Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1523038
MD5:93847e39e6beb5fef14983e436a58dbd
SHA1:bb656458c1419f8ade2af5528af162b9a321f59b
SHA256:bd7999eeec5f99abdab2fc9ef13ee82334827064dd6a50e6d445b4121724e7b4
Tags:exeuser-Bitsight
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Enables debug privileges
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • file.exe (PID: 7416 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 93847E39E6BEB5FEF14983E436A58DBD)
    • taskkill.exe (PID: 7432 cmdline: taskkill /F /IM chrome.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 7440 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • chrome.exe (PID: 7584 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --app="https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-features=CrashRecovery MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 7796 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2080 --field-trial-handle=1960,i,3461561876009071434,16395330310159126953,262144 --disable-features=CrashRecovery /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 3276 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5540 --field-trial-handle=1960,i,3461561876009071434,16395330310159126953,262144 --disable-features=CrashRecovery /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
      • chrome.exe (PID: 3280 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 --field-trial-handle=1960,i,3461561876009071434,16395330310159126953,262144 --disable-features=CrashRecovery /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: file.exeReversingLabs: Detection: 13%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
Source: file.exeJoe Sandbox ML: detected
Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: unknownHTTPS traffic detected: 23.206.229.226:443 -> 192.168.2.8:49744 version: TLS 1.0
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.8:49717 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.8:49720 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.8:49732 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.8:49756 version: TLS 1.2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E3DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00E3DBBE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E0C2A2 FindFirstFileExW,0_2_00E0C2A2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E468EE FindFirstFileW,FindClose,0_2_00E468EE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E4698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00E4698F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E3D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00E3D076
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E3D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00E3D3A9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E49642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00E49642
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E4979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00E4979D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E49B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00E49B2B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E45C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00E45C97
Source: Joe Sandbox ViewIP Address: 239.255.255.250 239.255.255.250
Source: Joe Sandbox ViewJA3 fingerprint: 1138de370e523e824bbca92d049a3777
Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
Source: unknownHTTPS traffic detected: 23.206.229.226:443 -> 192.168.2.8:49744 version: TLS 1.0
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
Source: unknownTCP traffic detected without corresponding DNS query: 13.85.23.86
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E4CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_00E4CE44
Source: global trafficHTTP traffic detected: GET /account?=https://accounts.google.com/v3/signin/challenge/pwd HTTP/1.1Host: youtube.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CIW2yQEIorbJAQipncoBCOj/ygEIkqHLAQiFoM0BCNy9zQEIucrNAQiK080BCMfUzQEIodbNAQio2M0BCPnA1BUYwcvMARi60s0BGMXYzQEY642lFw==Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentAccept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd HTTP/1.1Host: www.youtube.comConnection: keep-aliveUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CIW2yQEIorbJAQipncoBCOj/ygEIkqHLAQiFoM0BCNy9zQEIucrNAQiK080BCMfUzQEIodbNAQio2M0BCPnA1BUYwcvMARi60s0BGMXYzQEY642lFw==Sec-Fetch-Site: noneSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: documentsec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-platform: "Windows"Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=1hFSlGOzLX4mB+T&MD=hayC8FLE HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: global trafficHTTP traffic detected: GET /accounts/CheckConnection?pmpo=https%3A%2F%2Faccounts.google.com&v=-911596174&timestamp=1727736135802 HTTP/1.1Host: accounts.youtube.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0sec-ch-ua-full-version: "117.0.5938.132"sec-ch-ua-arch: "x86"sec-ch-ua-platform: "Windows"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-model: ""sec-ch-ua-bitness: "64"sec-ch-ua-wow64: ?0sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"Upgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7X-Client-Data: CIW2yQEIorbJAQipncoBCOj/ygEIkqHLAQiFoM0BCNy9zQEIucrNAQiK080BCMfUzQEIodbNAQio2M0BCPnA1BUYwcvMARi60s0BGMXYzQEY642lFw==Sec-Fetch-Site: cross-siteSec-Fetch-Mode: navigateSec-Fetch-User: ?1Sec-Fetch-Dest: iframeReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Host: www.google.comConnection: keep-alivesec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-arch: "x86"sec-ch-ua-full-version: "117.0.5938.132"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8X-Client-Data: CIW2yQEIorbJAQipncoBCOj/ygEIkqHLAQiFoM0BCNy9zQEIucrNAQiK080BCMfUzQEIodbNAQio2M0BCPnA1BUYwcvMARi60s0BGMXYzQEY642lFw==Sec-Fetch-Site: same-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=1hFSlGOzLX4mB+T&MD=hayC8FLE HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: chromecache_93.6.drString found in binary or memory: _.iq(p)+"/familylink/privacy/notice/embedded?langCountry="+_.iq(p);break;case "PuZJUb":a+="https://www.youtube.com/t/terms?chromeless=1&hl="+_.iq(m);break;case "fxTQxb":a+="https://youtube.com/t/terms?gl="+_.iq(_.rq(c))+"&hl="+_.iq(d)+"&override_hl=1"+(f?"&linkless=1":"");break;case "prAmvd":a+="https://www.google.com/intl/"+_.iq(m)+"/chromebook/termsofservice.html?languageCode="+_.iq(d)+"&regionCode="+_.iq(c);break;case "NfnTze":a+="https://policies.google.com/privacy/google-partners"+(f?"/embedded": equals www.youtube.com (Youtube)
Source: global trafficDNS traffic detected: DNS query: youtube.com
Source: global trafficDNS traffic detected: DNS query: www.youtube.com
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: accounts.youtube.com
Source: global trafficDNS traffic detected: DNS query: play.google.com
Source: unknownHTTP traffic detected: POST /log?format=json&hasfast=true&authuser=0 HTTP/1.1Host: play.google.comConnection: keep-aliveContent-Length: 519sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36sec-ch-ua-arch: "x86"Content-Type: application/x-www-form-urlencoded;charset=UTF-8sec-ch-ua-full-version: "117.0.5938.132"sec-ch-ua-platform-version: "10.0.0"X-Goog-AuthUser: 0sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: */*Origin: https://accounts.google.comX-Client-Data: CIW2yQEIorbJAQipncoBCOj/ygEIkqHLAQiFoM0BCNy9zQEIucrNAQiK080BCMfUzQEIodbNAQio2M0BCPnA1BUYwcvMARi60s0BGMXYzQEY642lFw==Sec-Fetch-Site: same-siteSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: chromecache_87.6.drString found in binary or memory: https://accounts.google.com
