?,?), ref: 00DE5470
                                                          • __fassign.LIBCMT ref: 00DE54EB
                                                          • __fassign.LIBCMT ref: 00DE5506
                                                          • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00DF3CD6,00000005,00000000,00000000), ref: 00DE552C
                                                          • WriteFile.KERNEL32(?,00DF3CD6,00000000,00DE5BA3,00000000,?,?,?,?,?,?,?,?,?,00DE5BA3,?), ref: 00DE554B
                                                          • WriteFile.KERNEL32(?,?,00000001,00DE5BA3,00000000,?,?,?,?,?,?,?,?,?,00DE5BA3,?), ref: 00DE5584
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                          • String ID:
                                                          • API String ID: 1324828854-0
                                                          • Opcode ID: f5b9d52090ed137586771dd8977ee8212bf8a99167febd983cabd1c4c182be3e
                                                          • Instruction ID: c1ed89a6b0ab6cfa561e23caf309784957276fb44a8523c60b4d606ebbda435f
                                                          • Opcode Fuzzy Hash: f5b9d52090ed137586771dd8977ee8212bf8a99167febd983cabd1c4c182be3e
                                                          • Instruction Fuzzy Hash: F951E270A006889FDB10DFA9E845AEEBBF9EF09304F24415AF555E7291D730DA41CB70
                                                          APIs
                                                          • _ValidateLocalCookies.LIBCMT ref: 00DD2D4B
                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 00DD2D53
                                                          • _ValidateLocalCookies.LIBCMT ref: 00DD2DE1
                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 00DD2E0C
                                                          • _ValidateLocalCookies.LIBCMT ref: 00DD2E61
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                          • String ID: csm
                                                          • API String ID: 1170836740-1018135373
                                                          • Opcode ID: 579df148896f6eb9467f92a33a059a76ea7d42debe76b2b41078df835cd50614
                                                          • Instruction ID: 13361ee56d60905251720d0aa73b7bee755fde62efcfe839176437d887dba7f2
                                                          • Opcode Fuzzy Hash: 579df148896f6eb9467f92a33a059a76ea7d42debe76b2b41078df835cd50614
                                                          • Instruction Fuzzy Hash: FE417034A00209ABCF10DF69C845AAEBBB5FF55325F188156F8186B392D731AA45CBF1
                                                          APIs
                                                            • Part of subcall function 00E3304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00E3307A
                                                            • Part of subcall function 00E3304E: _wcslen.LIBCMT ref: 00E3309B
                                                          • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00E31112
                                                          • WSAGetLastError.WSOCK32 ref: 00E31121
                                                          • WSAGetLastError.WSOCK32 ref: 00E311C9
                                                          • closesocket.WSOCK32(00000000), ref: 00E311F9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 2675159561-0
                                                          • Opcode ID: c16014c407876c30f35253531f9f0adc141d36477b9c79d3bfef3508b47ce974
                                                          • Instruction ID: ef299e82ea14dcc36dd1fa6936f2836d89fa55fe6944b2eac4469e55aec87492
                                                          • Opcode Fuzzy Hash: c16014c407876c30f35253531f9f0adc141d36477b9c79d3bfef3508b47ce974
                                                          • Instruction Fuzzy Hash: 99410735601214AFDB109F24C848BE9BBE9FF45368F148099FD06AB291C770ED45CBE1
                                                          APIs
                                                            • Part of subcall function 00E1DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00E1CF22,?), ref: 00E1DDFD
                                                            • Part of subcall function 00E1DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00E1CF22,?), ref: 00E1DE16
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 00E1CF45
                                                          • MoveFileW.KERNEL32(?,?), ref: 00E1CF7F
                                                          • _wcslen.LIBCMT ref: 00E1D005
                                                          • _wcslen.LIBCMT ref: 00E1D01B
                                                          • SHFileOperationW.SHELL32(?), ref: 00E1D061
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                          • String ID: \*.*
                                                          • API String ID: 3164238972-1173974218
                                                          • Opcode ID: 73a3c3d6397e98bc573ec5e3f652901ae509be513e4d19bc8407989b4be01dcf
                                                          • Instruction ID: ccdc7bfd05087033a862b067bbe56fb0ecd7c5d87eb8e51619264819715d3d32
                                                          • Opcode Fuzzy Hash: 73a3c3d6397e98bc573ec5e3f652901ae509be513e4d19bc8407989b4be01dcf
                                                          • Instruction Fuzzy Hash: 7C4173719452189FDF12EFA4DD81ADEB7F9AF08380F1410E6E505FB141EB34A689CB60
                                                          APIs
                                                          • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00E42E1C
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00E42E4F
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00E42E84
                                                          • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00E42EB6
                                                          • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00E42EE0
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00E42EF1
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00E42F0B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: LongWindow$MessageSend
                                                          • String ID:
                                                          • API String ID: 2178440468-0
                                                          • Opcode ID: a58304fec68102a53a20dfb2d79cb9f52455fb9b8e8e4f6d753ae0c93d0fa4e9
                                                          • Instruction ID: 2d52bb57f77e7e266ae1168232fb36e3ca7e103aea8c281e334247e6c5b1744c
                                                          • Opcode Fuzzy Hash: a58304fec68102a53a20dfb2d79cb9f52455fb9b8e8e4f6d753ae0c93d0fa4e9
                                                          • Instruction Fuzzy Hash: A63137346051409FDB22CF59EC84F6537E4FB8AB14F9551A8FA14AF2B2CB71AC45DB02
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00E17769
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00E1778F
                                                          • SysAllocString.OLEAUT32(00000000), ref: 00E17792
                                                          • SysAllocString.OLEAUT32(?), ref: 00E177B0
                                                          • SysFreeString.OLEAUT32(?), ref: 00E177B9
                                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 00E177DE
                                                          • SysAllocString.OLEAUT32(?), ref: 00E177EC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                          • String ID:
                                                          • API String ID: 3761583154-0
                                                          • Opcode ID: 6a4fd1deb128c1585237b72933b925249a0f381353853a6f702f335dc94ca3a7
                                                          • Instruction ID: 46410ea945ccf505d6a017f256b39f6bc840f0185392710efe8b505f9bd4f5d6
                                                          • Opcode Fuzzy Hash: 6a4fd1deb128c1585237b72933b925249a0f381353853a6f702f335dc94ca3a7
                                                          • Instruction Fuzzy Hash: C521E23A605209AFDB00DFA9CC88CFB73BCEB09764B108026F955EB190D670DC86C760
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00E17842
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00E17868
                                                          • SysAllocString.OLEAUT32(00000000), ref: 00E1786B
                                                          • SysAllocString.OLEAUT32 ref: 00E1788C
                                                          • SysFreeString.OLEAUT32 ref: 00E17895
                                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 00E178AF
                                                          • SysAllocString.OLEAUT32(?), ref: 00E178BD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                          • String ID:
                                                          • API String ID: 3761583154-0
                                                          • Opcode ID: db9b22a329cfdcc8678b80850e8e64bc4107c1458241491c99827d22fb3e1a5e
                                                          • Instruction ID: 178103e8a111fd02cd4438ba1ba8dde7c604207f78be93be09a33af2ee1832fd
                                                          • Opcode Fuzzy Hash: db9b22a329cfdcc8678b80850e8e64bc4107c1458241491c99827d22fb3e1a5e
                                                          • Instruction Fuzzy Hash: 4321F135608214AFDB14AFA9CC88DEA77FCEB097207208025F911EB2A1D670DC81CB74
                                                          APIs
                                                          • GetStdHandle.KERNEL32(0000000C), ref: 00E204F2
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00E2052E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateHandlePipe
                                                          • String ID: nul
                                                          • API String ID: 1424370930-2873401336
                                                          • Opcode ID: bd9c973608543fbf327c4f25f5a5798f8303faea13515a57757a138f5a73ea6f
                                                          • Instruction ID: 058bb78c82eafdcc530ae1a56f0193ac6263b19a7b2f37d89f335dccc787c609
                                                          • Opcode Fuzzy Hash: bd9c973608543fbf327c4f25f5a5798f8303faea13515a57757a138f5a73ea6f
                                                          • Instruction Fuzzy Hash: 34217E75640319AFDB308F29E804A9A77F4BF45728F204A19F8A1F72E1D7B09945CF60
                                                          APIs
                                                          • GetStdHandle.KERNEL32(000000F6), ref: 00E205C6
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00E20601
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateHandlePipe
                                                          • String ID: nul
                                                          • API String ID: 1424370930-2873401336
                                                          • Opcode ID: feb59c350e3d43ddfd54876699898bafa98da534a1e793125d8ba10eaf2199b1
                                                          • Instruction ID: 74d3c2d93435991c875fd1ccf6704d89de3fb681bf793881a92766c46d7fe453
                                                          • Opcode Fuzzy Hash: feb59c350e3d43ddfd54876699898bafa98da534a1e793125d8ba10eaf2199b1
                                                          • Instruction Fuzzy Hash: 6D2192756003259FDB209F69EC44A9A77F4BF95738F201A19F8A1F72E1D7B09861CB10
                                                          APIs
                                                            • Part of subcall function 00DB600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00DB604C
                                                            • Part of subcall function 00DB600E: GetStockObject.GDI32(00000011), ref: 00DB6060
                                                            • Part of subcall function 00DB600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00DB606A
                                                          • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00E44112
                                                          • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00E4411F
                                                          • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00E4412A
                                                          • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00E44139
                                                          • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00E44145
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CreateObjectStockWindow
                                                          • String ID: Msctls_Progress32
                                                          • API String ID: 1025951953-3636473452
                                                          • Opcode ID: 555dd21703f99891da9675ebd61bff602ba3258bf9289a87d0b86bac46cc202a
                                                          • Instruction ID: 04ffeac7dfc6b6b6fd8b8f382316668b33d23419b813a3d91d44a530d1aeb62f
                                                          • Opcode Fuzzy Hash: 555dd21703f99891da9675ebd61bff602ba3258bf9289a87d0b86bac46cc202a
                                                          • Instruction Fuzzy Hash: A611B2B224021DBEEF119F65CC86EE77F9DEF08798F015111BA18B2190C672DC21DBA4
                                                          APIs
                                                            • Part of subcall function 00DED7A3: _free.LIBCMT ref: 00DED7CC
                                                          • _free.LIBCMT ref: 00DED82D
                                                            • Part of subcall function 00DE29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00DED7D1,00000000,00000000,00000000,00000000,?,00DED7F8,00000000,00000007,00000000,?,00DEDBF5,00000000), ref: 00DE29DE
                                                            • Part of subcall function 00DE29C8: GetLastError.KERNEL32(00000000,?,00DED7D1,00000000,00000000,00000000,00000000,?,00DED7F8,00000000,00000007,00000000,?,00DEDBF5,00000000,00000000), ref: 00DE29F0
                                                          • _free.LIBCMT ref: 00DED838
                                                          • _free.LIBCMT ref: 00DED843
                                                          • _free.LIBCMT ref: 00DED897
                                                          • _free.LIBCMT ref: 00DED8A2
                                                          • _free.LIBCMT ref: 00DED8AD
                                                          • _free.LIBCMT ref: 00DED8B8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                          • Instruction ID: 4a2457c22b7a383583c52cca7a2ab4d386914fcfc8fdfae664b76671dda3aef7
                                                          • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                          • Instruction Fuzzy Hash: 30112E71580B88AAD621BFB2CC47FDB7BDDEF04700F404825B69AA6493DF79B5058A70
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00E1DA74
                                                          • LoadStringW.USER32(00000000), ref: 00E1DA7B
                                                          • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00E1DA91
                                                          • LoadStringW.USER32(00000000), ref: 00E1DA98
                                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00E1DADC
                                                          Strings
                                                          • %s (%d) : ==> %s: %s %s, xrefs: 00E1DAB9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString$Message
                                                          • String ID: %s (%d) : ==> %s: %s %s
                                                          • API String ID: 4072794657-3128320259
                                                          • Opcode ID: 15373be6d70a2a76912ed685b7f445b0045970e73bb77e7665e9bb45cab2ccbd
                                                          • Instruction ID: df1fbcfbac3661d500624df73e599bbc379a82431512c377b5006bf78c9cc62a
                                                          • Opcode Fuzzy Hash: 15373be6d70a2a76912ed685b7f445b0045970e73bb77e7665e9bb45cab2ccbd
                                                          • Instruction Fuzzy Hash: 4F01D6F65002087FE740DBA19D89EE7336CEB08705F504492B706F3041EA749E898F34
                                                          APIs
                                                          • InterlockedExchange.KERNEL32(01010930,01010930), ref: 00E2097B
                                                          • EnterCriticalSection.KERNEL32(01010910,00000000), ref: 00E2098D
                                                          • TerminateThread.KERNEL32(?,000001F6), ref: 00E2099B
                                                          • WaitForSingleObject.KERNEL32(?,000003E8), ref: 00E209A9
                                                          • CloseHandle.KERNEL32(?), ref: 00E209B8
                                                          • InterlockedExchange.KERNEL32(01010930,000001F6), ref: 00E209C8
                                                          • LeaveCriticalSection.KERNEL32(01010910), ref: 00E209CF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                          • String ID:
                                                          • API String ID: 3495660284-0
                                                          • Opcode ID: e696ce6e56731bb8caf29f27933f89a8c8fb168e05aeb18eb5ac1ff9aa3bc357
                                                          • Instruction ID: 22f591a724ccb671a09393fdc521cd5fba8ea907c3e6140df264279c9cedfa2b
                                                          • Opcode Fuzzy Hash: e696ce6e56731bb8caf29f27933f89a8c8fb168e05aeb18eb5ac1ff9aa3bc357
                                                          • Instruction Fuzzy Hash: 52F06D31143912AFD7811F91EE88AD67A34BF82702F502011F102618B1C7B094AACF94
                                                          APIs
                                                          • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00E31DC0
                                                          • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00E31DE1
                                                          • WSAGetLastError.WSOCK32 ref: 00E31DF2
                                                          • htons.WSOCK32(?,?,?,?,?), ref: 00E31EDB
                                                          • inet_ntoa.WSOCK32(?), ref: 00E31E8C
                                                            • Part of subcall function 00E139E8: _strlen.LIBCMT ref: 00E139F2
                                                            • Part of subcall function 00E33224: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,00E2EC0C), ref: 00E33240
                                                          • _strlen.LIBCMT ref: 00E31F35
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                                          • String ID:
                                                          • API String ID: 3203458085-0
                                                          • Opcode ID: 62946985daa98078291c7f5a58b9f97a2460cfb98a99ce8fc7de182c4aecc899
                                                          • Instruction ID: 9ab6e046615d401fcfd6837f2e2c9a1403e986e125f7a44a1abeeb318520b4ee
                                                          • Opcode Fuzzy Hash: 62946985daa98078291c7f5a58b9f97a2460cfb98a99ce8fc7de182c4aecc899
                                                          • Instruction Fuzzy Hash: 50B1C135204340AFC324DF24C899E6ABBE5EF85318F54958CF4566B2E2CB71ED46CBA1
                                                          APIs
                                                          • GetClientRect.USER32(?,?), ref: 00DB5D30
                                                          • GetWindowRect.USER32(?,?), ref: 00DB5D71
                                                          • ScreenToClient.USER32(?,?), ref: 00DB5D99
                                                          • GetClientRect.USER32(?,?), ref: 00DB5ED7
                                                          • GetWindowRect.USER32(?,?), ref: 00DB5EF8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Rect$Client$Window$Screen
                                                          • String ID:
                                                          • API String ID: 1296646539-0
                                                          • Opcode ID: a6c3b641d7051b12ab080531af051a41838713ffdf7496d83015fb085b416721
                                                          • Instruction ID: 4d389c8f3cf8f11bd4b5d6e42c67f899c3ff133eb90fc24464bc911b6528ead2
                                                          • Opcode Fuzzy Hash: a6c3b641d7051b12ab080531af051a41838713ffdf7496d83015fb085b416721
                                                          • Instruction Fuzzy Hash: 78B16834A0064ADBDB10CFA9D4807FAB7F1FF48310F18851AE9AAD7254DB34EA51DB64
                                                          APIs
                                                          • __allrem.LIBCMT ref: 00DE00BA
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00DE00D6
                                                          • __allrem.LIBCMT ref: 00DE00ED
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00DE010B
                                                          • __allrem.LIBCMT ref: 00DE0122
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00DE0140
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                          • String ID:
                                                          • API String ID: 1992179935-0
                                                          • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                          • Instruction ID: d80164417459234f55aac1ec732461f4b5e0ea934bd7ac3542a59e7fa9779f9c
                                                          • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                          • Instruction Fuzzy Hash: 0281C572600B469BE720BB7ACC41B6B77E9EF41374F28453AF551DA281E7B0D94487B0
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00DD82D9,00DD82D9,?,?,?,00DE644F,00000001,00000001,8BE85006), ref: 00DE6258
                                                          • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00DE644F,00000001,00000001,8BE85006,?,?,?), ref: 00DE62DE
                                                          • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00DE63D8
                                                          • __freea.LIBCMT ref: 00DE63E5
                                                            • Part of subcall function 00DE3820: RtlAllocateHeap.NTDLL(00000000,?,00E81444,?,00DCFDF5,?,?,00DBA976,00000010,00E81440,00DB13FC,?,00DB13C6,?,00DB1129), ref: 00DE3852
                                                          • __freea.LIBCMT ref: 00DE63EE
                                                          • __freea.LIBCMT ref: 00DE6413
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1414292761-0
                                                          • Opcode ID: b8d722d63124a3e6dc48dea37e863546e62561450c5b6401b343262b8d6dd869
                                                          • Instruction ID: 2074547784afdef45942f615d5af7e8a0ef3af2ef75d4b51f495f406a35006a5
                                                          • Opcode Fuzzy Hash: b8d722d63124a3e6dc48dea37e863546e62561450c5b6401b343262b8d6dd869
                                                          • Instruction Fuzzy Hash: E751D172A00296ABDB25AF66CC81EBF77A9EB54790F2D4629FD05D7180EB34DC40C670
                                                          APIs
                                                            • Part of subcall function 00DB9CB3: _wcslen.LIBCMT ref: 00DB9CBD
                                                            • Part of subcall function 00E3C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00E3B6AE,?,?), ref: 00E3C9B5
                                                            • Part of subcall function 00E3C998: _wcslen.LIBCMT ref: 00E3C9F1
                                                            • Part of subcall function 00E3C998: _wcslen.LIBCMT ref: 00E3CA68
                                                            • Part of subcall function 00E3C998: _wcslen.LIBCMT ref: 00E3CA9E
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E3BCCA
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00E3BD25
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00E3BD6A
                                                          • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00E3BD99
                                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00E3BDF3
                                                          • RegCloseKey.ADVAPI32(?), ref: 00E3BDFF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                          • String ID:
                                                          • API String ID: 1120388591-0
                                                          • Opcode ID: 4623356d86f68eab60fa274423f928f99ab52687c30f5de1006902297a66f7da
                                                          • Instruction ID: e9cae6ec72e5e3a9c55c539baae985634d26c5c3c2858b9591c23ecc7d86edd9
                                                          • Opcode Fuzzy Hash: 4623356d86f68eab60fa274423f928f99ab52687c30f5de1006902297a66f7da
                                                          • Instruction Fuzzy Hash: 9881C230208241EFC714DF24C895E6ABBE5FF84308F54995CF55A9B2A2CB31ED05CBA2
                                                          APIs
                                                          • VariantInit.OLEAUT32(00000035), ref: 00E0F7B9
                                                          • SysAllocString.OLEAUT32(00000001), ref: 00E0F860
                                                          • VariantCopy.OLEAUT32(00E0FA64,00000000), ref: 00E0F889
                                                          • VariantClear.OLEAUT32(00E0FA64), ref: 00E0F8AD
                                                          • VariantCopy.OLEAUT32(00E0FA64,00000000), ref: 00E0F8B1
                                                          • VariantClear.OLEAUT32(?), ref: 00E0F8BB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCopy$AllocInitString
                                                          • String ID:
                                                          • API String ID: 3859894641-0