Source: chromecache_87.6.drString found in binary or memory: https://accounts.google.com/TOS?loc=
Source: file.exe, 00000000.00000002.1448849469.00000000016A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/v3/signin/challenge/pwdj
Source: chromecache_89.6.drString found in binary or memory: https://apis.google.com/js/api.js
Source: chromecache_87.6.drString found in binary or memory: https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessage
Source: chromecache_93.6.drString found in binary or memory: https://families.google.com/intl/
Source: chromecache_89.6.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/drive_2020q4/v10/192px.svg
Source: chromecache_89.6.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/gmail_2020q4/v10/web-48dp/logo_gmail_2020q4_color_2x_web_
Source: chromecache_89.6.drString found in binary or memory: https://fonts.gstatic.com/s/i/productlogos/maps/v7/192px.svg
Source: chromecache_87.6.drString found in binary or memory: https://g.co/recover
Source: chromecache_93.6.drString found in binary or memory: https://play.google.com/log?format=json&hasfast=true
Source: chromecache_87.6.drString found in binary or memory: https://play.google.com/work/enroll?identifier=
Source: chromecache_93.6.drString found in binary or memory: https://play.google/intl/
Source: chromecache_93.6.drString found in binary or memory: https://policies.google.com/privacy
Source: chromecache_93.6.drString found in binary or memory: https://policies.google.com/privacy/additional
Source: chromecache_93.6.drString found in binary or memory: https://policies.google.com/privacy/google-partners
Source: chromecache_93.6.drString found in binary or memory: https://policies.google.com/technologies/cookies
Source: chromecache_93.6.drString found in binary or memory: https://policies.google.com/technologies/location-data
Source: chromecache_93.6.drString found in binary or memory: https://policies.google.com/terms
Source: chromecache_93.6.drString found in binary or memory: https://policies.google.com/terms/location
Source: chromecache_93.6.drString found in binary or memory: https://policies.google.com/terms/service-specific
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-email-pin.gif
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-password.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-sms-or-voice-pin.gif
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-sms-pin.gif
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/account-recovery-stop-go-landing-page_1x.png
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/animation/
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/ble_device.png
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/ble_pin.png
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync.png
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_1x.png
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_2x.png
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/contacts_backup_sync_darkmode_1x.png
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/continue_on_your_phone.png
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_phone_number_verification.png
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_silent_tap_yes_darkmode.gif
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_tap_yes.gif
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/device_prompt_tap_yes_darkmode.gif
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kid_success.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kid_success_darkmode.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_dark_v2.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_updated.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_updated_darkmode.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidfork_who_will_use_v2.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_not_ready.png
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_stick_around_1.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignin_stick_around_dark_1.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_account_1.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_account_darkmode_1.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_privacy_1.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_child_privacy_darkmode_1.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_created.png
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_double_device.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_double_device_darkmode.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_full_house.png
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_link_accounts_1.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_link_accounts_darkmode_1.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_app_decision.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_app_decision_darkmode.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_supervision_1.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_parent_supervision_darkmode_1.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_respect_others_1.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_respect_others_darkmode_1.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_single_device.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_single_device_darkmode.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/kidsignup_stop.png
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/personalization_reminders.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/phone_number_sign_in_2x.png
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/return_to_desktop.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/return_to_desktop_darkmode.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key.gif
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_ios_center.png
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_laptop.gif
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_nfc_discovered.gif
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_nfc_discovered_darkmode.gif
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/security_key_phone.gif
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_googleapp_ios.gif
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_googleapp_pulldown.gif
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/signin_tapyes.gif
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/smart_lock_2x.png
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/usb_key.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/web_and_app_activity.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/who_will_be_using_this_device.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/embedded/you_tube_history.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/feature_not_available.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/feature_not_available_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/gmail_ios_authzen.gif
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/paaskey.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_challenge.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_challenge_darkmode.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_darkmode.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_cross_device.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_cross_device_darkmode.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_darkmode.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_error.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_error_darkmode.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_reauth.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_enrollment_reauth_darkmode.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_success.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkey_success_darkmode.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkeyerror.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/passkeyerror_darkmode.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/red_globe_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/red_globe_light.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/screenlock.png
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_ipad.gif
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone.gif
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone_nfc.gif
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_iphone_usb.gif
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_key_phone.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/security_keys.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/success_checkmark_2.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/marc/success_checkmark_2_darkmode.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/loading_spinner_gm.gif
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/progress_spinner_color_20dp_4x.gif
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/accounts/ui/success-gm-default_2x.png
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/apps/signup/resources/custom-email-address.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/images/hpp/shield_security_checkup_green_2x_web_96dp.png
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/account_setup_chapter_dark_1.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/account_setup_chapter_v1.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/device_setup_chapter_dark_v1.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/device_setup_chapter_v1.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/parental_control_chapter_dark_v1.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/chaptering/parental_control_chapter_v1.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_accountslinked.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_accountslinked_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_childneedshelp.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_childneedshelp_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_nextstepsforparents.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/conversion/conversion_nextstepsforparents_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_allset.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_allset_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_apps_devices.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_apps_devices_darkmode.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_areyousurekid.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_areyousurekid_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_birthdayemail.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_birthdayemail_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_choose_apps.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_choose_apps_darkmode.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_confirmation.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_exploremore.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_exploremore_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_intro.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_intro_darkmode.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacy_terms_a18.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacy_terms_a18_darkmode.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacyterms.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_privacyterms_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_review_settings.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_review_settings_darkmode.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_safe_search.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_safe_search_darkmode.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_unchanged_a18.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_unchanged_a18_darkmode.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_update_a18.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_success_update_a18_darkmode.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_a18.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_a18_darkmode.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervision_choice_darkmode.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervisiongrad.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/graduation/graduation_supervisiongrad_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/guardianlinking/linking_complete_0.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/guardianlinking/linking_complete_dark_0.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/ads_personalization.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/ads_personalization_darkmode.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/confirmation.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/confirmation_darkmode.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/eligibility_error.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/eligibility_error_darkmode.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/fork.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/fork_darkmode.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/intro.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/intro_darkmode.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/personal_results.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/personal_results_darkmode.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/safe_search.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/minormodeexit/safe_search_darkmode.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/check_notifications.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/check_notifications_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_installing_family_link_2.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_installing_family_link_dark_2.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_location_sharing_2.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_location_sharing_dark_2.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_parental_controls_2.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_parental_controls_dark_2.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_school_time_2.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/kid_watch_set_up_school_time_dark_2.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/location_sharing_enabled_2.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/location_sharing_enabled_dark_3.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/parent_sign_in_prologue_1.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/parent_sign_in_prologue_dark_1.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_complete_1.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_complete_dark_1.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_contacts_2.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_contacts_dark_2.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_boy_1.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_boy_dark_1.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_girl_2.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/set_up_family_link_girl_dark_2.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/ulp_continue_without_gmail_dark_v2.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/onboarding/ulp_continue_without_gmail_v2.