                                                          • Opcode ID: 7ef426999d5c35454b00d54057561f40302a30f593f83d930abf82bc4fda6b79
                                                          • Instruction ID: 8b6b6dba65e786e6b414c9e3e36795ac50a872e578ed128dfad9fe33c385860c
                                                          • Opcode Fuzzy Hash: 7ef426999d5c35454b00d54057561f40302a30f593f83d930abf82bc4fda6b79
                                                          • Instruction Fuzzy Hash: F951E735500310BACF34ABA5D895BA9B3E4EF85310B64A467E906FF6D1D7708C90C7B6
                                                          APIs
                                                            • Part of subcall function 00DB7620: _wcslen.LIBCMT ref: 00DB7625
                                                            • Part of subcall function 00DB6B57: _wcslen.LIBCMT ref: 00DB6B6A
                                                          • GetOpenFileNameW.COMDLG32(00000058), ref: 00E294E5
                                                          • _wcslen.LIBCMT ref: 00E29506
                                                          • _wcslen.LIBCMT ref: 00E2952D
                                                          • GetSaveFileNameW.COMDLG32(00000058), ref: 00E29585
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$FileName$OpenSave
                                                          • String ID: X
                                                          • API String ID: 83654149-3081909835
                                                          • Opcode ID: 4620560f9187002a31bf186190b947d8eee33cf378b0c28fe591e64d8d3cb754
                                                          • Instruction ID: b3fcde927318968e10d546b67b7540b4ef863658c8eb5ffaaaa3e79750080fe1
                                                          • Opcode Fuzzy Hash: 4620560f9187002a31bf186190b947d8eee33cf378b0c28fe591e64d8d3cb754
                                                          • Instruction Fuzzy Hash: 66E19031604350DFD724DF24D481AAAB7E4FF84314F14996DF88AAB2A2DB30DD05CBA2
                                                          APIs
                                                            • Part of subcall function 00DC9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DC9BB2
                                                          • BeginPaint.USER32(?,?,?), ref: 00DC9241
                                                          • GetWindowRect.USER32(?,?), ref: 00DC92A5
                                                          • ScreenToClient.USER32(?,?), ref: 00DC92C2
                                                          • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00DC92D3
                                                          • EndPaint.USER32(?,?,?,?,?), ref: 00DC9321
                                                          • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00E071EA
                                                            • Part of subcall function 00DC9339: BeginPath.GDI32(00000000), ref: 00DC9357
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                          • String ID:
                                                          • API String ID: 3050599898-0
                                                          • Opcode ID: ec6da484abd4d088de68789b99d43866b5a86974eed106e80c0028f1b024e467
                                                          • Instruction ID: 6e781844a54a1d90e7d6426ee64576a2059e91b0b2fa77177aa675510f596a6c
                                                          • Opcode Fuzzy Hash: ec6da484abd4d088de68789b99d43866b5a86974eed106e80c0028f1b024e467
                                                          • Instruction Fuzzy Hash: CC41AF30105301AFD710DF25CC98FAABBB8EB86724F14066DF998A72E1C731984ADB71
                                                          APIs
                                                          • InterlockedExchange.KERNEL32(?,000001F5), ref: 00E2080C
                                                          • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00E20847
                                                          • EnterCriticalSection.KERNEL32(?), ref: 00E20863
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 00E208DC
                                                          • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 00E208F3
                                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 00E20921
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                          • String ID:
                                                          • API String ID: 3368777196-0
                                                          • Opcode ID: 3a64ade7b2b64204bbf8bbb122fafbd9e64e59281e9f1b7fd30f36fd04dccae0
                                                          • Instruction ID: c3008cdf2b82578f4b979e9c0514a18cf277468e0f9bcbb12318444dd729ee17
                                                          • Opcode Fuzzy Hash: 3a64ade7b2b64204bbf8bbb122fafbd9e64e59281e9f1b7fd30f36fd04dccae0
                                                          • Instruction Fuzzy Hash: 08415971900205AFDF18AF54DC85AAA77B9FF44300F1440A9E904AB297DB70DE65DBB4
                                                          APIs
                                                          • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,00E0F3AB,00000000,?,?,00000000,?,00E0682C,00000004,00000000,00000000), ref: 00E4824C
                                                          • EnableWindow.USER32(?,00000000), ref: 00E48272
                                                          • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00E482D1
                                                          • ShowWindow.USER32(?,00000004), ref: 00E482E5
                                                          • EnableWindow.USER32(?,00000001), ref: 00E4830B
                                                          • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00E4832F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Show$Enable$MessageSend
                                                          • String ID:
                                                          • API String ID: 642888154-0
                                                          • Opcode ID: 46d2eede627244e387845489cf6aab6d2b26a4d175253f683d44ba7eac86907c
                                                          • Instruction ID: 88bf550c8c22224efa3b53d14819d1d70d67a992a8da416a9a0c715a279bfbb3
                                                          • Opcode Fuzzy Hash: 46d2eede627244e387845489cf6aab6d2b26a4d175253f683d44ba7eac86907c
                                                          • Instruction Fuzzy Hash: F6410834601600EFDB11CF15E999BE87BE0FB46718F1861A9E5086F272CB71AC46CB44
                                                          APIs
                                                          • IsWindowVisible.USER32(?), ref: 00E14C95
                                                          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00E14CB2
                                                          • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00E14CEA
                                                          • _wcslen.LIBCMT ref: 00E14D08
                                                          • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00E14D10
                                                          • _wcsstr.LIBVCRUNTIME ref: 00E14D1A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                          • String ID:
                                                          • API String ID: 72514467-0
                                                          • Opcode ID: 9a416811c67e711b9379fef9710e5f398cab1d624b4dd63f949b98cc37b5c890
                                                          • Instruction ID: f233643d592afc1c3dc3af7068438471ed0c530d484acde2f60d8f0a945e9288
                                                          • Opcode Fuzzy Hash: 9a416811c67e711b9379fef9710e5f398cab1d624b4dd63f949b98cc37b5c890
                                                          • Instruction Fuzzy Hash: 462129B52052017BEB155B36AC09EFB7B9CDF45B50F10906DF805EB2D2EA61CC8196B1
                                                          APIs
                                                            • Part of subcall function 00DB3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00DB3A97,?,?,00DB2E7F,?,?,?,00000000), ref: 00DB3AC2
                                                          • _wcslen.LIBCMT ref: 00E2587B
                                                          • CoInitialize.OLE32(00000000), ref: 00E25995
                                                          • CoCreateInstance.OLE32(00E4FCF8,00000000,00000001,00E4FB68,?), ref: 00E259AE
                                                          • CoUninitialize.OLE32 ref: 00E259CC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                          • String ID: .lnk
                                                          • API String ID: 3172280962-24824748
                                                          • Opcode ID: daaf7c095229a3e0c3cd5ff27ad45d4b5d884b84838e8a4b1225a579887f79b7
                                                          • Instruction ID: c0496a1b7e81ed5382f80d7bac0b089e28002625524e160ab2f5461a09bf6d74
                                                          • Opcode Fuzzy Hash: daaf7c095229a3e0c3cd5ff27ad45d4b5d884b84838e8a4b1225a579887f79b7
                                                          • Instruction Fuzzy Hash: 48D17176608710DFC714DF24D580A6ABBE1EF89714F14885DF88AAB361CB31EC45CBA2
                                                          APIs
                                                            • Part of subcall function 00E10FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00E10FCA
                                                            • Part of subcall function 00E10FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00E10FD6
                                                            • Part of subcall function 00E10FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00E10FE5
                                                            • Part of subcall function 00E10FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00E10FEC
                                                            • Part of subcall function 00E10FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00E11002
                                                          • GetLengthSid.ADVAPI32(?,00000000,00E11335), ref: 00E117AE
                                                          • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00E117BA
                                                          • HeapAlloc.KERNEL32(00000000), ref: 00E117C1
                                                          • CopySid.ADVAPI32(00000000,00000000,?), ref: 00E117DA
                                                          • GetProcessHeap.KERNEL32(00000000,00000000,00E11335), ref: 00E117EE
                                                          • HeapFree.KERNEL32(00000000), ref: 00E117F5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                          • String ID:
                                                          • API String ID: 3008561057-0
                                                          • Opcode ID: 5e525665d6701d127dfe06b9d22dcbc59b923873597ce536cedd3671108584c3
                                                          • Instruction ID: b1540c0adc4e3219e1603bcfea92649225d57cc3fa284d76f39ca85194ad1e4f
                                                          • Opcode Fuzzy Hash: 5e525665d6701d127dfe06b9d22dcbc59b923873597ce536cedd3671108584c3
                                                          • Instruction Fuzzy Hash: 2611DC35602205EFDB109FA5CC49BEE7BB8EB42319F204059F541B7250C731A985CB60
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00E114FF
                                                          • OpenProcessToken.ADVAPI32(00000000), ref: 00E11506
                                                          • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00E11515
                                                          • CloseHandle.KERNEL32(00000004), ref: 00E11520
                                                          • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00E1154F
                                                          • DestroyEnvironmentBlock.USERENV(00000000), ref: 00E11563
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                          • String ID:
                                                          • API String ID: 1413079979-0
                                                          • Opcode ID: d7e07bb644b66923b20d83d506df202399fea5e7c138c3755ae7594ad7dfa574
                                                          • Instruction ID: 8060957ae1f10408138a11958346b7654e83dd63f15d6e69fe87a78ee55cbc2f
                                                          • Opcode Fuzzy Hash: d7e07bb644b66923b20d83d506df202399fea5e7c138c3755ae7594ad7dfa574
                                                          • Instruction Fuzzy Hash: CD118976202209AFDF118FA8DD09BDE3BA9EF49708F144055FA05B2060C3758EA5DB60
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,00DD3379,00DD2FE5), ref: 00DD3390
                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00DD339E
                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00DD33B7
                                                          • SetLastError.KERNEL32(00000000,?,00DD3379,00DD2FE5), ref: 00DD3409
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLastValue___vcrt_
                                                          • String ID:
                                                          • API String ID: 3852720340-0
                                                          • Opcode ID: d951243d45af4c101cd348761c9ea3b1805e1058642d985fd1a384e7c72b029e
                                                          • Instruction ID: 378c2f80ff223a7ea2f43fb1e5eea6524e83d4728a6bce54484ae07c73caf5a0
                                                          • Opcode Fuzzy Hash: d951243d45af4c101cd348761c9ea3b1805e1058642d985fd1a384e7c72b029e
                                                          • Instruction Fuzzy Hash: D2014733209311BFA6242BBABC855272A98EB05779334022FF410A13F0EF118D4A96B6
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,00DE5686,00DF3CD6,?,00000000,?,00DE5B6A,?,?,?,?,?,00DDE6D1,?,00E78A48), ref: 00DE2D78
                                                          • _free.LIBCMT ref: 00DE2DAB
                                                          • _free.LIBCMT ref: 00DE2DD3
                                                          • SetLastError.KERNEL32(00000000,?,?,?,?,00DDE6D1,?,00E78A48,00000010,00DB4F4A,?,?,00000000,00DF3CD6), ref: 00DE2DE0
                                                          • SetLastError.KERNEL32(00000000,?,?,?,?,00DDE6D1,?,00E78A48,00000010,00DB4F4A,?,?,00000000,00DF3CD6), ref: 00DE2DEC
                                                          • _abort.LIBCMT ref: 00DE2DF2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_free$_abort
                                                          • String ID:
                                                          • API String ID: 3160817290-0
                                                          • Opcode ID: 15db5e58071b4fdcb7199dd083b18e26ea8dc1698e45e6aa97f5258939d7f241
                                                          • Instruction ID: 40d7ed83b17fcb98187f33e189119d2be75a833230b4825307acd87df66daac4
                                                          • Opcode Fuzzy Hash: 15db5e58071b4fdcb7199dd083b18e26ea8dc1698e45e6aa97f5258939d7f241
                                                          • Instruction Fuzzy Hash: D2F0CD35546A802BC25277377C0AE3E165DEFC27B5F354519F669E31D2EF248C4641B0
                                                          APIs
                                                            • Part of subcall function 00DC9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00DC9693
                                                            • Part of subcall function 00DC9639: SelectObject.GDI32(?,00000000), ref: 00DC96A2
                                                            • Part of subcall function 00DC9639: BeginPath.GDI32(?), ref: 00DC96B9
                                                            • Part of subcall function 00DC9639: SelectObject.GDI32(?,00000000), ref: 00DC96E2
                                                          • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00E48A4E
                                                          • LineTo.GDI32(?,00000003,00000000), ref: 00E48A62
                                                          • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00E48A70
                                                          • LineTo.GDI32(?,00000000,00000003), ref: 00E48A80
                                                          • EndPath.GDI32(?), ref: 00E48A90
                                                          • StrokePath.GDI32(?), ref: 00E48AA0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                          • String ID:
                                                          • API String ID: 43455801-0
                                                          • Opcode ID: 8661f861a406b36f04a671422ff2848be341e13476ead73e81b5ac62d2186304
                                                          • Instruction ID: 14956017707f5e4850334c91c67e0a13c7da8e4f01331719559a1ae2178edb46
                                                          • Opcode Fuzzy Hash: 8661f861a406b36f04a671422ff2848be341e13476ead73e81b5ac62d2186304
                                                          • Instruction Fuzzy Hash: 4D111B7600110DFFDF129F91DC88EAA7F6CEB09394F148052FA19AA1A1C7719D5ADFA0
                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 00E15218
                                                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 00E15229
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00E15230
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 00E15238
                                                          • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00E1524F
                                                          • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00E15261
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: CapsDevice$Release
                                                          • String ID:
                                                          • API String ID: 1035833867-0
                                                          • Opcode ID: 2c2ab24643db2318a378ff945687a204a9d7e70d547a8b1bb855e0580f387765
                                                          • Instruction ID: dd1dd4bd9a65e7be14e05832fb2a30a84a7ae75a55809c2ee8c721441e70fafd
                                                          • Opcode Fuzzy Hash: 2c2ab24643db2318a378ff945687a204a9d7e70d547a8b1bb855e0580f387765
                                                          • Instruction Fuzzy Hash: F4018F76E01708BFEB109BA69C49A4EBFB8EB49751F144066FA04B7290D6709805CBA0
                                                          APIs
                                                          • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00DB1BF4
                                                          • MapVirtualKeyW.USER32(00000010,00000000), ref: 00DB1BFC
                                                          • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00DB1C07
                                                          • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00DB1C12
                                                          • MapVirtualKeyW.USER32(00000011,00000000), ref: 00DB1C1A
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00DB1C22
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Virtual
                                                          • String ID:
                                                          • API String ID: 4278518827-0
                                                          • Opcode ID: 95cc8a3b1c266737e530dc1d405f7ebe4fb864df022fab56f3dcb38f794178e5
                                                          • Instruction ID: 5c8e8aca3adb05724857cf672ebf498f819c8cfb2988a5b22adf17a66724e438
                                                          • Opcode Fuzzy Hash: 95cc8a3b1c266737e530dc1d405f7ebe4fb864df022fab56f3dcb38f794178e5
                                                          • Instruction Fuzzy Hash: 23016CB09027597DE3008F5A8C85B52FFA8FF19754F00415B915C47941C7F5A864CFE5
                                                          APIs
                                                          • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00E1EB30
                                                          • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00E1EB46
                                                          • GetWindowThreadProcessId.USER32(?,?), ref: 00E1EB55
                                                          • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00E1EB64
                                                          • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00E1EB6E
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00E1EB75
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                          • String ID:
                                                          • API String ID: 839392675-0
                                                          • Opcode ID: ca715f7099d17ea24932eae9545596b4c16a8716dcc46288fad4d159c4ebff8b
                                                          • Instruction ID: 4b72b8d9ede012c840694441ce4d423b192f8064fc8d85e9f92a1cfd556ce3b3
                                                          • Opcode Fuzzy Hash: ca715f7099d17ea24932eae9545596b4c16a8716dcc46288fad4d159c4ebff8b
                                                          • Instruction Fuzzy Hash: 25F06D76202158BFE6205B539C0DEEB3A7CEBCBF11F104198F601E219096A01A0686B5
                                                          APIs
                                                          • GetClientRect.USER32(?), ref: 00E07452
                                                          • SendMessageW.USER32(?,00001328,00000000,?), ref: 00E07469
                                                          • GetWindowDC.USER32(?), ref: 00E07475
                                                          • GetPixel.GDI32(00000000,?,?), ref: 00E07484
                                                          • ReleaseDC.USER32(?,00000000), ref: 00E07496
                                                          • GetSysColor.USER32(00000005), ref: 00E074B0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                          • String ID:
                                                          • API String ID: 272304278-0
                                                          • Opcode ID: 716552dffb30c789ed24a62ffe97b14684d413b2166d6f6cfb5be5fe223b48db
                                                          • Instruction ID: 9f125119e8424ffce985e878cf446dafcdb63d99a08a44a369f4e3f2f169ea6f
                                                          • Opcode Fuzzy Hash: 716552dffb30c789ed24a62ffe97b14684d413b2166d6f6cfb5be5fe223b48db
                                                          • Instruction Fuzzy Hash: C3018B35801215EFDB905F66DC08BAE7BB5FF05311F2140A4F965B31A1CB312E46AB51
                                                          APIs
                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00E1187F
                                                          • UnloadUserProfile.USERENV(?,?), ref: 00E1188B
                                                          • CloseHandle.KERNEL32(?), ref: 00E11894
                                                          • CloseHandle.KERNEL32(?), ref: 00E1189C
                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 00E118A5
                                                          • HeapFree.KERNEL32(00000000), ref: 00E118AC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                          • String ID:
                                                          • API String ID: 146765662-0
                                                          • Opcode ID: 295c55179964c102b7a755b1e9e5174fea21824f623d3ddbf49e84b7a9aed173
                                                          • Instruction ID: 373be1f730ae7d5eb04c2e7ca66b42edb4a81ba4155f09bcc82c0e425eddf5b5
                                                          • Opcode Fuzzy Hash: 295c55179964c102b7a755b1e9e5174fea21824f623d3ddbf49e84b7a9aed173
                                                          • Instruction Fuzzy Hash: 94E0ED3A106101BFD7415FA2ED0C905BF39FF8A7217208221F225A2171CB325466DF50
                                                          APIs
                                                          • __Init_thread_footer.LIBCMT ref: 00DBBEB3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Init_thread_footer
                                                          • String ID: D%$D%$D%$D%
                                                          • API String ID: 1385522511-2722557190
                                                          • Opcode ID: 286ed75670bd5fb63c1a694c011ab899624bd3108369c68dd1e91881d488b8d3
                                                          • Instruction ID: 2250c2024d3847226aeef2969068a3353279c399a352bad2bd8be1ee63465cc4
                                                          • Opcode Fuzzy Hash: 286ed75670bd5fb63c1a694c011ab899624bd3108369c68dd1e91881d488b8d3
                                                          • Instruction Fuzzy Hash: A3912B75A00606DFCB14CF69C4916E9BBF1FF58320F24416ED986AB350D7B5E981CBA0
                                                          APIs
                                                            • Part of subcall function 00DD0242: EnterCriticalSection.KERNEL32(00E8070C,00E81884,?,?,00DC198B,00E82518,?,?,?,00DB12F9,00000000), ref: 00DD024D
                                                            • Part of subcall function 00DD0242: LeaveCriticalSection.KERNEL32(00E8070C,?,00DC198B,00E82518,?,?,?,00DB12F9,00000000), ref: 00DD028A
                                                            • Part of subcall function 00DB9CB3: _wcslen.LIBCMT ref: 00DB9CBD
                                                            • Part of subcall function 00DD00A3: __onexit.LIBCMT ref: 00DD00A9
                                                          • __Init_thread_footer.LIBCMT ref: 00E37BFB
                                                            • Part of subcall function 00DD01F8: EnterCriticalSection.KERNEL32(00E8070C,?,?,00DC8747,00E82514), ref: 00DD0202
                                                            • Part of subcall function 00DD01F8: LeaveCriticalSection.KERNEL32(00E8070C,?,00DC8747,00E82514), ref: 00DD0235
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                          • String ID: +T$5$G$Variable must be of type 'Object'.