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/all_set.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/all_set_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/are_you_sure_parent.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/are_you_sure_parent_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/content_restriction.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/content_restriction_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/error.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/error_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/how_controls_work.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/how_controls_work_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/next_steps.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/next_steps_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/setup_controls.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/setup_controls_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_parent.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_parent_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_teen.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teensupervisionreview/who_teen_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teentoadultgraduation/supervision_choice.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/teentoadultgraduation/supervision_choice_darkmode.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/kid_setup_parent_escalation.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/kid_setup_parent_escalation_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/send_email_confirmation.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/send_email_confirmation_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/success_sent_email.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulp_appblock/success_sent_email_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulpupgrade/kidprofileupgrade_all_set.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/images/ulpupgrade/kidprofileupgrade_all_set_darkmode.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/all_set.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/all_set_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/almost_done_kids_space_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/almost_done_kids_space_v2.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_tablet_v2.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_tablet_v2_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_v2.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/devices_connected_v2_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/emailinstallfamilylink.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/emailinstallfamilylink_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/familylinkinstalling.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/familylinkinstalling_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/hand_over_device_dark_v2.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/hand_over_device_v2.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/linking_accounts_v2.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/linking_accounts_v2_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/locationsetup.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/locationsetup_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email_v2.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_email_v2_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_v2.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/manage_parental_controls_v2_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/open_family_link_v2.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/open_family_link_v2_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/parents_help.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/parents_help_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/set_up_kids_space.png
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/set_up_kids_space_dark.png
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setupcontrol.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setupcontrol_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuplocation.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuplocation_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuptimelimits.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/setuptimelimits_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/supervision_ready_v2.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/supervision_ready_v2_dark.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/youtubeaccess.svg
Source: chromecache_89.6.drString found in binary or memory: https://ssl.gstatic.com/kids/onboarding/illustrations/youtubeaccess_dark.svg
Source: chromecache_87.6.drString found in binary or memory: https://support.google.com/accounts?hl=
Source: chromecache_93.6.drString found in binary or memory: https://support.google.com/accounts?p=new-si-ui
Source: chromecache_87.6.drString found in binary or memory: https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072
Source: chromecache_89.6.drString found in binary or memory: https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=
Source: chromecache_87.6.drString found in binary or memory: https://www.google.com
Source: chromecache_93.6.drString found in binary or memory: https://www.google.com/intl/
Source: chromecache_89.6.drString found in binary or memory: https://www.gstatic.com/accounts/speedbump/authzen_optin_illustration.gif
Source: chromecache_89.6.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/chrome_48dp.png
Source: chromecache_89.6.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/googleg_48dp.png
Source: chromecache_89.6.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/gsa_48dp.png
Source: chromecache_89.6.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/play_prism_48dp.png
Source: chromecache_89.6.drString found in binary or memory: https://www.gstatic.com/images/branding/product/2x/youtube_48dp.png
Source: chromecache_93.6.drString found in binary or memory: https://www.gstatic.com/images/branding/productlogos/googleg/v6/36px.svg
Source: chromecache_93.6.drString found in binary or memory: https://www.youtube.com/t/terms?chromeless=1&hl=
Source: file.exe, 00000000.00000003.1448404475.00000000016D1000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1448540760.0000000000DB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
Source: chromecache_93.6.drString found in binary or memory: https://youtube.com/t/terms?gl=
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49676 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.8:49717 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.8:49720 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.8:49732 version: TLS 1.2
Source: unknownHTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.8:49756 version: TLS 1.2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E4EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00E4EAFF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E4ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00E4ED6A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E4EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00E4EAFF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E3AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_00E3AA57
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E69576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00E69576

System Summary

barindex
Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.