                                                          • API String ID: 535116098-4125810065
                                                          • Opcode ID: eda69ae22cf9b4127b294e844f3a968ede02bf8ebc0ce52dc06b2e286f4190a2
                                                          • Instruction ID: 5db4567f67aa6c9de2f06f32e55b4312e650fd4a190eb0da20ee54f0e247f586
                                                          • Opcode Fuzzy Hash: eda69ae22cf9b4127b294e844f3a968ede02bf8ebc0ce52dc06b2e286f4190a2
                                                          • Instruction Fuzzy Hash: F3919EB0604209EFCB24EF54D895DADBBB1FF49304F509059F8867B292DB31AE41CB61
                                                          APIs
                                                            • Part of subcall function 00DB7620: _wcslen.LIBCMT ref: 00DB7625
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00E1C6EE
                                                          • _wcslen.LIBCMT ref: 00E1C735
                                                          • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00E1C79C
                                                          • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00E1C7CA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info_wcslen$Default
                                                          • String ID: 0
                                                          • API String ID: 1227352736-4108050209
                                                          • Opcode ID: e508fccfcfe6b59f347207cf5816c76e57ae736e893591ab7bf626543bc7a82d
                                                          • Instruction ID: 496f4cb03d4db4b76f9d8b6366a9ebbb18d01ae933767665c81be12bcb1490d2
                                                          • Opcode Fuzzy Hash: e508fccfcfe6b59f347207cf5816c76e57ae736e893591ab7bf626543bc7a82d
                                                          • Instruction Fuzzy Hash: 3C51D2716843019BD7149F38C885BEA77E8EF89718F24292EF595F31D0DBA0D884CB62
                                                          APIs
                                                          • ShellExecuteExW.SHELL32(0000003C), ref: 00E3AEA3
                                                            • Part of subcall function 00DB7620: _wcslen.LIBCMT ref: 00DB7625
                                                          • GetProcessId.KERNEL32(00000000), ref: 00E3AF38
                                                          • CloseHandle.KERNEL32(00000000), ref: 00E3AF67
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseExecuteHandleProcessShell_wcslen
                                                          • String ID: <$@
                                                          • API String ID: 146682121-1426351568
                                                          • Opcode ID: 544e7aac861a13e9bf72f7d9a520702df8899a8da6c56f1bdc0ed6ffa4b87f38
                                                          • Instruction ID: 0a58036a3bb4e8c02517006cd3d4c8d929339dced78005c0692449172756f870
                                                          • Opcode Fuzzy Hash: 544e7aac861a13e9bf72f7d9a520702df8899a8da6c56f1bdc0ed6ffa4b87f38
                                                          • Instruction Fuzzy Hash: 1A718E74A00215DFCB14DF55C489A9EBBF0FF08314F0884A9E856AB7A2C774ED85CBA1
                                                          APIs
                                                          • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00E17206
                                                          • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00E1723C
                                                          • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00E1724D
                                                          • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00E172CF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$AddressCreateInstanceProc
                                                          • String ID: DllGetClassObject
                                                          • API String ID: 753597075-1075368562
                                                          • Opcode ID: 506baf18928a42b50e3106e681909f4912486ae2df1d19f2d7c7a990a2f36070
                                                          • Instruction ID: 6be642ae5e5293b1b318161d729a0f09603490eb4245468c0a121b9abf71cbcc
                                                          • Opcode Fuzzy Hash: 506baf18928a42b50e3106e681909f4912486ae2df1d19f2d7c7a990a2f36070
                                                          • Instruction Fuzzy Hash: E341B2B1604204DFDB15CF54C884ADA7BB9EF48B14F2090A9BD45AF21AD7B1DD86CBA0
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00E43E35
                                                          • IsMenu.USER32(?), ref: 00E43E4A
                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00E43E92
                                                          • DrawMenuBar.USER32 ref: 00E43EA5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$DrawInfoInsert
                                                          • String ID: 0
                                                          • API String ID: 3076010158-4108050209
                                                          • Opcode ID: 497cf2459885a68dbbd9d2b6549c57185fd4a03912cc55a45101925c002400d8
                                                          • Instruction ID: 2274e6c38086e0dfe22cbb53df1f3f7511e69406e263d24476326a031f141128
                                                          • Opcode Fuzzy Hash: 497cf2459885a68dbbd9d2b6549c57185fd4a03912cc55a45101925c002400d8
                                                          • Instruction Fuzzy Hash: 23418774A02309EFDB10EF61E880AEABBB9FF49358F044029E915A7250D330AE05CF60
                                                          APIs
                                                            • Part of subcall function 00DB9CB3: _wcslen.LIBCMT ref: 00DB9CBD
                                                            • Part of subcall function 00E13CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00E13CCA
                                                          • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00E11E66
                                                          • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00E11E79
                                                          • SendMessageW.USER32(?,00000189,?,00000000), ref: 00E11EA9
                                                            • Part of subcall function 00DB6B57: _wcslen.LIBCMT ref: 00DB6B6A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$_wcslen$ClassName
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 2081771294-1403004172
                                                          • Opcode ID: 119e6b551c8b612a54ea0c81fe47509371c3ee73f308dbb94b917eb87962083e
                                                          • Instruction ID: 082ae624965c1982a3592c0119a56ff77c6427de265fbf9a60b919a7880411ad
                                                          • Opcode Fuzzy Hash: 119e6b551c8b612a54ea0c81fe47509371c3ee73f308dbb94b917eb87962083e
                                                          • Instruction Fuzzy Hash: EA216875A00104BFDB14ABB0DC55CFFB7B8DF42354B10A159F926B31E1DB34494A8A30
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00E42F8D
                                                          • LoadLibraryW.KERNEL32(?), ref: 00E42F94
                                                          • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00E42FA9
                                                          • DestroyWindow.USER32(?), ref: 00E42FB1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$DestroyLibraryLoadWindow
                                                          • String ID: SysAnimate32
                                                          • API String ID: 3529120543-1011021900
                                                          • Opcode ID: 54132eb544a2ffa64e7cae906a0c2fe9bb87686b77575793dc75e6494fdff375
                                                          • Instruction ID: 2f7897a28a7e40c9f2f988732bac7570d956373253c71f6724ef4fa837c01a10
                                                          • Opcode Fuzzy Hash: 54132eb544a2ffa64e7cae906a0c2fe9bb87686b77575793dc75e6494fdff375
                                                          • Instruction Fuzzy Hash: 1E219A71200209AFEB104F65EC80EBB37B9EB59368F90621CFA50F21A0D772DC959760
                                                          APIs
                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00DD4D1E,00DE28E9,?,00DD4CBE,00DE28E9,00E788B8,0000000C,00DD4E15,00DE28E9,00000002), ref: 00DD4D8D
                                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00DD4DA0
                                                          • FreeLibrary.KERNEL32(00000000,?,?,?,00DD4D1E,00DE28E9,?,00DD4CBE,00DE28E9,00E788B8,0000000C,00DD4E15,00DE28E9,00000002,00000000), ref: 00DD4DC3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                          • String ID: CorExitProcess$mscoree.dll
                                                          • API String ID: 4061214504-1276376045
                                                          • Opcode ID: d0363bac478d08d801321b61b331b0558f4cb5f850617012cbba41759f36096a
                                                          • Instruction ID: 2be2056722f3a542aca203a2c4ff2791c47b9f698ec5759ae7ef49ea44b8df73
                                                          • Opcode Fuzzy Hash: d0363bac478d08d801321b61b331b0558f4cb5f850617012cbba41759f36096a
                                                          • Instruction Fuzzy Hash: E2F04F35A41208BFDB519F91DC49BADBFB9EF48752F1400AAF809B3260DB316945CAA1
                                                          APIs
                                                          • LoadLibraryA.KERNEL32 ref: 00E0D3AD
                                                          • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00E0D3BF
                                                          • FreeLibrary.KERNEL32(00000000), ref: 00E0D3E5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Library$AddressFreeLoadProc
                                                          • String ID: GetSystemWow64DirectoryW$X64
                                                          • API String ID: 145871493-2590602151
                                                          • Opcode ID: d9ed713ed375e002e10fe0b9d00c47d869af3ea89811d352da68a8bea890cc4a
                                                          • Instruction ID: b4a36af8dec9886c1fd2a8cb759c76c37020ab3cab3c62f6694dcf623e126bd0
                                                          • Opcode Fuzzy Hash: d9ed713ed375e002e10fe0b9d00c47d869af3ea89811d352da68a8bea890cc4a
                                                          • Instruction Fuzzy Hash: 9DF0553540FA21EFD3B117918C08EA9B324AF11B01B60B568F406F32A4CB20CDC58B93
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00DB4EDD,?,00E81418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DB4E9C
                                                          • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00DB4EAE
                                                          • FreeLibrary.KERNEL32(00000000,?,?,00DB4EDD,?,00E81418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DB4EC0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Library$AddressFreeLoadProc
                                                          • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                          • API String ID: 145871493-3689287502
                                                          • Opcode ID: adbfc2fafe7ace687e11aec23b36981727f237cadbe354bb774236228bcc650e
                                                          • Instruction ID: 09712cb5594c18ab1816b3d5ee19665743db23dfb0e03069a2623e0da188187c
                                                          • Opcode Fuzzy Hash: adbfc2fafe7ace687e11aec23b36981727f237cadbe354bb774236228bcc650e
                                                          • Instruction Fuzzy Hash: 03E0CD39A036229FD271572A7C18B9F6564AF82F627190115FC05F3302DF60CD0685B1
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00DF3CDE,?,00E81418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DB4E62
                                                          • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00DB4E74
                                                          • FreeLibrary.KERNEL32(00000000,?,?,00DF3CDE,?,00E81418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DB4E87
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Library$AddressFreeLoadProc
                                                          • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                          • API String ID: 145871493-1355242751
                                                          • Opcode ID: 8adfb13bf844cb114a88d8e5473db7ed93ed18d52351819181a31bb071a59932
                                                          • Instruction ID: f3ce63f817f5685d8d53a883b22ad798ad2ccaec20d7ad8609e9c5522fa0e3f7
                                                          • Opcode Fuzzy Hash: 8adfb13bf844cb114a88d8e5473db7ed93ed18d52351819181a31bb071a59932
                                                          • Instruction Fuzzy Hash: 3FD0C239503A219B46A21B267C08DCB2B28AF82B113190510B806B3211CF20CD02C5F1
                                                          APIs
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00E22C05
                                                          • DeleteFileW.KERNEL32(?), ref: 00E22C87
                                                          • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00E22C9D
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00E22CAE
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00E22CC0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: File$Delete$Copy
                                                          • String ID:
                                                          • API String ID: 3226157194-0
                                                          • Opcode ID: 79c265a7e8f3f4aaafa0e78363b9631c504089e8455b884ffc6fd8b04d715dc7
                                                          • Instruction ID: 5a035fcc870c91cd30900723721d4190554847389bf8a9c82ba1efce4d8d678e
                                                          • Opcode Fuzzy Hash: 79c265a7e8f3f4aaafa0e78363b9631c504089e8455b884ffc6fd8b04d715dc7
                                                          • Instruction Fuzzy Hash: D7B16D72D00129ABDF21EBA4DC85EDEB7BDEF09304F1040AAF609B6151EA319A448F71
                                                          APIs
                                                          • GetCurrentProcessId.KERNEL32 ref: 00E3A427
                                                          • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00E3A435
                                                          • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00E3A468
                                                          • CloseHandle.KERNEL32(?), ref: 00E3A63D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseCountersCurrentHandleOpen
                                                          • String ID:
                                                          • API String ID: 3488606520-0
                                                          • Opcode ID: 682b338fa25f059667ff457a16b4d4329552329aa7842a5f3894a180068e9229
                                                          • Instruction ID: e0fdf29e80c057d266369c52ac40239d5cee74d1e723ac5e7066321ee31c5494
                                                          • Opcode Fuzzy Hash: 682b338fa25f059667ff457a16b4d4329552329aa7842a5f3894a180068e9229
                                                          • Instruction Fuzzy Hash: 02A184716043019FD720DF14C886F6ABBE5EF88714F14985DF59A9B292D770EC41CBA2
                                                          APIs
                                                          • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00E53700), ref: 00DEBB91
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00E8121C,000000FF,00000000,0000003F,00000000,?,?), ref: 00DEBC09
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00E81270,000000FF,?,0000003F,00000000,?), ref: 00DEBC36
                                                          • _free.LIBCMT ref: 00DEBB7F
                                                            • Part of subcall function 00DE29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00DED7D1,00000000,00000000,00000000,00000000,?,00DED7F8,00000000,00000007,00000000,?,00DEDBF5,00000000), ref: 00DE29DE
                                                            • Part of subcall function 00DE29C8: GetLastError.KERNEL32(00000000,?,00DED7D1,00000000,00000000,00000000,00000000,?,00DED7F8,00000000,00000007,00000000,?,00DEDBF5,00000000,00000000), ref: 00DE29F0
                                                          • _free.LIBCMT ref: 00DEBD4B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                          • String ID:
                                                          • API String ID: 1286116820-0
                                                          • Opcode ID: 5cf1d47f2a970e85d8cb3988df9b503df2a532580a68e47a180e0d4fa10739dc
                                                          • Instruction ID: cd9fad1cb4dc9d4fd697da37c264123c66b3a55d3eeb6c5f7e00131122e50948
                                                          • Opcode Fuzzy Hash: 5cf1d47f2a970e85d8cb3988df9b503df2a532580a68e47a180e0d4fa10739dc
                                                          • Instruction Fuzzy Hash: BD51B571904249AFC710FF779C819ABB7BCEB44330B2402ABE558E71A1EB30AD459B70
                                                          APIs
                                                            • Part of subcall function 00E1DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00E1CF22,?), ref: 00E1DDFD
                                                            • Part of subcall function 00E1DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00E1CF22,?), ref: 00E1DE16
                                                            • Part of subcall function 00E1E199: GetFileAttributesW.KERNEL32(?,00E1CF95), ref: 00E1E19A
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 00E1E473
                                                          • MoveFileW.KERNEL32(?,?), ref: 00E1E4AC
                                                          • _wcslen.LIBCMT ref: 00E1E5EB
                                                          • _wcslen.LIBCMT ref: 00E1E603
                                                          • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 00E1E650
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                          • String ID:
                                                          • API String ID: 3183298772-0
                                                          • Opcode ID: 0e998806d555030558e5be8e6a3cbd035e73eeedfd859fa3b711e128491f7d0a
                                                          • Instruction ID: 8e956bfeefedbfa70e65c35f2da8ce643de3a5f93318fe7f1263b53c98e4add9
                                                          • Opcode Fuzzy Hash: 0e998806d555030558e5be8e6a3cbd035e73eeedfd859fa3b711e128491f7d0a
                                                          • Instruction Fuzzy Hash: A85192B24083859BC724DB90DC919DBB3ECEF84344F10491EF689E3251EF74A5888776
                                                          APIs
                                                            • Part of subcall function 00DB9CB3: _wcslen.LIBCMT ref: 00DB9CBD
                                                            • Part of subcall function 00E3C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00E3B6AE,?,?), ref: 00E3C9B5
                                                            • Part of subcall function 00E3C998: _wcslen.LIBCMT ref: 00E3C9F1
                                                            • Part of subcall function 00E3C998: _wcslen.LIBCMT ref: 00E3CA68
                                                            • Part of subcall function 00E3C998: _wcslen.LIBCMT ref: 00E3CA9E
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E3BAA5
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00E3BB00
                                                          • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00E3BB63
                                                          • RegCloseKey.ADVAPI32(?,?), ref: 00E3BBA6
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00E3BBB3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                          • String ID:
                                                          • API String ID: 826366716-0
                                                          • Opcode ID: f41e1542e85b0ba7a04c95fd68ec6c06de2c060eb57d4aac1424b52ebc895908
                                                          • Instruction ID: 6c8b52694435d6605a9ff2ef3c0a05a3429b6ae8ada6f903ee937b515cf173f6
                                                          • Opcode Fuzzy Hash: f41e1542e85b0ba7a04c95fd68ec6c06de2c060eb57d4aac1424b52ebc895908
                                                          • Instruction Fuzzy Hash: A261C031208241EFC714DF14C494E6ABBE5FF84308F54955CF59A9B2A2CB31ED45CBA2
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 00E18BCD
                                                          • VariantClear.OLEAUT32 ref: 00E18C3E
                                                          • VariantClear.OLEAUT32 ref: 00E18C9D
                                                          • VariantClear.OLEAUT32(?), ref: 00E18D10
                                                          • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00E18D3B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$Clear$ChangeInitType
                                                          • String ID:
                                                          • API String ID: 4136290138-0
                                                          • Opcode ID: b61c2c5f3327be7febba415073e2686160cc65d01daa0c50a546f20dea11b4c0
                                                          • Instruction ID: c5546498bb73d48b0fb8be707a8795d59d44e6ddd91bf1617712723c592ebe66
                                                          • Opcode Fuzzy Hash: b61c2c5f3327be7febba415073e2686160cc65d01daa0c50a546f20dea11b4c0
                                                          • Instruction Fuzzy Hash: DD5178B5A00219EFCB14CF68D894AEAB7F8FF89314B118559E915EB350E730E951CF90
                                                          APIs
                                                          • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00E28BAE
                                                          • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00E28BDA
                                                          • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00E28C32
                                                          • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00E28C57
                                                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00E28C5F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: PrivateProfile$SectionWrite$String
                                                          • String ID:
                                                          • API String ID: 2832842796-0
                                                          • Opcode ID: f66bc70cda4f9982671f6036966710dadc9bef2c28ba1df2fe3d81b2f98f817e
                                                          • Instruction ID: 0d9ed3600fdb24cdaf950f8c5cc1fee06f065ac0794a0e9988cf3fb6c4033ec4
                                                          • Opcode Fuzzy Hash: f66bc70cda4f9982671f6036966710dadc9bef2c28ba1df2fe3d81b2f98f817e
                                                          • Instruction Fuzzy Hash: A1514935A00215DFCB11DF65C881EA9BBF5FF49314F088498E84AAB362CB31ED41CBA1
                                                          APIs
                                                          • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00E38F40
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00E38FD0
                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 00E38FEC
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00E39032
                                                          • FreeLibrary.KERNEL32(00000000), ref: 00E39052
                                                            • Part of subcall function 00DCF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00E21043,?,7644E610), ref: 00DCF6E6
                                                            • Part of subcall function 00DCF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00E0FA64,00000000,00000000,?,?,00E21043,?,7644E610,?,00E0FA64), ref: 00DCF70D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                          • String ID:
                                                          • API String ID: 666041331-0
                                                          • Opcode ID: 5f16b7782e9917bced89617390f9870bdb5dc7776b1e15d8bc5c07dfe087bc89
                                                          • Instruction ID: 7f252ed7a7ae142a392a57ac95b3ec060c82a08e8bc6416c761d28e0dfcec087
                                                          • Opcode Fuzzy Hash: 5f16b7782e9917bced89617390f9870bdb5dc7776b1e15d8bc5c07dfe087bc89
                                                          • Instruction Fuzzy Hash: 11511738605205DFCB15DF54C4988A9BBB1FF49324F149099E80AAB362DB71ED86CFA1
                                                          APIs
                                                          • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00E46C33
                                                          • SetWindowLongW.USER32(?,000000EC,?), ref: 00E46C4A
                                                          • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00E46C73
                                                          • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,00E2AB79,00000000,00000000), ref: 00E46C98
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00E46CC7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Long$MessageSendShow
                                                          • String ID:
                                                          • API String ID: 3688381893-0
                                                          • Opcode ID: 280b0046824fbf550dc1861b4063917d88291cd1d9d0cc4c2f87bae54fbcdb77
                                                          • Instruction ID: 49a14eed1a5c6d29f8747cb90db3f6c6841d19a917530440da29afb262c50d49
                                                          • Opcode Fuzzy Hash: 280b0046824fbf550dc1861b4063917d88291cd1d9d0cc4c2f87bae54fbcdb77
                                                          • Instruction Fuzzy Hash: 4B41F335A00104AFDB24CF69EC98FE9BBA5EB4B354F151268F899B72E0C371ED41CA51
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID:
                                                          • API String ID: 269201875-0
                                                          • Opcode ID: 819d237bf608c65c665ba3490b6a7a5fa6b571b22c6263c52c29025accb5de7d
                                                          • Instruction ID: 5ced2462bf09c678fd6a4b5463f9933ef6b4d4d9ab9084ca9e80b7da488fa9d5
                                                          • Opcode Fuzzy Hash: 819d237bf608c65c665ba3490b6a7a5fa6b571b22c6263c52c29025accb5de7d
                                                          • Instruction Fuzzy Hash: 0B41D432A002449FCB24EF79C881A6DB7F9EF89314F194569E515EB396D731AD01CBA0
                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 00DC9141
                                                          • ScreenToClient.USER32(00000000,?), ref: 00DC915E
                                                          • GetAsyncKeyState.USER32(00000001), ref: 00DC9183
                                                          • GetAsyncKeyState.USER32(00000002), ref: 00DC919D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: AsyncState$ClientCursorScreen
                                                          • String ID:
                                                          • API String ID: 4210589936-0
                                                          • Opcode ID: 194aff003d1cd78915a9b23bd309a284016af54c96ee2cecc97b80269550171b
                                                          • Instruction ID: e85f3b8701ce0511fd2b36e0641385b20ebabcfdbb89aec3bf0655538957a0a3
                                                          • Opcode Fuzzy Hash: 194aff003d1cd78915a9b23bd309a284016af54c96ee2cecc97b80269550171b
                                                          • Instruction Fuzzy Hash: 7F415E31A0860BEBDF159F64C859BEEF7B4FB05324F248219F469A32D0C7346995CBA1
                                                          APIs
                                                          • GetInputState.USER32 ref: 00E238CB
                                                          • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00E23922
                                                          • TranslateMessage.USER32(?), ref: 00E2394B
                                                          • DispatchMessageW.USER32(?), ref: 00E23955
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00E23966
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                          • String ID:
                                                          • API String ID: 2256411358-0
                                                          • Opcode ID: 79bd931fe69657b04478fbeafdedcb4b90d53f3c523ce02375d1dde04b73c151
                                                          • Instruction ID: 5e701c93ddb21cbb4c7a07bce72d2b57fb7eb1cf1c96b521a3d77d71bdaf84d8
                                                          • Opcode Fuzzy Hash: 79bd931fe69657b04478fbeafdedcb4b90d53f3c523ce02375d1dde04b73c151
                                                          • Instruction Fuzzy Hash: 3B31E8709043519EEB39CB35A809BB637A8EB46308F14155DE456B70D4E3BC96C9CF11
                                                          APIs
                                                          • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,00E2C21E,00000000), ref: 00E2CF38
                                                          • InternetReadFile.WININET(?,00000000,?,?), ref: 00E2CF6F
                                                          • GetLastError.KERNEL32(?,00000000,?,?,?,00E2C21E,00000000), ref: 00E2CFB4
                                                          • SetEvent.KERNEL32(?,?,00000000,?,?,?,00E2C21E,00000000), ref: 00E2CFC8
                                                          • SetEvent.KERNEL32(?,?,00000000,?,?,?,00E2C21E,00000000), ref: 00E2CFF2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                          • String ID:
                                                          • API String ID: 3191363074-0
                                                          • Opcode ID: 84313815cd558e4557aef85edb09602037996364bbfd186b5accf98bd828e4c1
                                                          • Instruction ID: 089b223955f5213822daca2d83002422d8faef84bd616fc93d2bf054f5de7723
                                                          • Opcode Fuzzy Hash: 84313815cd558e4557aef85edb09602037996364bbfd186b5accf98bd828e4c1
                                                          • Instruction Fuzzy Hash: 0B31A071600615EFEB20DFA5E984AAFBBFAEF04354B20402EF106E3150DB30AE45DB60
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 00E11915
                                                          • PostMessageW.USER32(00000001,00000201,00000001), ref: 00E119C1
                                                          • Sleep.KERNEL32(00000000,?,?,?), ref: 00E119C9
                                                          • PostMessageW.USER32(00000001,00000202,00000000), ref: 00E119DA
                                                          • Sleep.KERNEL32(00000000,?,?,?,?), ref: 00E119E2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessagePostSleep$RectWindow
                                                          • String ID:
                                                          • API String ID: 3382505437-0
                                                          • Opcode ID: 833ad3c2e02fca5780fbbd6bb7b869d746681bc75bdb74db21485c2a9f92f8c8
                                                          • Instruction ID: d471618e18ea2024c876bf4202819ad6168e0e8ec39928cb01d4d6defffd6b14
                                                          • Opcode Fuzzy Hash: 833ad3c2e02fca5780fbbd6bb7b869d746681bc75bdb74db21485c2a9f92f8c8
                                                          • Instruction Fuzzy Hash: 1631C075A00219EFCB00CFA8CD99ADE3BB5EB45319F109269FA21B72D1C7709984CB91
                                                          APIs
                                                          • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00E45745
                                                          • SendMessageW.USER32(?,00001074,?,00000001), ref: 00E4579D
                                                          • _wcslen.LIBCMT ref: 00E457AF
                                                          • _wcslen.LIBCMT ref: 00E457BA
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00E45816
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$_wcslen
                                                          • String ID:
                                                          • API String ID: 763830540-0
                                                          • Opcode ID: 4f5316fb4c58ba4e130eb331489837f65393082dfbfe7c4c8c021ba8530bcedf
                                                          • Instruction ID: ae68a1bf43bf7cd3cf67a060a9e6c6d05fa5cc82d90cf41e6ed615ede7656079
                                                          • Opcode Fuzzy Hash: 4f5316fb4c58ba4e130eb331489837f65393082dfbfe7c4c8c021ba8530bcedf
                                                          • Instruction Fuzzy Hash: 5621D272904608DBDB208FA1EC85AEE7BB8FF05724F109266F929FB181D7708985CF50
                                                          APIs
                                                          • IsWindow.USER32(00000000), ref: 00E30951
                                                          • GetForegroundWindow.USER32 ref: 00E30968
                                                          • GetDC.USER32(00000000), ref: 00E309A4
                                                          • GetPixel.GDI32(00000000,?,00000003), ref: 00E309B0
                                                          • ReleaseDC.USER32(00000000,00000003), ref: 00E309E8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ForegroundPixelRelease
                                                          • String ID:
                                                          • API String ID: 4156661090-0
                                                          • Opcode ID: 5afa6e6ec8d1a0fe06e6e22d5831d15f016fbda117f5645c315614f780314018
                                                          • Instruction ID: 10d29e136be964f69a172152ad16c8b9aa7d5b04993ad4d80199d4815f185140
                                                          • Opcode Fuzzy Hash: 5afa6e6ec8d1a0fe06e6e22d5831d15f016fbda117f5645c315614f780314018
                                                          • Instruction Fuzzy Hash: 5E21A439600214AFD714EF65D848AAEBBF9FF85710F158069F846A7362CB70AD05CB60
                                                          APIs
                                                          • GetEnvironmentStringsW.KERNEL32 ref: 00DECDC6
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00DECDE9
                                                            • Part of subcall function 00DE3820: RtlAllocateHeap.NTDLL(00000000,?,00E81444,?,00DCFDF5,?,?,00DBA976,00000010,00E81440,00DB13FC,?,00DB13C6,?,00DB1129), ref: 00DE3852
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00DECE0F
                                                          • _free.LIBCMT ref: 00DECE22
                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00DECE31
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                          • String ID:
                                                          • API String ID: 336800556-0
                                                          • Opcode ID: e6b2fbca473e12986cfb558d4f7bba25b1778c621d86311cc1888225dc5e9da9
                                                          • Instruction ID: 7bd18aeabd7a2115f352d3614da184e3872bdec71a0092a7342d03207179f05c
                                                          • Opcode Fuzzy Hash: e6b2fbca473e12986cfb558d4f7bba25b1778c621d86311cc1888225dc5e9da9
                                                          • Instruction Fuzzy Hash: 3101D4726122957F23213ABB6C8CD7B696DDFC7FA13291129F905D7201EA618D0381B0
                                                          APIs
                                                          • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00DC9693
                                                          • SelectObject.GDI32(?,00000000), ref: 00DC96A2
                                                          • BeginPath.GDI32(?), ref: 00DC96B9
                                                          • SelectObject.GDI32(?,00000000), ref: 00DC96E2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ObjectSelect$BeginCreatePath
                                                          • String ID:
                                                          • API String ID: 3225163088-0
                                                          • Opcode ID: 0ec4163c1c502e36a3da23e46d0f48b617b170e80e11fcf7087484f2aca8bcdd
                                                          • Instruction ID: 24096dc00dc6854ad364267cbd19e38a57ccd403e1af9cf673f6ef10940241ad
                                                          • Opcode Fuzzy Hash: 0ec4163c1c502e36a3da23e46d0f48b617b170e80e11fcf7087484f2aca8bcdd
                                                          • Instruction Fuzzy Hash: AD218330842306EFDB119F66EC28BA9BB78BB81355F140259F414B71F0D370989BCBA4
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: _memcmp
                                                          • String ID:
                                                          • API String ID: 2931989736-0
                                                          • Opcode ID: 182487fcc176100b8078c753f6c6dabd394c0945b66c150da713d212ee857c08
                                                          • Instruction ID: 1262d098811ff5758595a54cc71563e137285cbdd15cde9be140f348cc3335f2
                                                          • Opcode Fuzzy Hash: 182487fcc176100b8078c753f6c6dabd394c0945b66c150da713d212ee857c08
                                                          • Instruction Fuzzy Hash: ED019677641605FAD20855119D83FFA635CDBA17A8B005023FD05BA281F660ED6086B4
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,?,00DDF2DE,00DE3863,00E81444,?,00DCFDF5,?,?,00DBA976,00000010,00E81440,00DB13FC,?,00DB13C6), ref: 00DE2DFD
                                                          • _free.LIBCMT ref: 00DE2E32
                                                          • _free.LIBCMT ref: 00DE2E59
                                                          • SetLastError.KERNEL32(00000000,00DB1129), ref: 00DE2E66
                                                          • SetLastError.KERNEL32(00000000,00DB1129), ref: 00DE2E6F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_free
                                                          • String ID:
                                                          • API String ID: 3170660625-0
                                                          • Opcode ID: cb54c155e792119238f266aba797b028b28c383924df74cf8785bcdeeaa3c453
                                                          • Instruction ID: 429bd8d6031b3f477f915a69e9eb1e12f586ba5db9f5e4e10c16efdd4474abeb
                                                          • Opcode Fuzzy Hash: cb54c155e792119238f266aba797b028b28c383924df74cf8785bcdeeaa3c453
                                                          • Instruction Fuzzy Hash: 5D01F4362466906BC61277776C4AD3B266DEBC2BB5B794028F469B32D3EB24CC064130
                                                          APIs
                                                          • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E0FF41,80070057,?,?,?,00E1035E), ref: 00E1002B
                                                          • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E0FF41,80070057,?,?), ref: 00E10046
                                                          • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E0FF41,80070057,?,?), ref: 00E10054
                                                          • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E0FF41,80070057,?), ref: 00E10064
                                                          • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E0FF41,80070057,?,?), ref: 00E10070
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: From$Prog$FreeStringTasklstrcmpi
                                                          • String ID:
                                                          • API String ID: 3897988419-0
                                                          • Opcode ID: f488befe0561fefc57d4c45cd4bf018ab2183c5c87fcb0b37e740c99140f14d7
                                                          • Instruction ID: 52a27597a54de01f27f4e5d70e1808dc55d8700df69bcf057e95c4466c252a17
                                                          • Opcode Fuzzy Hash: f488befe0561fefc57d4c45cd4bf018ab2183c5c87fcb0b37e740c99140f14d7
                                                          • Instruction Fuzzy Hash: 8F01DF7A601204BFDB114F6ADC04BEA7AADEB4C791F205424F801F3210E7B1DE859BA0
                                                          APIs
                                                          • QueryPerformanceCounter.KERNEL32(?), ref: 00E1E997
                                                          • QueryPerformanceFrequency.KERNEL32(?), ref: 00E1E9A5
                                                          • Sleep.KERNEL32(00000000), ref: 00E1E9AD
                                                          • QueryPerformanceCounter.KERNEL32(?), ref: 00E1E9B7
                                                          • Sleep.KERNEL32 ref: 00E1E9F3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: PerformanceQuery$CounterSleep$Frequency
                                                          • String ID:
                                                          • API String ID: 2833360925-0
                                                          • Opcode ID: aa7a6e07d0698e8aac210dd1e15bf36e3366c5aaebcf07b96bcc914803a05ffb
                                                          • Instruction ID: 7915006f46bee6e6afe1a6891981431c683571e31dfe6b999669aca351e3b4e8
                                                          • Opcode Fuzzy Hash: aa7a6e07d0698e8aac210dd1e15bf36e3366c5aaebcf07b96bcc914803a05ffb
                                                          • Instruction Fuzzy Hash: F1015735C0262DDBCF44ABE6DC49AEDBB78FB49700F100586E902B3250DB3095998BA1
                                                          APIs
                                                          • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00E11114
                                                          • GetLastError.KERNEL32(?,00000000,00000000,?,?,00E10B9B,?,?,?), ref: 00E11120
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00E10B9B,?,?,?), ref: 00E1112F
                                                          • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00E10B9B,?,?,?), ref: 00E11136
                                                          • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00E1114D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 842720411-0
                                                          • Opcode ID: ada7f3c8709cf2c082194afc679d4d2d146f9a14f64787de377ec8eb24eefb7e
                                                          • Instruction ID: db276a8dbeee2d532ed6d58a74c10f944458abda11a6d727b6977c0b244fcb01
                                                          • Opcode Fuzzy Hash: ada7f3c8709cf2c082194afc679d4d2d146f9a14f64787de377ec8eb24eefb7e
                                                          • Instruction Fuzzy Hash: 06018179202205BFDB514FA6DC4DEAA3F7EEF86364B200455FA41E3360DB31DC418A60
                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00E10FCA
                                                          • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00E10FD6
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00E10FE5
                                                          • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00E10FEC
                                                          • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00E11002
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: f0dc91c0463d5cdb72ae0de7f529d975eb6fe4c7eae7c0976b2f66b588e234e4
                                                          • Instruction ID: f2c28eacbb0c015c38da3290d340ca97f583287f697ca603086f016fa56809be
                                                          • Opcode Fuzzy Hash: f0dc91c0463d5cdb72ae0de7f529d975eb6fe4c7eae7c0976b2f66b588e234e4
                                                          • Instruction Fuzzy Hash: D4F06239602301EFD7214FA5DC4DF9A3B6EEF8A761F204454FA45E7251CA70DC858A60
                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00E1102A
                                                          • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00E11036
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00E11045
                                                          • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00E1104C
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00E11062
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: 3ba3c6ea72dbb58a3c14818c8ce07c8814d6114735362417e9f332c582f74766
                                                          • Instruction ID: 2e85d3e5a0f358c4ac6aea6fb9fa6d72f1dd033691ffeb358a59a6bacae43647
                                                          • Opcode Fuzzy Hash: 3ba3c6ea72dbb58a3c14818c8ce07c8814d6114735362417e9f332c582f74766
                                                          • Instruction Fuzzy Hash: 94F06D39602301EFDB215FA6EC49F963BADEF8A7A1F200454FA45E7250CA70D885DA60
                                                          APIs
                                                          • CloseHandle.KERNEL32(?,?,?,?,00E2017D,?,00E232FC,?,00000001,00DF2592,?), ref: 00E20324
                                                          • CloseHandle.KERNEL32(?,?,?,?,00E2017D,?,00E232FC,?,00000001,00DF2592,?), ref: 00E20331
                                                          • CloseHandle.KERNEL32(?,?,?,?,00E2017D,?,00E232FC,?,00000001,00DF2592,?), ref: 00E2033E
                                                          • CloseHandle.KERNEL32(?,?,?,?,00E2017D,?,00E232FC,?,00000001,00DF2592,?), ref: 00E2034B
                                                          • CloseHandle.KERNEL32(?,?,?,?,00E2017D,?,00E232FC,?,00000001,00DF2592,?), ref: 00E20358
                                                          • CloseHandle.KERNEL32(?,?,?,?,00E2017D,?,00E232FC,?,00000001,00DF2592,?), ref: 00E20365
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseHandle
                                                          • String ID:
                                                          • API String ID: 2962429428-0
                                                          • Opcode ID: 0c845da14b5713a20ef856ba4b81335879678e0c5e1ac68b94e50e597163eac2
                                                          • Instruction ID: bb6a76b2931a1be684acdf3440f0ca8b5cdc647f8aa3a2314742dd6c04c0ec0a
                                                          • Opcode Fuzzy Hash: 0c845da14b5713a20ef856ba4b81335879678e0c5e1ac68b94e50e597163eac2
                                                          • Instruction Fuzzy Hash: 5901A272801B259FC7309F66E880412FBF5BF503193159A3FD19662972C771A959CF80
                                                          APIs
                                                          • _free.LIBCMT ref: 00DED752
                                                            • Part of subcall function 00DE29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00DED7D1,00000000,00000000,00000000,00000000,?,00DED7F8,00000000,00000007,00000000,?,00DEDBF5,00000000), ref: 00DE29DE
                                                            • Part of subcall function 00DE29C8: GetLastError.KERNEL32(00000000,?,00DED7D1,00000000,00000000,00000000,00000000,?,00DED7F8,00000000,00000007,00000000,?,00DEDBF5,00000000,00000000), ref: 00DE29F0
                                                          • _free.LIBCMT ref: 00DED764
                                                          • _free.LIBCMT ref: 00DED776
                                                          • _free.LIBCMT ref: 00DED788
                                                          • _free.LIBCMT ref: 00DED79A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: c4d7d94784448e7201d01c7e44dedf675874e10556c3e1092e51c172905aefba
                                                          • Instruction ID: af988b25f78240bc588c5dc6df708589909ee97da01b0ac59b23a59b1a29ab4f
                                                          • Opcode Fuzzy Hash: c4d7d94784448e7201d01c7e44dedf675874e10556c3e1092e51c172905aefba
                                                          • Instruction Fuzzy Hash: 7CF01232544688AF8665FB67FDC6C2A77DEFB44710BA91809F059E7502CB34FC808A74
                                                          APIs
                                                          • GetDlgItem.USER32(?,000003E9), ref: 00E15C58
                                                          • GetWindowTextW.USER32(00000000,?,00000100), ref: 00E15C6F
                                                          • MessageBeep.USER32(00000000), ref: 00E15C87
                                                          • KillTimer.USER32(?,0000040A), ref: 00E15CA3
                                                          • EndDialog.USER32(?,00000001), ref: 00E15CBD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                          • String ID:
                                                          • API String ID: 3741023627-0
                                                          • Opcode ID: a7059decd06d6c91955eb1777d4cee20f9bb6a2b471067e998d63b0aad987e91
                                                          • Instruction ID: e28b4458caddb857f1c2f1f377762a38f3c72ea243ace39a284667e49f2ab8bb