Source: file.exe, 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_0fb2a797-1
Source: file.exe, 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_d75fd40a-b
Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_860c045c-d
Source: file.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_a7e4fb35-0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E3D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_00E3D5EB
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E31201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00E31201
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E3E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00E3E8F6
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DDBF400_2_00DDBF40
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E420460_2_00E42046
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DD80600_2_00DD8060
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E382980_2_00E38298
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E0E4FF0_2_00E0E4FF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E0676B0_2_00E0676B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E648730_2_00E64873
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DDCAF00_2_00DDCAF0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DFCAA00_2_00DFCAA0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DECC390_2_00DECC39
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E06DD90_2_00E06DD9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DD91C00_2_00DD91C0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DEB1190_2_00DEB119
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DF13940_2_00DF1394
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DF17060_2_00DF1706
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DF781B0_2_00DF781B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DF19B00_2_00DF19B0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DE997D0_2_00DE997D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DD79200_2_00DD7920
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DF7A4A0_2_00DF7A4A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DF7CA70_2_00DF7CA7
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DF1C770_2_00DF1C77
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E09EEE0_2_00E09EEE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E5BE440_2_00E5BE44
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DF1F320_2_00DF1F32
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00DD9CB3 appears 31 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00DF0A30 appears 46 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00DEF9F2 appears 40 times
Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: classification engineClassification label: mal64.evad.winEXE@31/38@12/9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E437B5 GetLastError,FormatMessageW,0_2_00E437B5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E310BF AdjustTokenPrivileges,CloseHandle,0_2_00E310BF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E316C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00E316C3
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E451CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00E451CD
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E5A67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00E5A67C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E4648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_00E4648E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DD42A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00DD42A2
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7440:120:WilError_03
Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: file.exeReversingLabs: Detection: 13%
Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /T
Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --app="https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-features=CrashRecovery
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2080 --field-trial-handle=1960,i,3461561876009071434,16395330310159126953,262144 --disable-features=CrashRecovery /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5540 --field-trial-handle=1960,i,3461561876009071434,16395330310159126953,262144 --disable-features=CrashRecovery /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 --field-trial-handle=1960,i,3461561876009071434,16395330310159126953,262144 --disable-features=CrashRecovery /prefetch:8
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /TJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --app="https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-features=CrashRecoveryJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2080 --field-trial-handle=1960,i,3461561876009071434,16395330310159126953,262144 --disable-features=CrashRecovery /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5540 --field-trial-handle=1960,i,3461561876009071434,16395330310159126953,262144 --disable-features=CrashRecovery /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 --field-trial-handle=1960,i,3461561876009071434,16395330310159126953,262144 --disable-features=CrashRecovery /prefetch:8Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: Google Drive.lnk.4.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: YouTube.lnk.4.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Sheets.lnk.4.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Gmail.lnk.4.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Slides.lnk.4.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Docs.lnk.4.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DD42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00DD42DE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DF0A76 push ecx; ret 0_2_00DF0A89
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome AppsJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnkJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnkJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DEF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00DEF98E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E61C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00E61C41
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\file.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-95042
Source: C:\Users\user\Desktop\file.exeAPI coverage: 3.2 %
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E3DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00E3DBBE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E0C2A2 FindFirstFileExW,0_2_00E0C2A2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E468EE FindFirstFileW,FindClose,0_2_00E468EE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E4698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00E4698F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E3D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00E3D076
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E3D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00E3D3A9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E49642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00E49642
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E4979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00E4979D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E49B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00E49B2B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E45C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00E45C97