                                                          • Opcode Fuzzy Hash: a7059decd06d6c91955eb1777d4cee20f9bb6a2b471067e998d63b0aad987e91
                                                          • Instruction Fuzzy Hash: 6A01D635501B04EFEB205F11DD4EFE6B7B8BB01B05F051199A687B20E0DBF4A9C98E90
                                                          APIs
                                                          • _free.LIBCMT ref: 00DE22BE
                                                            • Part of subcall function 00DE29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00DED7D1,00000000,00000000,00000000,00000000,?,00DED7F8,00000000,00000007,00000000,?,00DEDBF5,00000000), ref: 00DE29DE
                                                            • Part of subcall function 00DE29C8: GetLastError.KERNEL32(00000000,?,00DED7D1,00000000,00000000,00000000,00000000,?,00DED7F8,00000000,00000007,00000000,?,00DEDBF5,00000000,00000000), ref: 00DE29F0
                                                          • _free.LIBCMT ref: 00DE22D0
                                                          • _free.LIBCMT ref: 00DE22E3
                                                          • _free.LIBCMT ref: 00DE22F4
                                                          • _free.LIBCMT ref: 00DE2305
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: fa54047f91fffdee338d67fe7b92723b8622d79c64f55da37dd92e90aab9daae
                                                          • Instruction ID: b251940d06c438fc488e9a0d0fd234fe6144a5f301d19898ad76cf0f2f91010f
                                                          • Opcode Fuzzy Hash: fa54047f91fffdee338d67fe7b92723b8622d79c64f55da37dd92e90aab9daae
                                                          • Instruction Fuzzy Hash: 3EF05E719409658F8622BF57BC038283B6CFB18760716554AF51CF63B2C734185AAFF5
                                                          APIs
                                                          • EndPath.GDI32(?), ref: 00DC95D4
                                                          • StrokeAndFillPath.GDI32(?,?,00E071F7,00000000,?,?,?), ref: 00DC95F0
                                                          • SelectObject.GDI32(?,00000000), ref: 00DC9603
                                                          • DeleteObject.GDI32 ref: 00DC9616
                                                          • StrokePath.GDI32(?), ref: 00DC9631
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Path$ObjectStroke$DeleteFillSelect
                                                          • String ID:
                                                          • API String ID: 2625713937-0
                                                          • Opcode ID: dcc94e4b25d7f47116a6764cc1e6d4e7fc10ed81c1d8694130aad8c3a30dd9f3
                                                          • Instruction ID: 917ef9d917fa5e80f96a68978836b5c753125bd424f540cad764c5997db7e089
                                                          • Opcode Fuzzy Hash: dcc94e4b25d7f47116a6764cc1e6d4e7fc10ed81c1d8694130aad8c3a30dd9f3
                                                          • Instruction Fuzzy Hash: E2F03C34006605EFDB265F67ED2CB643B69AB81362F148258F469760F0C730899BDF20
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: __freea$_free
                                                          • String ID: a/p$am/pm
                                                          • API String ID: 3432400110-3206640213
                                                          • Opcode ID: b30d920e3593255563691ded745162e87043c796f871748783d62ec4525bfa05
                                                          • Instruction ID: 7fcec4f1a881ae59f9b09ed0dcaec5f4db8b38179e47a79f49d3728cc6d7ef68
                                                          • Opcode Fuzzy Hash: b30d920e3593255563691ded745162e87043c796f871748783d62ec4525bfa05
                                                          • Instruction Fuzzy Hash: D9D1F479B00286CACB24BF6AC845BFEB7B1FF05300F284259E645AB654D3759D80CBB1
                                                          APIs
                                                            • Part of subcall function 00DD0242: EnterCriticalSection.KERNEL32(00E8070C,00E81884,?,?,00DC198B,00E82518,?,?,?,00DB12F9,00000000), ref: 00DD024D
                                                            • Part of subcall function 00DD0242: LeaveCriticalSection.KERNEL32(00E8070C,?,00DC198B,00E82518,?,?,?,00DB12F9,00000000), ref: 00DD028A
                                                            • Part of subcall function 00DD00A3: __onexit.LIBCMT ref: 00DD00A9
                                                          • __Init_thread_footer.LIBCMT ref: 00E36238
                                                            • Part of subcall function 00DD01F8: EnterCriticalSection.KERNEL32(00E8070C,?,?,00DC8747,00E82514), ref: 00DD0202
                                                            • Part of subcall function 00DD01F8: LeaveCriticalSection.KERNEL32(00E8070C,?,00DC8747,00E82514), ref: 00DD0235
                                                            • Part of subcall function 00E2359C: LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 00E235E4
                                                            • Part of subcall function 00E2359C: LoadStringW.USER32(00E82390,?,00000FFF,?), ref: 00E2360A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$EnterLeaveLoadString$Init_thread_footer__onexit
                                                          • String ID: x#$x#$x#
                                                          • API String ID: 1072379062-1894725482
                                                          • Opcode ID: 57a8b6ec380fe61a9961ed914e2094d997a27c49ab2ea48be0c8e21fad93e71d
                                                          • Instruction ID: 1d0549da8c9cd21870dd17899f82e7944180dd4fba56d03b43eca109e4b47a08
                                                          • Opcode Fuzzy Hash: 57a8b6ec380fe61a9961ed914e2094d997a27c49ab2ea48be0c8e21fad93e71d
                                                          • Instruction Fuzzy Hash: AAC19071A00105AFCB14DFA8C895EBEBBB9FF48304F148469F955AB251DB70ED45CBA0
                                                          APIs
                                                            • Part of subcall function 00E1B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00E121D0,?,?,00000034,00000800,?,00000034), ref: 00E1B42D
                                                          • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00E12760
                                                            • Part of subcall function 00E1B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00E121FF,?,?,00000800,?,00001073,00000000,?,?), ref: 00E1B3F8
                                                            • Part of subcall function 00E1B32A: GetWindowThreadProcessId.USER32(?,?), ref: 00E1B355
                                                            • Part of subcall function 00E1B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00E12194,00000034,?,?,00001004,00000000,00000000), ref: 00E1B365
                                                            • Part of subcall function 00E1B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00E12194,00000034,?,?,00001004,00000000,00000000), ref: 00E1B37B
                                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00E127CD
                                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00E1281A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                          • String ID: @
                                                          • API String ID: 4150878124-2766056989
                                                          • Opcode ID: feeefeea15ce40c01bc5d7263ad0ae2461a2ea78147779cf666c091ce8468e14
                                                          • Instruction ID: 71f1e9f23f6fb516cc00c0287351e945877cd4043320bc16cf99a4ea4f281c21
                                                          • Opcode Fuzzy Hash: feeefeea15ce40c01bc5d7263ad0ae2461a2ea78147779cf666c091ce8468e14
                                                          • Instruction Fuzzy Hash: 52414F76900218AFDB14DFA4CD81ADEBBB8EF05700F109099FA55B7181DB706E85CB61
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\file.exe,00000104), ref: 00DE1769
                                                          • _free.LIBCMT ref: 00DE1834
                                                          • _free.LIBCMT ref: 00DE183E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: _free$FileModuleName
                                                          • String ID: C:\Users\user\Desktop\file.exe
                                                          • API String ID: 2506810119-3695852857
                                                          • Opcode ID: 3e3bad4514bea29952d972a46bea1d6f4da4c6f743bf9e1fe6a4cd4b1d439a92
                                                          • Instruction ID: 69e4dd6535803c8ff488c5b63ceaeaf23ff0bbdb1cd3d004418742020cc3393f
                                                          • Opcode Fuzzy Hash: 3e3bad4514bea29952d972a46bea1d6f4da4c6f743bf9e1fe6a4cd4b1d439a92
                                                          • Instruction Fuzzy Hash: 8C318179B00298FFDB21FB9A9C81D9EBBBCEB85710B1441A6E404D7211D6708E45CBB0
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(00000004,?,00000000,?), ref: 00E1C306
                                                          • DeleteMenu.USER32(?,00000007,00000000), ref: 00E1C34C
                                                          • DeleteMenu.USER32(?,?,00000000,?,00000000,00000000,00E81990,01007630), ref: 00E1C395
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$Delete$InfoItem
                                                          • String ID: 0
                                                          • API String ID: 135850232-4108050209
                                                          • Opcode ID: 6f45943dc9cfd12c55ba70963b21b11ff7444215aae435d5cda34f86d62c0999
                                                          • Instruction ID: 6f418c150132dc586128b2116cd5f04af640574e548ac55657972fb231719fbd
                                                          • Opcode Fuzzy Hash: 6f45943dc9cfd12c55ba70963b21b11ff7444215aae435d5cda34f86d62c0999
                                                          • Instruction Fuzzy Hash: FF41D2312443019FD720DF25D884B9ABBE4EF85314F20966EF9A5E72D1C730E985CB62
                                                          APIs
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00E4CC08,00000000,?,?,?,?), ref: 00E444AA
                                                          • GetWindowLongW.USER32 ref: 00E444C7
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00E444D7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Long
                                                          • String ID: SysTreeView32
                                                          • API String ID: 847901565-1698111956
                                                          • Opcode ID: 558770956693d8c6695fb8ea3c75a84973d58b45f593e10e80d66dc1dae750f5
                                                          • Instruction ID: b5ecc79afa35c094ccd325dc99cdc6d63ff32be951d7b7f86c8487ca1f581946
                                                          • Opcode Fuzzy Hash: 558770956693d8c6695fb8ea3c75a84973d58b45f593e10e80d66dc1dae750f5
                                                          • Instruction Fuzzy Hash: 0531BE72200205AFDF219E38EC45BEA77A9EB08338F209315F979A31D0D774EC519B60
                                                          APIs
                                                          • SysReAllocString.OLEAUT32(?,?), ref: 00E16EED
                                                          • VariantCopyInd.OLEAUT32(?,?), ref: 00E16F08
                                                          • VariantClear.OLEAUT32(?), ref: 00E16F12
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$AllocClearCopyString
                                                          • String ID: *j
                                                          • API String ID: 2173805711-1845181700
                                                          • Opcode ID: 80d337fb06eeee2f3d91dbe0b80308e207c8e143089fa0059c56b31fa62c52a0
                                                          • Instruction ID: 625ad2f433602278edef4c0d438abfd82d78ac6363a8129fa3650681211fada4
                                                          • Opcode Fuzzy Hash: 80d337fb06eeee2f3d91dbe0b80308e207c8e143089fa0059c56b31fa62c52a0
                                                          • Instruction Fuzzy Hash: EE319E72704205DFCB04AFA4E8519FE77BAEF89314B1004A9F9036B2B1C7709993DBA0
                                                          APIs
                                                            • Part of subcall function 00E3335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00E33077,?,?), ref: 00E33378
                                                          • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00E3307A
                                                          • _wcslen.LIBCMT ref: 00E3309B
                                                          • htons.WSOCK32(00000000,?,?,00000000), ref: 00E33106
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                          • String ID: 255.255.255.255
                                                          • API String ID: 946324512-2422070025
                                                          • Opcode ID: f5dd2324c356417778b9f7f897e5a484f7203bd4db3c518ec7b3159f9a0930e3
                                                          • Instruction ID: 1cc015ca25ededf202e7498e94d7b687ea27aa575b02aefc0d6165e94e8defe9
                                                          • Opcode Fuzzy Hash: f5dd2324c356417778b9f7f897e5a484f7203bd4db3c518ec7b3159f9a0930e3
                                                          • Instruction Fuzzy Hash: AD31C439604201DFC724CF39C589EAABBF0EF54318F249059E916AB392DB31EE45CB60
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00E43F40
                                                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00E43F54
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00E43F78
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window
                                                          • String ID: SysMonthCal32
                                                          • API String ID: 2326795674-1439706946
                                                          • Opcode ID: 9570e536674f0242558bddcfd8abd4ced723d4a14422dea0de2529384192f793
                                                          • Instruction ID: 2d5ed3edf2238e59f7b52b01dbc8aa5c2d59d265fc7979a99262ca75cabe019c
                                                          • Opcode Fuzzy Hash: 9570e536674f0242558bddcfd8abd4ced723d4a14422dea0de2529384192f793
                                                          • Instruction Fuzzy Hash: 0E21BF32600219BFDF258F60DC46FEA3B79EF48718F111214FE157B1D0D6B1A8558BA0
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00E44705
                                                          • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00E44713
                                                          • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00E4471A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$DestroyWindow
                                                          • String ID: msctls_updown32
                                                          • API String ID: 4014797782-2298589950
                                                          • Opcode ID: 05e3b3b3f94b0a51e8fdb298298646abaff203937239d43388fc5d1ed806c330
                                                          • Instruction ID: cb0655e102da29a6a6022ba04e78c9a6b49acb2eb12dd771f09a8a4bbe8dede9
                                                          • Opcode Fuzzy Hash: 05e3b3b3f94b0a51e8fdb298298646abaff203937239d43388fc5d1ed806c330
                                                          • Instruction Fuzzy Hash: 48214FF5601209AFDB10DF65EC85DA637ADEB9A358B15105AFA04A7391CB70EC12CA70
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                          • API String ID: 176396367-2734436370
                                                          • Opcode ID: f1788aa11bdd235b02175b35605700790657ad10b3416b6bc03d35ac5f1e5179
                                                          • Instruction ID: fc7065339ec7005d0d44d87b47240fce07b42d5fa627fb0242a28da3593e51ea
                                                          • Opcode Fuzzy Hash: f1788aa11bdd235b02175b35605700790657ad10b3416b6bc03d35ac5f1e5179
                                                          • Instruction Fuzzy Hash: 7221387210421167D331AB249C22FF773D9EF91714F50502AF94AB7183EB51AD81D2B5
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00E43840
                                                          • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00E43850
                                                          • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00E43876
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$MoveWindow
                                                          • String ID: Listbox
                                                          • API String ID: 3315199576-2633736733
                                                          • Opcode ID: d63919278d91a4d403b6c2715909d429c503775a3dcfe95ba00d8088f0beec0d
                                                          • Instruction ID: 8722adb06d3c446396981d69c16228c9bd4fa38408cf6293922166a42c57dae7
                                                          • Opcode Fuzzy Hash: d63919278d91a4d403b6c2715909d429c503775a3dcfe95ba00d8088f0beec0d
                                                          • Instruction Fuzzy Hash: 4D21D172600218BFEF218F65EC85FBB3B6EEF89764F119125F944AB190C671DC5287A0
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 00E24A08
                                                          • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00E24A5C
                                                          • SetErrorMode.KERNEL32(00000000,?,?,00E4CC08), ref: 00E24AD0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$InformationVolume
                                                          • String ID: %lu
                                                          • API String ID: 2507767853-685833217
                                                          • Opcode ID: fddb776665402af838e5792686f7b2c0b8b068e5de124e139e961099d61ce7b3
                                                          • Instruction ID: cd84ed1b527b1c8fb063cd8cb631b7f6ebafe0e91d851305b5320691fc1cdaaf
                                                          • Opcode Fuzzy Hash: fddb776665402af838e5792686f7b2c0b8b068e5de124e139e961099d61ce7b3
                                                          • Instruction Fuzzy Hash: 4C314175A00119AFD710DF54C885EAABBF8EF05308F148095F509EB252D771ED45CB71
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00E4424F
                                                          • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00E44264
                                                          • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00E44271
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: msctls_trackbar32
                                                          • API String ID: 3850602802-1010561917
                                                          • Opcode ID: 66876a5753d69a2d6a3c5e41ed9f02b8d46278751f37f4ecf77fa9dd7bd35440
                                                          • Instruction ID: 84f5531995b34f00b07b20d35f884c03b7917b15fa004ce2cdc8e2721e036eca
                                                          • Opcode Fuzzy Hash: 66876a5753d69a2d6a3c5e41ed9f02b8d46278751f37f4ecf77fa9dd7bd35440
                                                          • Instruction Fuzzy Hash: 2211E371340208BEEF205E69DC06FAB3BACEF95B58F111524FA55F20E0D6B1D8119B24
                                                          APIs
                                                            • Part of subcall function 00DB6B57: _wcslen.LIBCMT ref: 00DB6B6A
                                                            • Part of subcall function 00E12DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00E12DC5
                                                            • Part of subcall function 00E12DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00E12DD6
                                                            • Part of subcall function 00E12DA7: GetCurrentThreadId.KERNEL32 ref: 00E12DDD
                                                            • Part of subcall function 00E12DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00E12DE4
                                                          • GetFocus.USER32 ref: 00E12F78
                                                            • Part of subcall function 00E12DEE: GetParent.USER32(00000000), ref: 00E12DF9
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 00E12FC3
                                                          • EnumChildWindows.USER32(?,00E1303B), ref: 00E12FEB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                          • String ID: %s%d
                                                          • API String ID: 1272988791-1110647743
                                                          • Opcode ID: d9e8b4fa21feec1be04c16cbd571db31307cb36e1c6e7d4a93150a4986834e31
                                                          • Instruction ID: 8616db984795e4d7010deebeb517d0f24755780faf70a04a1731d4bb5db9a90b
                                                          • Opcode Fuzzy Hash: d9e8b4fa21feec1be04c16cbd571db31307cb36e1c6e7d4a93150a4986834e31
                                                          • Instruction Fuzzy Hash: A311E475600205ABCF547F70DC95EED77AAEF98304F049079F90ABB152DE3099898B70
                                                          APIs
                                                          • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00E458C1
                                                          • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00E458EE
                                                          • DrawMenuBar.USER32(?), ref: 00E458FD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Menu$InfoItem$Draw
                                                          • String ID: 0
                                                          • API String ID: 3227129158-4108050209
                                                          • Opcode ID: 86327e98c05c5cfa6c3851f3fc194a1b371c3d0e1915ff9f1243a1a69cb940ad
                                                          • Instruction ID: e08589377b3356b5c429f956297025a0f08347712aad4be45dfa34ba89111012
                                                          • Opcode Fuzzy Hash: 86327e98c05c5cfa6c3851f3fc194a1b371c3d0e1915ff9f1243a1a69cb940ad
                                                          • Instruction Fuzzy Hash: 98016132501218EFDB619F11EC44BEEBBB9FB85764F108099F959E6152DB308A84DF31
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e8506484b407b9cdb89a3d837f65aca18599b70ecccd483be48757507df6112c
                                                          • Instruction ID: eb48ce270e1945889d66ed6f324da81e03d295a5a7973a4a0c54103faf77a78a
                                                          • Opcode Fuzzy Hash: e8506484b407b9cdb89a3d837f65aca18599b70ecccd483be48757507df6112c
                                                          • Instruction Fuzzy Hash: D9C15C75A0020AEFDB14CFA4C894AAEB7B5FF48704F209598E515EB251D771EEC1CB90
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: __alldvrm$_strrchr
                                                          • String ID:
                                                          • API String ID: 1036877536-0
                                                          • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                          • Instruction ID: 5ce5c5fb1e5d9ac39451172489125a379479f76370004ee5ad755e65958c5bff
                                                          • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                          • Instruction Fuzzy Hash: 88A13775D007C69FDB26EF1AC8917BEBBE4EF65350F1841ADE5859B281C2348981C770
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInitInitializeUninitialize
                                                          • String ID:
                                                          • API String ID: 1998397398-0
                                                          • Opcode ID: 81e550583a7e3ea93d933898aadf1c8c4f60e0064b7e590e92f6d67839974c1b
                                                          • Instruction ID: 4f358e6f799322ea30d87444b5c379af71cb305b47c0c42e583877cb22e74c19
                                                          • Opcode Fuzzy Hash: 81e550583a7e3ea93d933898aadf1c8c4f60e0064b7e590e92f6d67839974c1b
                                                          • Instruction Fuzzy Hash: 44A12975604200DFC710DF28C58AE6ABBE5FF88714F159859F98AAB362DB30ED05CB61
                                                          APIs
                                                          • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00E4FC08,?), ref: 00E105F0
                                                          • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00E4FC08,?), ref: 00E10608
                                                          • CLSIDFromProgID.OLE32(?,?,00000000,00E4CC40,000000FF,?,00000000,00000800,00000000,?,00E4FC08,?), ref: 00E1062D
                                                          • _memcmp.LIBVCRUNTIME ref: 00E1064E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: FromProg$FreeTask_memcmp
                                                          • String ID:
                                                          • API String ID: 314563124-0
                                                          • Opcode ID: 7b7fe62903b9c0398d166af6b47426901c77fa26ff3637ed83006e865c0fbb71
                                                          • Instruction ID: 30f56e7a178b5c4e09a4d722e200463342251911c22ef09294aae1297f006e25
                                                          • Opcode Fuzzy Hash: 7b7fe62903b9c0398d166af6b47426901c77fa26ff3637ed83006e865c0fbb71
                                                          • Instruction Fuzzy Hash: 95811A75A00109EFCB04DF94C984EEEB7BAFF89315F204558E516BB250DB71AE86CB60
                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 00E3A6AC
                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 00E3A6BA
                                                            • Part of subcall function 00DB9CB3: _wcslen.LIBCMT ref: 00DB9CBD
                                                          • Process32NextW.KERNEL32(00000000,?), ref: 00E3A79C
                                                          • CloseHandle.KERNEL32(00000000), ref: 00E3A7AB
                                                            • Part of subcall function 00DCCE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00DF3303,?), ref: 00DCCE8A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                          • String ID:
                                                          • API String ID: 1991900642-0
                                                          • Opcode ID: 1c59874c6223e66e0acca30cf211ed9d5c85f9af26e507f3003b87b86476ef3f
                                                          • Instruction ID: 61977fae7752a1acf3b2a4f847e7d80a6cbdc13d09bcaa7dddc474f4cfada788
                                                          • Opcode Fuzzy Hash: 1c59874c6223e66e0acca30cf211ed9d5c85f9af26e507f3003b87b86476ef3f
                                                          • Instruction Fuzzy Hash: 63513C75508301AFD714EF24C886E6BBBE8FF89754F44492DF586A7251EB30D904CBA2
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID:
                                                          • API String ID: 269201875-0
                                                          • Opcode ID: 30ea0ee5b84c064d03984c8741eae16e7b4e675b56b29a31da61b58783548250
                                                          • Instruction ID: 6cbbd232aea26fa5a292fb3b7486ed7b9a704a0c4bcb1630d19b16fa9bfc1358
                                                          • Opcode Fuzzy Hash: 30ea0ee5b84c064d03984c8741eae16e7b4e675b56b29a31da61b58783548250
                                                          • Instruction Fuzzy Hash: EA416D3950011CEBDB217BFE9C456BE3AE4EF81370F2AC226FA19D6392E63489415671
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 00E462E2
                                                          • ScreenToClient.USER32(?,?), ref: 00E46315
                                                          • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00E46382
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientMoveRectScreen
                                                          • String ID:
                                                          • API String ID: 3880355969-0
                                                          • Opcode ID: ab7684c14d1478ffbd94b25b09cd185cf813518a6906b1d49d218f2af305e790
                                                          • Instruction ID: da9b52442cac5539b7d39c234fc853c55de6c18e6b86a656563fa037cf6707b2
                                                          • Opcode Fuzzy Hash: ab7684c14d1478ffbd94b25b09cd185cf813518a6906b1d49d218f2af305e790
                                                          • Instruction Fuzzy Hash: 38515174A00249EFCF14DF69E8809AE7BB5FF96364F109259F815AB2A0D730ED41CB51
                                                          APIs
                                                          • socket.WSOCK32(00000002,00000002,00000011), ref: 00E31AFD
                                                          • WSAGetLastError.WSOCK32 ref: 00E31B0B
                                                          • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00E31B8A
                                                          • WSAGetLastError.WSOCK32 ref: 00E31B94
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$socket
                                                          • String ID:
                                                          • API String ID: 1881357543-0
                                                          • Opcode ID: 83c34ecdf45c9586220a6eb485cae851277f0376491647383e159ac25b14f959
                                                          • Instruction ID: cbf538c0d4eef2bb6c4af5978af3ef03e8db55acafb29acb94458c4d614f477b
                                                          • Opcode Fuzzy Hash: 83c34ecdf45c9586220a6eb485cae851277f0376491647383e159ac25b14f959
                                                          • Instruction Fuzzy Hash: 01417334640200AFE724AF24C88AF667BE5EB48718F54849CF5169F7D2D772DD42CBA0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1e4373f046f9fb0e88d79ac61c70582cf36cd71492b37e7bd8259dfe51176c04
                                                          • Instruction ID: 030b2f46d1a7e8d142b40ff8be7773f3b48b0aeea3df8e7722c5680ac21abe73
                                                          • Opcode Fuzzy Hash: 1e4373f046f9fb0e88d79ac61c70582cf36cd71492b37e7bd8259dfe51176c04
                                                          • Instruction Fuzzy Hash: 7A41F7B5A00744AFD724AF79CC41B6BBBA9EB84724F10852FF545DB2C1D771A90187B0
                                                          APIs
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00E25783
                                                          • GetLastError.KERNEL32(?,00000000), ref: 00E257A9
                                                          • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00E257CE
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00E257FA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateHardLink$DeleteErrorFileLast
                                                          • String ID:
                                                          • API String ID: 3321077145-0
                                                          • Opcode ID: 7df18f8f231cc3a5c5a1257615aff79aae1b30191c06b84072bb758f9b6a6c11
                                                          • Instruction ID: 614001f12b153a326e58f1f2837ea3b8c82cac146a2c46523b1747c7a3d50b03
                                                          • Opcode Fuzzy Hash: 7df18f8f231cc3a5c5a1257615aff79aae1b30191c06b84072bb758f9b6a6c11
                                                          • Instruction Fuzzy Hash: 77413E39600A10DFCB25DF15C545A5DBBF2EF89724B18C498E84A6B362CB74FD41CBA1
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,00DD6D71,00000000,00000000,00DD82D9,?,00DD82D9,?,00000001,00DD6D71,8BE85006,00000001,00DD82D9,00DD82D9), ref: 00DED910
                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00DED999
                                                          • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00DED9AB
                                                          • __freea.LIBCMT ref: 00DED9B4
                                                            • Part of subcall function 00DE3820: RtlAllocateHeap.NTDLL(00000000,?,00E81444,?,00DCFDF5,?,?,00DBA976,00000010,00E81440,00DB13FC,?,00DB13C6,?,00DB1129), ref: 00DE3852
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                          • String ID:
                                                          • API String ID: 2652629310-0
                                                          • Opcode ID: 64ea64644e67068bb9077e1e23184b67c1c9746c26fa49664a05d38f9afa6e6b
                                                          • Instruction ID: 37b64c3465f299681d89f07f3692865b87fb1217df864c8f8a993c8c05a97f9e
                                                          • Opcode Fuzzy Hash: 64ea64644e67068bb9077e1e23184b67c1c9746c26fa49664a05d38f9afa6e6b
                                                          • Instruction Fuzzy Hash: E731CE72A0024AABDB24AF66DC45EAE7BA6EB41310B194169FC04D7251EB35CD54CBB0
                                                          APIs
                                                          • SendMessageW.USER32(?,00001024,00000000,?), ref: 00E45352
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00E45375
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00E45382
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00E453A8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: LongWindow$InvalidateMessageRectSend
                                                          • String ID:
                                                          • API String ID: 3340791633-0
                                                          • Opcode ID: bc76e6eec40008b69fc77259cf003d7a91ed411b311efa5416ea0bd3bfad0b61
                                                          • Instruction ID: 98ff726cb69f8b3d528143cde6926907ee5a20735d98a636b20cc6aa28b08579
                                                          • Opcode Fuzzy Hash: bc76e6eec40008b69fc77259cf003d7a91ed411b311efa5416ea0bd3bfad0b61
                                                          • Instruction Fuzzy Hash: 4331E336A55A0CEFEF309F14EC05FE837A5AB05394F586141FA10B61E6C7B49D40DB52
                                                          APIs
                                                          • GetKeyboardState.USER32(?,7694C0D0,?,00008000), ref: 00E1ABF1
                                                          • SetKeyboardState.USER32(00000080,?,00008000), ref: 00E1AC0D
                                                          • PostMessageW.USER32(00000000,00000101,00000000), ref: 00E1AC74
                                                          • SendInput.USER32(00000001,?,0000001C,7694C0D0,?,00008000), ref: 00E1ACC6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: c56c661c8a8fcdd3778ea082f0e904e4ded8cd3903cf8c81d88428989b856bf7
                                                          • Instruction ID: 204f0d1ce3cc06a8e53adb19656749ebcf3cf74779172dda140b32f563d41f3f
                                                          • Opcode Fuzzy Hash: c56c661c8a8fcdd3778ea082f0e904e4ded8cd3903cf8c81d88428989b856bf7
                                                          • Instruction Fuzzy Hash: 3F310630A01718AFEF35CB658C047FAFBA5AB89314F1C622AE495B32D1D37589C587D2
                                                          APIs
                                                          • ClientToScreen.USER32(?,?), ref: 00E4769A
                                                          • GetWindowRect.USER32(?,?), ref: 00E47710
                                                          • PtInRect.USER32(?,?,00E48B89), ref: 00E47720
                                                          • MessageBeep.USER32(00000000), ref: 00E4778C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Rect$BeepClientMessageScreenWindow
                                                          • String ID:
                                                          • API String ID: 1352109105-0
                                                          • Opcode ID: 94fb6248bec559a69ec3689ca8313138668c2a10c029b64397f020ad14b51b27
                                                          • Instruction ID: 8323fa957a4c39793886403ddf82a66e91cafb8a3df1da6eeca75ee23e4ab9fb
                                                          • Opcode Fuzzy Hash: 94fb6248bec559a69ec3689ca8313138668c2a10c029b64397f020ad14b51b27
                                                          • Instruction Fuzzy Hash: A141BE38A05214DFCB11CF59E888EA977F9BF89315F5550AAE494AB260C330A946CBD0
                                                          APIs
                                                          • GetForegroundWindow.USER32 ref: 00E416EB
                                                            • Part of subcall function 00E13A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00E13A57
                                                            • Part of subcall function 00E13A3D: GetCurrentThreadId.KERNEL32 ref: 00E13A5E
                                                            • Part of subcall function 00E13A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00E125B3), ref: 00E13A65
                                                          • GetCaretPos.USER32(?), ref: 00E416FF
                                                          • ClientToScreen.USER32(00000000,?), ref: 00E4174C
                                                          • GetForegroundWindow.USER32 ref: 00E41752
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                          • String ID:
                                                          • API String ID: 2759813231-0
                                                          • Opcode ID: 972524caaeb625919af5bcef468fcffbfc79d12b5c3aaa40b63a1a2bbbeb1021
                                                          • Instruction ID: 140f390389c72c0371d5721eaacd823766eb5aaac658b120355711f32c1605ec
                                                          • Opcode Fuzzy Hash: 972524caaeb625919af5bcef468fcffbfc79d12b5c3aaa40b63a1a2bbbeb1021
                                                          • Instruction Fuzzy Hash: DC313E75D01149AFCB00EFAAD8858EEB7F9EF89304B5480AAE416E7211D635DE45CBA0
                                                          APIs
                                                            • Part of subcall function 00DB7620: _wcslen.LIBCMT ref: 00DB7625
                                                          • _wcslen.LIBCMT ref: 00E1DFCB
                                                          • _wcslen.LIBCMT ref: 00E1DFE2
                                                          • _wcslen.LIBCMT ref: 00E1E00D
                                                          • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00E1E018
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$ExtentPoint32Text
                                                          • String ID:
                                                          • API String ID: 3763101759-0
                                                          • Opcode ID: 3e4cf4e03e07def897c4161a579ea1bdf5ac5f92e6d88361c55dafcaeb3fead9
                                                          • Instruction ID: ccbda678657e5e49eec62a6c27cc2b04a60712e7338ce8c61fac246c5121e6af
                                                          • Opcode Fuzzy Hash: 3e4cf4e03e07def897c4161a579ea1bdf5ac5f92e6d88361c55dafcaeb3fead9
                                                          • Instruction Fuzzy Hash: 1A218175900214EFCB209FA8D981BAEB7F8EF49760F144069F805BB345D6709E418BB1
                                                          APIs
                                                            • Part of subcall function 00DC9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DC9BB2
                                                          • GetCursorPos.USER32(?), ref: 00E49001
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00E07711,?,?,?,?,?), ref: 00E49016
                                                          • GetCursorPos.USER32(?), ref: 00E4905E
                                                          • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00E07711,?,?,?), ref: 00E49094
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                          • String ID:
                                                          • API String ID: 2864067406-0
                                                          • Opcode ID: cd85552aeff0ffdeea7e0d3d7098b1c4685ca3c8e45122fe447230db7eddfa1c
                                                          • Instruction ID: e7ded9e6a3cd7f33c68d71e5402c566157b791f130ab8b28062ae318f13a4af2
                                                          • Opcode Fuzzy Hash: cd85552aeff0ffdeea7e0d3d7098b1c4685ca3c8e45122fe447230db7eddfa1c
                                                          • Instruction Fuzzy Hash: 5C21EF35600008EFCB25CF95D858EEB7BB9EB8A310F104099F905772A2C775AD91DB60
                                                          APIs
                                                          • GetFileAttributesW.KERNEL32(?,00E4CB68), ref: 00E1D2FB
                                                          • GetLastError.KERNEL32 ref: 00E1D30A
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00E1D319
                                                          • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00E4CB68), ref: 00E1D376
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateDirectory$AttributesErrorFileLast
                                                          • String ID:
                                                          • API String ID: 2267087916-0
                                                          • Opcode ID: 8fdbfca1a8bcb9560079cadbea75af58042ead86966f60bba18358788c3ee6d9
                                                          • Instruction ID: f7529fae6e231675377ddd2f7e2b5cf4282a8d4377645e393a5651143e3cb739
                                                          • Opcode Fuzzy Hash: 8fdbfca1a8bcb9560079cadbea75af58042ead86966f60bba18358788c3ee6d9
                                                          • Instruction Fuzzy Hash: 8D218074509601DF8710DF24D8814EEB7E4EF56328F205A1DF4AAE32A1D730D98ACBA3
                                                          APIs
                                                            • Part of subcall function 00E11014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00E1102A
                                                            • Part of subcall function 00E11014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00E11036
                                                            • Part of subcall function 00E11014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00E11045
                                                            • Part of subcall function 00E11014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00E1104C
                                                            • Part of subcall function 00E11014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00E11062
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00E115BE
                                                          • _memcmp.LIBVCRUNTIME ref: 00E115E1
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E11617
                                                          • HeapFree.KERNEL32(00000000), ref: 00E1161E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                          • String ID:
                                                          • API String ID: 1592001646-0
                                                          • Opcode ID: 4913d2551161fa39b6016c34d39213361b8dadbba2450a3ee9c52094e4149dec
                                                          • Instruction ID: 17b3dd41fb9f07a507bc96c6ed1a874ac1b3e4a1a73aecea80ba2226a2b00037
                                                          • Opcode Fuzzy Hash: 4913d2551161fa39b6016c34d39213361b8dadbba2450a3ee9c52094e4149dec
                                                          • Instruction Fuzzy Hash: F221AC31E01108EFDF00DFA4C945BEEB7B9EF84348F184499E541BB241E731AA89CBA0
                                                          APIs
                                                          • GetWindowLongW.USER32(?,000000EC), ref: 00E4280A
                                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00E42824
                                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00E42832
                                                          • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00E42840
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Long$AttributesLayered
                                                          • String ID:
                                                          • API String ID: 2169480361-0
                                                          • Opcode ID: 72272568172ae261002beb34bfacd4c9744e3833fd971ecad6ffc18233b49655
                                                          • Instruction ID: 6a31f51649867c665e9cc0539948d8d9761356e1caec4c95ac8ff2bec2bc70ea
                                                          • Opcode Fuzzy Hash: 72272568172ae261002beb34bfacd4c9744e3833fd971ecad6ffc18233b49655
                                                          • Instruction Fuzzy Hash: 79210335205110AFD7149B25D844FAA7B99EF8A324F24815DF5269B2E2CB75FC42CBA0
                                                          APIs
                                                            • Part of subcall function 00E18D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00E1790A,?,000000FF,?,00E18754,00000000,?,0000001C,?,?), ref: 00E18D8C
                                                            • Part of subcall function 00E18D7D: lstrcpyW.KERNEL32(00000000,?,?,00E1790A,?,000000FF,?,00E18754,00000000,?,0000001C,?,?,00000000), ref: 00E18DB2
                                                            • Part of subcall function 00E18D7D: lstrcmpiW.KERNEL32(00000000,?,00E1790A,?,000000FF,?,00E18754,00000000,?,0000001C,?,?), ref: 00E18DE3
                                                          • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00E18754,00000000,?,0000001C,?,?,00000000), ref: 00E17923
                                                          • lstrcpyW.KERNEL32(00000000,?,?,00E18754,00000000,?,0000001C,?,?,00000000), ref: 00E17949
                                                          • lstrcmpiW.KERNEL32(00000002,cdecl,?,00E18754,00000000,?,0000001C,?,?,00000000), ref: 00E17984
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: lstrcmpilstrcpylstrlen
                                                          • String ID: cdecl
                                                          • API String ID: 4031866154-3896280584
                                                          • Opcode ID: ee102213f2697e16e8a9d551f2655238e537545bd9ce2bf290043e91a50c0e3a
                                                          • Instruction ID: 6e56f6b028142420da3d2f4c1e67e1b6912397d35431327adc4f98db4791ed06
                                                          • Opcode Fuzzy Hash: ee102213f2697e16e8a9d551f2655238e537545bd9ce2bf290043e91a50c0e3a
                                                          • Instruction Fuzzy Hash: 0911263A201302AFCB159F35D844EBA77F9FF85754B10902AF986D73A4EB319845C7A1
                                                          APIs
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00E47D0B
                                                          • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00E47D2A
                                                          • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00E47D42
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00E2B7AD,00000000), ref: 00E47D6B
                                                            • Part of subcall function 00DC9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DC9BB2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$Long
                                                          • String ID:
                                                          • API String ID: 847901565-0
                                                          • Opcode ID: 314509657ff816fbee4056c37f147c2e904a3a0507ee3c36c59af7e1a768c7bb
                                                          • Instruction ID: d7070b8b8f9059d2316638cec8c238066ee82a8d2b5bfccb186b4b96bac80e18
                                                          • Opcode Fuzzy Hash: 314509657ff816fbee4056c37f147c2e904a3a0507ee3c36c59af7e1a768c7bb
                                                          • Instruction Fuzzy Hash: AF11E431615615AFCB109F29DC04EAA3BA9FF86364B219364F879E72F0D7308D55CB90
                                                          APIs
                                                          • SendMessageW.USER32(?,00001060,?,00000004), ref: 00E456BB
                                                          • _wcslen.LIBCMT ref: 00E456CD
                                                          • _wcslen.LIBCMT ref: 00E456D8
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00E45816
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend_wcslen
                                                          • String ID:
                                                          • API String ID: 455545452-0
                                                          • Opcode ID: 0b1352b89951abaa812d3996e61a11c182b3a0dc968fcf066e0500db3dc9ce78
                                                          • Instruction ID: 4cbb6a6545e037b860ec1870b27323c9798b7f470648e50008eac90f7d2445c7
                                                          • Opcode Fuzzy Hash: 0b1352b89951abaa812d3996e61a11c182b3a0dc968fcf066e0500db3dc9ce78
                                                          • Instruction Fuzzy Hash: DF11D676600604A7DB209F62EC85AFE77ACEF11764B10506AF916F6182E770D984CF60