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DD42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00DD42DE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E4EAA2 BlockInput,0_2_00E4EAA2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E02622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00E02622
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DD42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00DD42DE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DF4CE8 mov eax, dword ptr fs:[00000030h]0_2_00DF4CE8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E30B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00E30B62
Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E02622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00E02622
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DF083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00DF083F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DF09D5 SetUnhandledExceptionFilter,0_2_00DF09D5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DF0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00DF0C21
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E31201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00E31201
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E12BA5 KiUserCallbackDispatcher,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00E12BA5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E3B226 SendInput,keybd_event,0_2_00E3B226
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E522DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_00E522DA
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /TJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E30B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00E30B62
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E31663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00E31663
Source: file.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
Source: file.exeBinary or memory string: Shell_TrayWnd
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DF0698 cpuid 0_2_00DF0698
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E48195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00E48195
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E2D27A GetUserNameW,0_2_00E2D27A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E0B952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_00E0B952
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00DD42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00DD42DE
Source: file.exeBinary or memory string: WIN_81
Source: file.exeBinary or memory string: WIN_XP
Source: file.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
Source: file.exeBinary or memory string: WIN_XPe
Source: file.exeBinary or memory string: WIN_VISTA
Source: file.exeBinary or memory string: WIN_7
Source: file.exeBinary or memory string: WIN_8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E51204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00E51204
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E51806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00E51806
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure2
Valid Accounts
1
Windows Management Instrumentation
1
DLL Side-Loading
1
Exploitation for Privilege Escalation
2
Disable or Modify Tools
21
Input Capture
2
System Time Discovery
Remote Services1
Archive Collected Data
2
Ingress Tool Transfer
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts1
Native API
2
Valid Accounts
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory1
Account Discovery
Remote Desktop Protocol21
Input Capture
11
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
Registry Run Keys / Startup Folder
2
Valid Accounts
2
Obfuscated Files or Information
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin Shares3
Clipboard Data
3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
Access Token Manipulation
1
DLL Side-Loading
NTDS16
System Information Discovery
Distributed Component Object ModelInput Capture4
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script2
Process Injection
1
Masquerading
LSA Secrets12
Security Software Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
Registry Run Keys / Startup Folder
2
Valid Accounts
Cached Domain Credentials1
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Virtualization/Sandbox Evasion
DCSync2
Process Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
Access Token Manipulation
Proc Filesystem1
Application Window Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt2
Process Injection
/etc/passwd and /etc/shadow1
System Owner/User Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1523038 Sample: file.exe Startdate: 01/10/2024 Architecture: WINDOWS Score: 64 36 Multi AV Scanner detection for submitted file 2->36 38 Binary is likely a compiled AutoIt script file 2->38 40 Machine Learning detection for sample 2->40 42 AI detected suspicious sample 2->42 7 file.exe 2->7         started        process3 signatures4 44 Binary is likely a compiled AutoIt script file 7->44 46 Found API chain indicative of sandbox detection 7->46 10 chrome.exe 9 7->10         started        13 taskkill.exe 1 7->13         started        process5 dnsIp6 24 192.168.2.6 unknown unknown 10->24 26 192.168.2.8, 138, 443, 49525 unknown unknown 10->26 28 239.255.255.250 unknown Reserved 10->28 15 chrome.exe 10->15         started        18 chrome.exe 10->18         started        20 chrome.exe 6 10->20         started        22 conhost.exe 13->22         started        process7 dnsIp8 30 youtube-ui.l.google.com 142.250.186.46, 443, 49711 GOOGLEUS United States 15->30 32 www3.l.google.com 172.217.16.142, 443, 49733 GOOGLEUS United States 15->32 34 6 other IPs or domains 15->34

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe13%ReversingLabs
file.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://play.google/intl/0%URL Reputationsafe
https://families.google.com/intl/0%URL Reputationsafe
https://policies.google.com/technologies/location-data0%URL Reputationsafe
https://apis.google.com/js/api.js0%URL Reputationsafe
https://policies.google.com/privacy/google-partners0%URL Reputationsafe
https://policies.google.com/terms/service-specific0%URL Reputationsafe
https://g.co/recover0%URL Reputationsafe
https://policies.google.com/privacy/additional0%URL Reputationsafe
https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=32850720%URL Reputationsafe
https://policies.google.com/technologies/cookies0%URL Reputationsafe
https://policies.google.com/terms0%URL Reputationsafe
https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=0%URL Reputationsafe
https://support.google.com/accounts?hl=0%URL Reputationsafe
https://policies.google.com/terms/location0%URL Reputationsafe
https://policies.google.com/privacy0%URL Reputationsafe
https://support.google.com/accounts?p=new-si-ui0%URL Reputationsafe
https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessage0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
youtube-ui.l.google.com
142.250.186.46
truefalse
    unknown
    www3.l.google.com
    172.217.16.142
    truefalse
      unknown
      play.google.com
      172.217.18.14
      truefalse
        unknown
        www.google.com
        216.58.212.164
        truefalse
          unknown