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 506066023de3252953641cf24e421c0f0217669a26af11fd6e56c1a61c4c1bec
                                                          • Instruction ID: 3db9d7ae4cead544bdc21047c4eaf77a83c33c28b396a30b18837b76c35401d0
                                                          • Opcode Fuzzy Hash: 506066023de3252953641cf24e421c0f0217669a26af11fd6e56c1a61c4c1bec
                                                          • Instruction Fuzzy Hash: E401D6B630669A3EF611367A6CC1F27661DDF813B8F391325F521621D2DB71CC014170
                                                          APIs
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00E11A47
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00E11A59
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00E11A6F
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00E11A8A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID:
                                                          • API String ID: 3850602802-0
                                                          • Opcode ID: 68ad2c296d9c12ba648d04d550d896754aed057a6561861189ed86ac80392033
                                                          • Instruction ID: 341f73c2aa8baae89b0bb678dc523c57b3eb99f45e6179183fb40c86ac4ba6af
                                                          • Opcode Fuzzy Hash: 68ad2c296d9c12ba648d04d550d896754aed057a6561861189ed86ac80392033
                                                          • Instruction Fuzzy Hash: 3111273A901219FFEB109BA5C985FEDBB78EF08750F200091EA01B7290D6716E50DB94
                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 00E1E1FD
                                                          • MessageBoxW.USER32(?,?,?,?), ref: 00E1E230
                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00E1E246
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00E1E24D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                          • String ID:
                                                          • API String ID: 2880819207-0
                                                          • Opcode ID: 7d03e14545f3410b0b31be0bd2ee3b5235961508aa4a6f0083caa92c9940751b
                                                          • Instruction ID: a42ec915a2eada906ecea3c5e13b088356d0b4ce77c94e1d2446ec4ae2495e5b
                                                          • Opcode Fuzzy Hash: 7d03e14545f3410b0b31be0bd2ee3b5235961508aa4a6f0083caa92c9940751b
                                                          • Instruction Fuzzy Hash: 91110876A05254BFC7019FA99C09ADE7FACAB46314F104255FC24F3391D2B0CD0987B0
                                                          APIs
                                                          • CreateThread.KERNEL32(00000000,?,00DDCFF9,00000000,00000004,00000000), ref: 00DDD218
                                                          • GetLastError.KERNEL32 ref: 00DDD224
                                                          • __dosmaperr.LIBCMT ref: 00DDD22B
                                                          • ResumeThread.KERNEL32(00000000), ref: 00DDD249
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                          • String ID:
                                                          • API String ID: 173952441-0
                                                          • Opcode ID: ae67601bdf45e9ad4edd1978d1a8d04b91ebb2176902d6515f7acc0cd4cbf724
                                                          • Instruction ID: 03cc1e8d813d871f2ff4848b77755a0962658f1217aad5da30e4e36ae5b66fe2
                                                          • Opcode Fuzzy Hash: ae67601bdf45e9ad4edd1978d1a8d04b91ebb2176902d6515f7acc0cd4cbf724
                                                          • Instruction Fuzzy Hash: 8D01D6364062047FCF116BA6DC05BAE7E6EDF82730F24021AF925963D0CB71C905C6B0
                                                          APIs
                                                            • Part of subcall function 00DC9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DC9BB2
                                                          • GetClientRect.USER32(?,?), ref: 00E49F31
                                                          • GetCursorPos.USER32(?), ref: 00E49F3B
                                                          • ScreenToClient.USER32(?,?), ref: 00E49F46
                                                          • DefDlgProcW.USER32(?,00000020,?,00000000,?,?,?), ref: 00E49F7A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Client$CursorLongProcRectScreenWindow
                                                          • String ID:
                                                          • API String ID: 4127811313-0
                                                          • Opcode ID: de762b100fd293b16eda9e801301c932823fdd1ef0321d2f87dcb9045ff67a21
                                                          • Instruction ID: ea3fc54e42c31ca364238e4167ba84e860ead22aeb21cbf39b180a55fabd9dc1
                                                          • Opcode Fuzzy Hash: de762b100fd293b16eda9e801301c932823fdd1ef0321d2f87dcb9045ff67a21
                                                          • Instruction Fuzzy Hash: 58112835A0111AABDB00DF69E8499FE77B9FB45311F100455F911F3141D734BA8ACBA1
                                                          APIs
                                                          • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00DB604C
                                                          • GetStockObject.GDI32(00000011), ref: 00DB6060
                                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 00DB606A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: CreateMessageObjectSendStockWindow
                                                          • String ID:
                                                          • API String ID: 3970641297-0
                                                          • Opcode ID: 53cf2623619fad444a1803dd763f92a69852f720b1b95d764a8f95b5b071905f
                                                          • Instruction ID: 5e9cfd090be9ca855b3df202aa937de8e8556f32d8262167af315db9bc20d663
                                                          • Opcode Fuzzy Hash: 53cf2623619fad444a1803dd763f92a69852f720b1b95d764a8f95b5b071905f
                                                          • Instruction Fuzzy Hash: E111AD72102508FFEF125FA68C44EFABB69EF093A4F140206FA0562120D736DC61DBA0
                                                          APIs
                                                          • ___BuildCatchObject.LIBVCRUNTIME ref: 00DD3B56
                                                            • Part of subcall function 00DD3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00DD3AD2
                                                            • Part of subcall function 00DD3AA3: ___AdjustPointer.LIBCMT ref: 00DD3AED
                                                          • _UnwindNestedFrames.LIBCMT ref: 00DD3B6B
                                                          • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00DD3B7C
                                                          • CallCatchBlock.LIBVCRUNTIME ref: 00DD3BA4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                          • String ID:
                                                          • API String ID: 737400349-0
                                                          • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                          • Instruction ID: 0869d9fca388c8d365ab2a13db658603661ff216cbefe9442566fda3ed758c5a
                                                          • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                          • Instruction Fuzzy Hash: D101E932100149BBDF125F95CC46EEB7F69EF58794F05401AFE4856221C732E961EBB1
                                                          APIs
                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00DB13C6,00000000,00000000,?,00DE301A,00DB13C6,00000000,00000000,00000000,?,00DE328B,00000006,FlsSetValue), ref: 00DE30A5
                                                          • GetLastError.KERNEL32(?,00DE301A,00DB13C6,00000000,00000000,00000000,?,00DE328B,00000006,FlsSetValue,00E52290,FlsSetValue,00000000,00000364,?,00DE2E46), ref: 00DE30B1
                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00DE301A,00DB13C6,00000000,00000000,00000000,?,00DE328B,00000006,FlsSetValue,00E52290,FlsSetValue,00000000), ref: 00DE30BF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: LibraryLoad$ErrorLast
                                                          • String ID:
                                                          • API String ID: 3177248105-0
                                                          • Opcode ID: 13737b7371ca65b3a53f9cd6420b1b47db1beb5c4dc77f1f69a2ef592c029c13
                                                          • Instruction ID: 1d828a69a73f3948eca18f0a8d08636ddbe131f35f29577bd783b4d00249ed33
                                                          • Opcode Fuzzy Hash: 13737b7371ca65b3a53f9cd6420b1b47db1beb5c4dc77f1f69a2ef592c029c13
                                                          • Instruction Fuzzy Hash: F701F736302662AFCB319F7B9C48A777B98AF46BA1B240620F905F3190C721D946C7F0
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 00E1747F
                                                          • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00E17497
                                                          • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00E174AC
                                                          • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00E174CA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Type$Register$FileLoadModuleNameUser
                                                          • String ID:
                                                          • API String ID: 1352324309-0
                                                          • Opcode ID: 747222c71d996e4ffba9aeed5d799b9f1939e4e20c111f932793fdbfe5128cc4
                                                          • Instruction ID: c0ad5d2b318b3545bb70dbb06097c45d98a4a9d4f26ee6c0f18e8955fdf11c83
                                                          • Opcode Fuzzy Hash: 747222c71d996e4ffba9aeed5d799b9f1939e4e20c111f932793fdbfe5128cc4
                                                          • Instruction Fuzzy Hash: D111A1B52063109FE7208F14DD08BD27FFCEB00B04F108569A6A6E7151D770E988DB50
                                                          APIs
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00E1ACD3,?,00008000), ref: 00E1B0C4
                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00E1ACD3,?,00008000), ref: 00E1B0E9
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00E1ACD3,?,00008000), ref: 00E1B0F3
                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00E1ACD3,?,00008000), ref: 00E1B126
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: CounterPerformanceQuerySleep
                                                          • String ID:
                                                          • API String ID: 2875609808-0
                                                          • Opcode ID: 956178bacc7303ec7a9dbce7a919265175d372eeb44ad77f88d47176add8d0bb
                                                          • Instruction ID: cc73c06e93a247da05dc81b6edfa888c6d530de5114485d18653126612611367
                                                          • Opcode Fuzzy Hash: 956178bacc7303ec7a9dbce7a919265175d372eeb44ad77f88d47176add8d0bb
                                                          • Instruction Fuzzy Hash: FF116D31D0352DEBCF04AFE5E968AEEBB78FF0A711F215085D951B3281CB3056958B61
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 00E47E33
                                                          • ScreenToClient.USER32(?,?), ref: 00E47E4B
                                                          • ScreenToClient.USER32(?,?), ref: 00E47E6F
                                                          • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00E47E8A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ClientRectScreen$InvalidateWindow
                                                          • String ID:
                                                          • API String ID: 357397906-0
                                                          • Opcode ID: 35f3a7dd725a1dbba4a4db0339e073372f8c858b929868699105621416129b62
                                                          • Instruction ID: 9222930cdb59b772098de657b333f3625fcd9642768a0ddcfeeba42414459c31
                                                          • Opcode Fuzzy Hash: 35f3a7dd725a1dbba4a4db0339e073372f8c858b929868699105621416129b62
                                                          • Instruction Fuzzy Hash: 711186B9D0020AAFDB41CFA9C8849EEBBF5FF09310F109066E911E3210D735AA55CF90
                                                          APIs
                                                          • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00E12DC5
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 00E12DD6
                                                          • GetCurrentThreadId.KERNEL32 ref: 00E12DDD
                                                          • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00E12DE4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                          • String ID:
                                                          • API String ID: 2710830443-0
                                                          • Opcode ID: 59308525d40e1132e6272fc5c2741718f615f4a665a433b0bab5ac480c6e60d0
                                                          • Instruction ID: a292a061bf5317e326f642b8f5219e55e1c1c3bb457b9ddc9f72edeb91a8db01
                                                          • Opcode Fuzzy Hash: 59308525d40e1132e6272fc5c2741718f615f4a665a433b0bab5ac480c6e60d0
                                                          • Instruction Fuzzy Hash: F7E065755022247BD7201763EC0DEE73E6CEB43F61F115059B206F20809A908485C6B0
                                                          APIs
                                                            • Part of subcall function 00DC9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00DC9693
                                                            • Part of subcall function 00DC9639: SelectObject.GDI32(?,00000000), ref: 00DC96A2
                                                            • Part of subcall function 00DC9639: BeginPath.GDI32(?), ref: 00DC96B9
                                                            • Part of subcall function 00DC9639: SelectObject.GDI32(?,00000000), ref: 00DC96E2
                                                          • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00E48887
                                                          • LineTo.GDI32(?,?,?), ref: 00E48894
                                                          • EndPath.GDI32(?), ref: 00E488A4
                                                          • StrokePath.GDI32(?), ref: 00E488B2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                          • String ID:
                                                          • API String ID: 1539411459-0
                                                          • Opcode ID: 96ac65829569091d4b4db96202ff1f8fb39862b49ccd500a407f33e4109fe239
                                                          • Instruction ID: 8b3f868b177c28eea3da98b8c567e29062dd46036cca9bd62e86d01418e084fa
                                                          • Opcode Fuzzy Hash: 96ac65829569091d4b4db96202ff1f8fb39862b49ccd500a407f33e4109fe239
                                                          • Instruction Fuzzy Hash: BBF03A3A042259BADB125F96AC09FCE3A69AF0A310F548140FA11760E2C7755516CBA9
                                                          APIs
                                                          • GetSysColor.USER32(00000008), ref: 00DC98CC
                                                          • SetTextColor.GDI32(?,?), ref: 00DC98D6
                                                          • SetBkMode.GDI32(?,00000001), ref: 00DC98E9
                                                          • GetStockObject.GDI32(00000005), ref: 00DC98F1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Color$ModeObjectStockText
                                                          • String ID:
                                                          • API String ID: 4037423528-0
                                                          • Opcode ID: 506d7fe62de18e8a512e3142b8ac36f2c7980e5e5f27bc6b3f827460f3ba891b
                                                          • Instruction ID: 0ff7eaf1ee3523a81a6839cc2ad1ebe432ad6dc57fae6475b6ca81ce76ed0e78
                                                          • Opcode Fuzzy Hash: 506d7fe62de18e8a512e3142b8ac36f2c7980e5e5f27bc6b3f827460f3ba891b
                                                          • Instruction Fuzzy Hash: 00E0E535641280AEDB200B35AC08BD83F20AB02336F148219F6F9750E1C77156458B10
                                                          APIs
                                                          • GetCurrentThread.KERNEL32 ref: 00E11634
                                                          • OpenThreadToken.ADVAPI32(00000000,?,?,?,00E111D9), ref: 00E1163B
                                                          • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00E111D9), ref: 00E11648
                                                          • OpenProcessToken.ADVAPI32(00000000,?,?,?,00E111D9), ref: 00E1164F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: CurrentOpenProcessThreadToken
                                                          • String ID:
                                                          • API String ID: 3974789173-0
                                                          • Opcode ID: 39ec5a02183fc9ba74c4f2701724ecbc0f1836931c4917665143b866a6651cba
                                                          • Instruction ID: bf86192289f8e50d7b4d11f6075293f670e8323af8bd37702b0abf56b28a02b6
                                                          • Opcode Fuzzy Hash: 39ec5a02183fc9ba74c4f2701724ecbc0f1836931c4917665143b866a6651cba
                                                          • Instruction Fuzzy Hash: C2E08675603211DFD7B01FE29D0DB863B7CAF467D5F244848F345EA090E674448ACB54
                                                          APIs
                                                          • GetDesktopWindow.USER32 ref: 00E0D858
                                                          • GetDC.USER32(00000000), ref: 00E0D862
                                                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00E0D882
                                                          • ReleaseDC.USER32(?), ref: 00E0D8A3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: CapsDesktopDeviceReleaseWindow
                                                          • String ID:
                                                          • API String ID: 2889604237-0
                                                          • Opcode ID: 47f2376b187d6041442f0ed2352bb324fb0bf30396f10db8c0de025d1866a6be
                                                          • Instruction ID: 811acd6f4c60bcf78ca72a01c2576971a5bc2cae4dda28939a39b9e92512dfbf
                                                          • Opcode Fuzzy Hash: 47f2376b187d6041442f0ed2352bb324fb0bf30396f10db8c0de025d1866a6be
                                                          • Instruction Fuzzy Hash: 3DE01AB8801205DFCB819FA1D808A6DBBB2FB09710F21D099F846F7260C7388946AF60
                                                          APIs
                                                          • GetDesktopWindow.USER32 ref: 00E0D86C
                                                          • GetDC.USER32(00000000), ref: 00E0D876
                                                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00E0D882
                                                          • ReleaseDC.USER32(?), ref: 00E0D8A3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: CapsDesktopDeviceReleaseWindow
                                                          • String ID:
                                                          • API String ID: 2889604237-0
                                                          • Opcode ID: 4cbee53ce4bcb816767b6e4dd723f40388d0ff547091ce5c80d446cce0266f90
                                                          • Instruction ID: ca542c0b297fe76e163bbb667db69e71902f8c98e4a99e8b47b07494f4dc94e4
                                                          • Opcode Fuzzy Hash: 4cbee53ce4bcb816767b6e4dd723f40388d0ff547091ce5c80d446cce0266f90
                                                          • Instruction Fuzzy Hash: 7CE01A78801200DFCB909FA1D80866DBBB1FB08710B219088F846F7260C7385906AF50
                                                          APIs
                                                            • Part of subcall function 00DB7620: _wcslen.LIBCMT ref: 00DB7625
                                                          • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00E24ED4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Connection_wcslen
                                                          • String ID: *$LPT
                                                          • API String ID: 1725874428-3443410124
                                                          • Opcode ID: 15cc2a872092c390c1b3ebe1963057fc1dbbebb29ab1a1b817cca6f98699d775
                                                          • Instruction ID: a897c6d32ba00170cb0f0309897620e58ad7df325903ea7507edf82b42f36cc5
                                                          • Opcode Fuzzy Hash: 15cc2a872092c390c1b3ebe1963057fc1dbbebb29ab1a1b817cca6f98699d775
                                                          • Instruction Fuzzy Hash: 15914DB5A00214DFDB14DF54D584EA9BBF5EF84308F199099E40AAF3A2C731ED85CBA1
                                                          APIs
                                                          • CharUpperBuffW.USER32(00E0569E,00000000,?,00E4CC08,?,00000000,00000000), ref: 00E378DD
                                                            • Part of subcall function 00DB6B57: _wcslen.LIBCMT ref: 00DB6B6A
                                                          • CharUpperBuffW.USER32(00E0569E,00000000,?,00E4CC08,00000000,?,00000000,00000000), ref: 00E3783B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper$_wcslen
                                                          • String ID: <s
                                                          • API String ID: 3544283678-2940880691
                                                          • Opcode ID: 0c116f4e0d8eabac0bd4948c2e65aaf1e34476a43295de1a49c6284ee7129d4d
                                                          • Instruction ID: 52f805f0b572a3c8dd258bfbcc63461093d20dd6b980c272635ea514c65f01f3
                                                          • Opcode Fuzzy Hash: 0c116f4e0d8eabac0bd4948c2e65aaf1e34476a43295de1a49c6284ee7129d4d
                                                          • Instruction Fuzzy Hash: 8D6147B6914228EACF14EBA4CC959FDB7B8FF14704F545129E583B3191EF24AA05CBB0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: #
                                                          • API String ID: 0-1885708031
                                                          • Opcode ID: 894642ba82d81ad56c61a913298d53043f74461bd765830bb8c70a09a2839809
                                                          • Instruction ID: 4ac14fd05ab5b5812a640104bace81ccf8b0cad530eaa8856ed001b2689f2b97
                                                          • Opcode Fuzzy Hash: 894642ba82d81ad56c61a913298d53043f74461bd765830bb8c70a09a2839809
                                                          • Instruction Fuzzy Hash: 05512375504246DFDB19DF68C081BFABBA4EF15314F28846AE891AB3C0D630DD82CBB0
                                                          APIs
                                                          • Sleep.KERNEL32(00000000), ref: 00DCF2A2
                                                          • GlobalMemoryStatusEx.KERNEL32(?), ref: 00DCF2BB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: GlobalMemorySleepStatus
                                                          • String ID: @
                                                          • API String ID: 2783356886-2766056989
                                                          • Opcode ID: 2cde764ab55ff13aa2eb68f588eed0b3dfaf53f56703a60965074984eb24b5da
                                                          • Instruction ID: c2f9ed4c3a265257ccfccb217f893a0b43ae24eb0dd29d508be22234d56b07d6
                                                          • Opcode Fuzzy Hash: 2cde764ab55ff13aa2eb68f588eed0b3dfaf53f56703a60965074984eb24b5da
                                                          • Instruction Fuzzy Hash: 4A5127714187449FD320AF11E886BABBBF8FFC4340F81885DF19A911A5EB708569CB76
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 00E357E0
                                                          • _wcslen.LIBCMT ref: 00E357EC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper_wcslen
                                                          • String ID: CALLARGARRAY
                                                          • API String ID: 157775604-1150593374
                                                          • Opcode ID: f767b9539634b283f70da7eef389fcbfbbc2577282e96d54f6c93cd6c50ba9cb
                                                          • Instruction ID: 3be81cf9f19609e6182678448d1cf3b628c7ffaea01eb7b0597956f590ee3755
                                                          • Opcode Fuzzy Hash: f767b9539634b283f70da7eef389fcbfbbc2577282e96d54f6c93cd6c50ba9cb
                                                          • Instruction Fuzzy Hash: BB415F72A002099FCB18DFA9C8869EEBBF5EF59314F24506DE505B7351E7319D81CBA0
                                                          APIs
                                                          • _wcslen.LIBCMT ref: 00E2D130
                                                          • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00E2D13A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: CrackInternet_wcslen
                                                          • String ID: |
                                                          • API String ID: 596671847-2343686810
                                                          • Opcode ID: dc1e0fa8d4c77fd8052c3298f4d69b2cbc3f662baa8ce5415313358c603a20ba
                                                          • Instruction ID: 8761066def7c9b2f5cdc45c4b2e6cab1d1ac0d6a61d732a8f5438c1ad6f959cd
                                                          • Opcode Fuzzy Hash: dc1e0fa8d4c77fd8052c3298f4d69b2cbc3f662baa8ce5415313358c603a20ba
                                                          • Instruction Fuzzy Hash: 4C313975D01219EBCF11EFA4DC85AEEBFB9FF04304F104019F915A61A6EB35AA16CB60
                                                          APIs
                                                          • DestroyWindow.USER32(?,?,?,?), ref: 00E43621
                                                          • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00E4365C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$DestroyMove
                                                          • String ID: static
                                                          • API String ID: 2139405536-2160076837
                                                          • Opcode ID: 1662648c2d8a8b04e1dc3ffd8c3ccf41243f820f62d8df44aab8191fec523212
                                                          • Instruction ID: 44798eaab123562144b21a1c3327d9bf3418430e68384a21c3d6a4508a2954c5
                                                          • Opcode Fuzzy Hash: 1662648c2d8a8b04e1dc3ffd8c3ccf41243f820f62d8df44aab8191fec523212
                                                          • Instruction Fuzzy Hash: D7319071110204AEDB24DF38EC41EFB73A9FF88724F11A619F9A5A7280DA34AD91D760
                                                          APIs
                                                          • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 00E4461F
                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00E44634
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: '
                                                          • API String ID: 3850602802-1997036262
                                                          • Opcode ID: 786e6e8f9aa3c0970ec51a8ef94c953f8e460856fb2218e37bd221bed2894289
                                                          • Instruction ID: ce42c348698fad8e589aa1b5e2704294576a4a5ba5c77a2b1c25d6ac4641b3d5
                                                          • Opcode Fuzzy Hash: 786e6e8f9aa3c0970ec51a8ef94c953f8e460856fb2218e37bd221bed2894289
                                                          • Instruction Fuzzy Hash: 413136B4B0120A9FDF14CFA9D981BDABBB5FF49304F1150AAE905AB381D770A941CF90
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00E4327C
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00E43287
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: Combobox
                                                          • API String ID: 3850602802-2096851135
                                                          • Opcode ID: 0fe5b76ca65115dc29bc1602cb58ec9808adf7f04ab73d687413cc64f6486be4
                                                          • Instruction ID: fca553446b310bd227fbb5b9dbf355560761e6a7f6747b6f29b6304b63d27d74
                                                          • Opcode Fuzzy Hash: 0fe5b76ca65115dc29bc1602cb58ec9808adf7f04ab73d687413cc64f6486be4
                                                          • Instruction Fuzzy Hash: 8B11B2713002087FFF259EA4EC81EBB376BEB94368F205529F918B72A1D6B19D518760
                                                          APIs
                                                            • Part of subcall function 00DB600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00DB604C
                                                            • Part of subcall function 00DB600E: GetStockObject.GDI32(00000011), ref: 00DB6060
                                                            • Part of subcall function 00DB600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00DB606A
                                                          • GetWindowRect.USER32(00000000,?), ref: 00E4377A
                                                          • GetSysColor.USER32(00000012), ref: 00E43794
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                          • String ID: static
                                                          • API String ID: 1983116058-2160076837
                                                          • Opcode ID: ff4eb4c4b6420e844efb845d12aaabecf5ffb6807afc693591e070e4e79e96fd
                                                          • Instruction ID: f0961261189f76d909c469de1b4123f89b67780af33e4f1c80e86f37d1162c1e
                                                          • Opcode Fuzzy Hash: ff4eb4c4b6420e844efb845d12aaabecf5ffb6807afc693591e070e4e79e96fd
                                                          • Instruction Fuzzy Hash: 701129B2610209AFDB00DFB8DC4AAEA7BB8EB09314F105915F995E3250D735E8559B60
                                                          APIs
                                                          • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00E2CD7D
                                                          • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00E2CDA6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Internet$OpenOption
                                                          • String ID: <local>
                                                          • API String ID: 942729171-4266983199
                                                          • Opcode ID: 4d66a5027f1452bc9b8396c6f28b5557c2b91df000a65d4d8bd843b63627d80e
                                                          • Instruction ID: c7e73889eaa93c8b3595551e5f93d7108c5533d1438ffffa8a9f9d97c4e91ef5
                                                          • Opcode Fuzzy Hash: 4d66a5027f1452bc9b8396c6f28b5557c2b91df000a65d4d8bd843b63627d80e
                                                          • Instruction Fuzzy Hash: BA1106752016317AD7344B66DC48EEBBE6CEF127A8F205226B109A3080D3709845D6F0
                                                          APIs
                                                          • GetWindowTextLengthW.USER32(00000000), ref: 00E434AB
                                                          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00E434BA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: LengthMessageSendTextWindow
                                                          • String ID: edit
                                                          • API String ID: 2978978980-2167791130
                                                          • Opcode ID: 57c2ee30feb50c71ea3323ca3964d13d326f939883490c85cfde4dff694ae755
                                                          • Instruction ID: e58d09f687fa783e364be96cda0959ea3fa701b1f8c714464982a1c68e50ac4e
                                                          • Opcode Fuzzy Hash: 57c2ee30feb50c71ea3323ca3964d13d326f939883490c85cfde4dff694ae755
                                                          • Instruction Fuzzy Hash: 8311BC71200208AFEB128E75EC40AEB37AAEB55378F606324FA75B31E0C735DC519B60
                                                          APIs
                                                            • Part of subcall function 00DB9CB3: _wcslen.LIBCMT ref: 00DB9CBD
                                                          • CharUpperBuffW.USER32(?,?,?), ref: 00E16CB6
                                                          • _wcslen.LIBCMT ref: 00E16CC2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharUpper
                                                          • String ID: STOP
                                                          • API String ID: 1256254125-2411985666
                                                          • Opcode ID: f9435fbc5e9dc38ba8dd7bb769c106dd154f624521c10be6aaa41ad66b87e1b2
                                                          • Instruction ID: fdd5c3a9c10db6ae70ba93f17eff30061f0d66e59cbd96cf536f53b40a85e95e
                                                          • Opcode Fuzzy Hash: f9435fbc5e9dc38ba8dd7bb769c106dd154f624521c10be6aaa41ad66b87e1b2
                                                          • Instruction Fuzzy Hash: 8A01D632B005268BCB20AFBDDC919FFB7B5EB617147511928E852B7190EB31D980C7A0
                                                          APIs
                                                            • Part of subcall function 00DB9CB3: _wcslen.LIBCMT ref: 00DB9CBD
                                                            • Part of subcall function 00E13CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00E13CCA
                                                          • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00E11D4C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 624084870-1403004172
                                                          • Opcode ID: 0123a8cd72a9afa51999a766ef3c3576b79f38fef891c24e4b3a9912ec446f7b
                                                          • Instruction ID: c41be833c0382b52b14c261eb91274a4e7802b96c61552e0e2c5883168d77cb0
                                                          • Opcode Fuzzy Hash: 0123a8cd72a9afa51999a766ef3c3576b79f38fef891c24e4b3a9912ec446f7b
                                                          • Instruction Fuzzy Hash: 5F01D475601218AB8B18EBA4DC61CFEB7A8EB46390B141A59F937772C1EA309948C671
                                                          APIs
                                                            • Part of subcall function 00DB9CB3: _wcslen.LIBCMT ref: 00DB9CBD
                                                            • Part of subcall function 00E13CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00E13CCA
                                                          • SendMessageW.USER32(?,00000180,00000000,?), ref: 00E11C46
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 624084870-1403004172
                                                          • Opcode ID: fee77f57ea996f0dc55ef735a38c5106f6c131746ca3c681b7d972de2afee30f
                                                          • Instruction ID: bca9609660c29b41254f35935d6f1371a2b544894ab867f23efa5a54c80841b7
                                                          • Opcode Fuzzy Hash: fee77f57ea996f0dc55ef735a38c5106f6c131746ca3c681b7d972de2afee30f
                                                          • Instruction Fuzzy Hash: 7E0167B5781208ABCB18EBA0D961AFFF7A8DB15340F141059AA1777281EA609E5886F1
                                                          APIs
                                                            • Part of subcall function 00DB9CB3: _wcslen.LIBCMT ref: 00DB9CBD
                                                            • Part of subcall function 00E13CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00E13CCA
                                                          • SendMessageW.USER32(?,00000182,?,00000000), ref: 00E11CC8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 624084870-1403004172
                                                          • Opcode ID: 21c17f71edb28aea9a16b8d0197ee0262796f9d9745117bb3dd39580777f52bf
                                                          • Instruction ID: 4ca538cf789f548961afb60b6da39665a2d789a167a9efb23c5f07f3df0e862a
                                                          • Opcode Fuzzy Hash: 21c17f71edb28aea9a16b8d0197ee0262796f9d9745117bb3dd39580777f52bf
                                                          • Instruction Fuzzy Hash: 3301DBB5641218A7CF18E7A0CA51AFFF7E89B11340F141055B90773281EA609F58C6F1
                                                          APIs
                                                          • __Init_thread_footer.LIBCMT ref: 00DCA529
                                                            • Part of subcall function 00DB9CB3: _wcslen.LIBCMT ref: 00DB9CBD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Init_thread_footer_wcslen
                                                          • String ID: ,%$3y
                                                          • API String ID: 2551934079-4248191106
                                                          • Opcode ID: b246962739015f73f1ec1df454dd02c55a37b1f62284910730b09c58371d8e43
                                                          • Instruction ID: cb3acf4238c555f08a65247f2bb5b88251ab952ae3c8eb3ab46a71dc0f19a617
                                                          • Opcode Fuzzy Hash: b246962739015f73f1ec1df454dd02c55a37b1f62284910730b09c58371d8e43
                                                          • Instruction Fuzzy Hash: 310176327402198FC604F3ACEC6BFAC7728CB45724F10402DFA0A272C2EE509D0586B7
                                                          APIs
                                                            • Part of subcall function 00DB9CB3: _wcslen.LIBCMT ref: 00DB9CBD
                                                            • Part of subcall function 00E13CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00E13CCA
                                                          • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00E11DD3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 624084870-1403004172
                                                          • Opcode ID: 2fc927fe321f279f3dacb7417c3a9ca364b1cf9490f69bcc8e54ce55560dfba2
                                                          • Instruction ID: 39609ef0676be1428d5490b8fc5f86d2b47babfd89c0c6c6997c1dd362d2e461
                                                          • Opcode Fuzzy Hash: 2fc927fe321f279f3dacb7417c3a9ca364b1cf9490f69bcc8e54ce55560dfba2
                                                          • Instruction Fuzzy Hash: AFF0A975A41218A7DB14E7A4DC51BFEB7A8EB01350F141955B927732C1EA6059488271
                                                          APIs
                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00E83018,00E8305C), ref: 00E481BF
                                                          • CloseHandle.KERNEL32 ref: 00E481D1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: CloseCreateHandleProcess
                                                          • String ID: \0
                                                          • API String ID: 3712363035-3218720685
                                                          • Opcode ID: 35c7c89a839c00fe980c6cd6f47e0c8ae6fd0ca719f282fe51f5836ee17ac189
                                                          • Instruction ID: 7882855d26e29baf034c58ab9dcdf1914dc4bf6eb94a16d06b4ff0d41c4b9dcf
                                                          • Opcode Fuzzy Hash: 35c7c89a839c00fe980c6cd6f47e0c8ae6fd0ca719f282fe51f5836ee17ac189
                                                          • Instruction Fuzzy Hash: FAF05EB1641300BEE2206B72AC46FBB3A5CDB05B54F000465BB0CF61A2D6759E0993B9
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID: 3, 3, 16, 1
                                                          • API String ID: 176396367-3042988571
                                                          • Opcode ID: 9ddf4e906fbf859c157c5e0cccbbf16cf242528bdfa551acfd03fc35c747307f
                                                          • Instruction ID: ec8952b1a9b25e26cb1c44ae41113a14409514b19bfac007104ccfaf9ae5f605
                                                          • Opcode Fuzzy Hash: 9ddf4e906fbf859c157c5e0cccbbf16cf242528bdfa551acfd03fc35c747307f
                                                          • Instruction Fuzzy Hash: 53E02B62204320619231137A9CC597F6E89CFC9760B10282FF9D5E2366EAA49D91D3B0
                                                          APIs
                                                          • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00E10B23
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Message
                                                          • String ID: AutoIt$Error allocating memory.
                                                          • API String ID: 2030045667-4017498283
                                                          • Opcode ID: 8720e562e7a8e66ef349c10f9739311b0cafb171b555460da5145a9587b50a2f
                                                          • Instruction ID: a0309328aa59e4515b6919bc96402d1cb34d002aaf1f636de63d44cef0376a03
                                                          • Opcode Fuzzy Hash: 8720e562e7a8e66ef349c10f9739311b0cafb171b555460da5145a9587b50a2f
                                                          • Instruction Fuzzy Hash: 1AE0DF322893183BD2103795BC03FC97B89CF06B20F20442BFB98B65C38AE2649046F9
                                                          APIs
                                                            • Part of subcall function 00DCF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00DD0D71,?,?,?,00DB100A), ref: 00DCF7CE
                                                          • IsDebuggerPresent.KERNEL32(?,?,?,00DB100A), ref: 00DD0D75
                                                          • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00DB100A), ref: 00DD0D84
                                                          Strings
                                                          • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00DD0D7F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                          • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                          • API String ID: 55579361-631824599
                                                          • Opcode ID: b2eeb320dee41a2377bb23964135d6ab1af51c1b921557faf508ee3a12c96cb5
                                                          • Instruction ID: 67af90339ea7b868f973f4a31745092648a4550a98998077232416c114da2c4f
                                                          • Opcode Fuzzy Hash: b2eeb320dee41a2377bb23964135d6ab1af51c1b921557faf508ee3a12c96cb5
                                                          • Instruction Fuzzy Hash: BFE06D742007018FD3609FBAE4047827FE5AB04B41F04892EE486D7B61DBF0E4498BB1
                                                          APIs
                                                          • __Init_thread_footer.LIBCMT ref: 00DCE3D5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Init_thread_footer
                                                          • String ID: 0%$8%
                                                          • API String ID: 1385522511-2949748613
                                                          • Opcode ID: 7ac9df7494f13c5032f3801763f7d4d49999c0beab5d64449ea4a1854f6cb5dc
                                                          • Instruction ID: d413317129425b862b93ee0f76ce1f29d8d257a06bb720e3e5056ba6ca690058
                                                          • Opcode Fuzzy Hash: 7ac9df7494f13c5032f3801763f7d4d49999c0beab5d64449ea4a1854f6cb5dc
                                                          • Instruction Fuzzy Hash: 12E02671490A91CFC604A759B85DF883795EB8B321B10916DE20AA76F19B307845877A
                                                          APIs
                                                          • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 00E2302F
                                                          • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00E23044
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: Temp$FileNamePath
                                                          • String ID: aut
                                                          • API String ID: 3285503233-3010740371
                                                          • Opcode ID: f36d4713469cee579e54c7f2e86740a1802f44487ce0ba0d48bc32ba1cedd91a
                                                          • Instruction ID: 3a333c7bac7ea7847e1e1738c4eee1cc008fa6097ce388d1736bc30ff31a3052
                                                          • Opcode Fuzzy Hash: f36d4713469cee579e54c7f2e86740a1802f44487ce0ba0d48bc32ba1cedd91a
                                                          • Instruction Fuzzy Hash: 1AD05B75501714ABDA6097969C0DFC73A6CD705754F0001517655F30A1DAF09545CAD4
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: LocalTime
                                                          • String ID: %.3d$X64
                                                          • API String ID: 481472006-1077770165
                                                          • Opcode ID: 5588cbf385a1401efb3fcea0783eb0b88ea4df399c7b9912d0a344aacf13d4a4
                                                          • Instruction ID: 1a9ba657e9938311750b41628a917f132c5516ef993d48889e82643fd7f14b0b
                                                          • Opcode Fuzzy Hash: 5588cbf385a1401efb3fcea0783eb0b88ea4df399c7b9912d0a344aacf13d4a4
                                                          • Instruction Fuzzy Hash: 8CD0126180D219FACB9097D0CC45DF9B37CEB08301F609466F80AB2090E734C9886B71
                                                          APIs
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00E4236C
                                                          • PostMessageW.USER32(00000000), ref: 00E42373
                                                            • Part of subcall function 00E1E97B: Sleep.KERNEL32 ref: 00E1E9F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: FindMessagePostSleepWindow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 529655941-2988720461
                                                          • Opcode ID: bfb4b2b56bb098ec8bf1800692d30f1fbaebd138721aa9d25b64761877bf11e5
                                                          • Instruction ID: 87014715a5a02481e229f57ee4761983ac87fda974e6faeccf196d9459f796d3
                                                          • Opcode Fuzzy Hash: bfb4b2b56bb098ec8bf1800692d30f1fbaebd138721aa9d25b64761877bf11e5
                                                          • Instruction Fuzzy Hash: DCD0A9363823007BE2A8A3329C0FFCA66149B01B00F118902B706BA1E0C8A0A80A8A04
                                                          APIs
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00E4232C
                                                          • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00E4233F
                                                            • Part of subcall function 00E1E97B: Sleep.KERNEL32 ref: 00E1E9F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: FindMessagePostSleepWindow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 529655941-2988720461
                                                          • Opcode ID: 6f0116af2e973804691631079eecce91905a38bb52d20a3c2125a6335d938538
                                                          • Instruction ID: e37f6963fc5b538a3e20c94ac7b29a7533a37fc5b952f9aeb6ac03a10d432727
                                                          • Opcode Fuzzy Hash: 6f0116af2e973804691631079eecce91905a38bb52d20a3c2125a6335d938538
                                                          • Instruction Fuzzy Hash: EAD023353813007BD1A47331DC0FFC675145B00B00F1145027705B71D0C4F06405CA00
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 00DEBE93
                                                          • GetLastError.KERNEL32 ref: 00DEBEA1
                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00DEBEFC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2119695763.0000000000DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DB0000, based on PE: true
                                                          • Associated: 00000000.00000002.2119674400.0000000000DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119756127.0000000000E72000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119805494.0000000000E7C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2119822811.0000000000E84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_db0000_file.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$ErrorLast
                                                          • String ID:
                                                          • API String ID: 1717984340-0
                                                          • Opcode ID: f9299bbebbf81da9c1dc1524a660395d63aee44e543ef7a8f74de62ad63c8fcf
                                                          • Instruction ID: 8cd3e86a8bed028930e633fc44527e76f20fae2a799fdc0ca5b61185979618d0
                                                          • Opcode Fuzzy Hash: f9299bbebbf81da9c1dc1524a660395d63aee44e543ef7a8f74de62ad63c8fcf
                                                          • Instruction Fuzzy Hash: E341E834605286AFCF21AF66CC44ABB7BA4DF41730F18416AF959A72A1DB31AC01CB70