          youtube.com
          216.58.206.78
          truefalse
            unknown
            accounts.youtube.com
            unknown
            unknownfalse
              unknown
              www.youtube.com
              unknown
              unknownfalse
                unknown
                NameMaliciousAntivirus DetectionReputation
                https://play.google.com/log?format=json&hasfast=true&authuser=0false
                  unknown
                  https://www.google.com/favicon.icofalse
                    unknown
                    https://play.google.com/log?hasfast=true&authuser=0&format=jsonfalse
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://play.google/intl/chromecache_93.6.drfalse
                      • URL Reputation: safe
                      unknown
                      https://families.google.com/intl/chromecache_93.6.drfalse
                      • URL Reputation: safe
                      unknown
                      https://youtube.com/t/terms?gl=chromecache_93.6.drfalse
                        unknown
                        https://policies.google.com/technologies/location-datachromecache_93.6.drfalse
                        • URL Reputation: safe
                        unknown
                        https://www.google.com/intl/chromecache_93.6.drfalse
                          unknown
                          https://apis.google.com/js/api.jschromecache_89.6.drfalse
                          • URL Reputation: safe
                          unknown
                          https://policies.google.com/privacy/google-partnerschromecache_93.6.drfalse
                          • URL Reputation: safe
                          unknown
                          https://play.google.com/work/enroll?identifier=chromecache_87.6.drfalse
                            unknown
                            https://policies.google.com/terms/service-specificchromecache_93.6.drfalse
                            • URL Reputation: safe
                            unknown
                            https://g.co/recoverchromecache_87.6.drfalse
                            • URL Reputation: safe
                            unknown
                            https://policies.google.com/privacy/additionalchromecache_93.6.drfalse
                            • URL Reputation: safe
                            unknown
                            https://support.google.com/websearch/answer/4358949?hl=ko&ref_topic=3285072chromecache_87.6.drfalse
                            • URL Reputation: safe
                            unknown
                            https://policies.google.com/technologies/cookieschromecache_93.6.drfalse
                            • URL Reputation: safe
                            unknown
                            https://policies.google.com/termschromecache_93.6.drfalse
                            • URL Reputation: safe
                            unknown
                            https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=chromecache_89.6.drfalse
                            • URL Reputation: safe
                            unknown
                            https://www.google.comchromecache_87.6.drfalse
                              unknown
                              https://play.google.com/log?format=json&hasfast=truechromecache_93.6.drfalse
                                unknown
                                https://www.youtube.com/t/terms?chromeless=1&hl=chromecache_93.6.drfalse
                                  unknown
                                  https://support.google.com/accounts?hl=chromecache_87.6.drfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://policies.google.com/terms/locationchromecache_93.6.drfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://policies.google.com/privacychromecache_93.6.drfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://support.google.com/accounts?p=new-si-uichromecache_93.6.drfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://apis.google.com/js/rpc:shindig_random.js?onload=credentialservice.postMessagechromecache_87.6.drfalse
                                  • URL Reputation: safe
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  142.250.186.46
                                  youtube-ui.l.google.comUnited States
                                  15169GOOGLEUSfalse
                                  216.58.212.164
                                  www.google.comUnited States
                                  15169GOOGLEUSfalse
                                  172.217.16.206
                                  unknownUnited States
                                  15169GOOGLEUSfalse
                                  172.217.18.14
                                  play.google.comUnited States
                                  15169GOOGLEUSfalse
                                  216.58.206.78
                                  youtube.comUnited States
                                  15169GOOGLEUSfalse
                                  239.255.255.250
                                  unknownReserved
                                  unknownunknownfalse
                                  172.217.16.142
                                  www3.l.google.comUnited States
                                  15169GOOGLEUSfalse
                                  IP
                                  192.168.2.8
                                  192.168.2.6
                                  Joe Sandbox version:41.0.0 Charoite
                                  Analysis ID:1523038
                                  Start date and time:2024-10-01 00:41:06 +02:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 4m 57s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:16
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:file.exe
                                  Detection:MAL
                                  Classification:mal64.evad.winEXE@31/38@12/9
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HCA Information:
                                  • Successful, ratio: 96%
                                  • Number of executed functions: 38
                                  • Number of non-executed functions: 313
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                  • Excluded IPs from analysis (whitelisted): 142.250.185.131, 142.250.184.238, 66.102.1.84, 34.104.35.123, 142.250.181.227, 142.250.186.35, 172.217.16.202, 216.58.206.42, 142.250.186.74, 142.250.186.42, 216.58.212.170, 142.250.74.202, 216.58.206.74, 142.250.185.106, 142.250.186.170, 172.217.23.106, 142.250.184.202, 172.217.18.10, 142.250.186.138, 142.250.181.234, 142.250.185.74, 142.250.186.106, 192.229.221.95, 216.58.212.138, 142.250.185.138, 142.250.185.170, 142.250.185.202, 172.217.18.106, 142.250.185.163, 142.250.186.174
                                  • Excluded domains from analysis (whitelisted): clients1.google.com, fs.microsoft.com, accounts.google.com, content-autofill.googleapis.com, slscr.update.microsoft.com, fonts.gstatic.com, clientservices.googleapis.com, fe3cr.delivery.mp.microsoft.com, clients2.google.com, ocsp.digicert.com, edgedl.me.gvt1.com, update.googleapis.com, clients.l.google.com, www.gstatic.com, optimizationguide-pa.googleapis.com
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size exceeded maximum capacity and may have missing disassembly code.
                                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                  • VT rate limit hit for: file.exe
                                  No simulations
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  239.255.255.250https://bestratedrobotvacuum.com/?bypass-cdn=1Get hashmaliciousUnknownBrowse
                                    file.exeGet hashmaliciousUnknownBrowse
                                      http://customervoice.microsoft.com/Pages/ResponsePage.aspx?id=rCxHFZLdZUGNvhn9cgWChLhuCDtpfZJDs2F6orjCzx1UQTZXSUlaNE5INzZVSkgxRlBKR1RMSTVRTi4uGet hashmaliciousHTMLPhisherBrowse
                                        file.exeGet hashmaliciousUnknownBrowse
                                          https://wtm.ventes-privees-du-jour.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Get hashmaliciousUnknownBrowse
                                            file.exeGet hashmaliciousUnknownBrowse
                                              http://azgop.org/Get hashmaliciousUnknownBrowse
                                                file.exeGet hashmaliciousUnknownBrowse
                                                  file.exeGet hashmaliciousUnknownBrowse
                                                    file.exeGet hashmaliciousUnknownBrowse
                                                      No context
                                                      No context
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      1138de370e523e824bbca92d049a3777file.exeGet hashmaliciousUnknownBrowse
                                                      • 23.206.229.226
                                                      http://customervoice.microsoft.com/Pages/ResponsePage.aspx?id=rCxHFZLdZUGNvhn9cgWChLhuCDtpfZJDs2F6orjCzx1UQTZXSUlaNE5INzZVSkgxRlBKR1RMSTVRTi4uGet hashmaliciousHTMLPhisherBrowse
                                                      • 23.206.229.226
                                                      file.exeGet hashmaliciousUnknownBrowse
                                                      • 23.206.229.226
                                                      https://taplink.cc/universalgrcGet hashmaliciousUnknownBrowse
                                                      • 23.206.229.226
                                                      file.exeGet hashmaliciousUnknownBrowse
                                                      • 23.206.229.226
                                                      American-equity Updated Employee sheet .odtGet hashmaliciousHTMLPhisherBrowse
                                                      • 23.206.229.226
                                                      jKSjtQ8W7O.lnkGet hashmaliciousPureLog Stealer, zgRATBrowse
                                                      • 23.206.229.226
                                                      https://formacionadieste.com.de/Vrvz/Get hashmaliciousHTMLPhisherBrowse
                                                      • 23.206.229.226
                                                      https://vh.gskoffihoura.com/okta.vailhealth.org/oauth2/v1/authorize&client_id=okta-2b1959c8-bcc0-56ebGet hashmaliciousUnknownBrowse
                                                      • 23.206.229.226
                                                      https://timetraveltv.com/actions/cart_update.php?currency=GBP&return_url=https://blog.acelyaokcu.com/m/?c3Y9bzM2NV8xX29uZSZyYW5kPVdrcFNRMHM9JnVpZD1VU0VSMDkwOTIwMjRVMTIwOTA5MDE=N0123N%5BEMAILGet hashmaliciousUnknownBrowse
                                                      • 23.206.229.226
                                                      28a2c9bd18a11de089ef85a160da29e4https://bestratedrobotvacuum.com/?bypass-cdn=1Get hashmaliciousUnknownBrowse
                                                      • 13.85.23.86
                                                      • 184.28.90.27
                                                      file.exeGet hashmaliciousUnknownBrowse
                                                      • 13.85.23.86
                                                      • 184.28.90.27
                                                      http://customervoice.microsoft.com/Pages/ResponsePage.aspx?id=rCxHFZLdZUGNvhn9cgWChLhuCDtpfZJDs2F6orjCzx1UQTZXSUlaNE5INzZVSkgxRlBKR1RMSTVRTi4uGet hashmaliciousHTMLPhisherBrowse
                                                      • 13.85.23.86
                                                      • 184.28.90.27
                                                      file.exeGet hashmaliciousUnknownBrowse
                                                      • 13.85.23.86
                                                      • 184.28.90.27
                                                      https://wtm.ventes-privees-du-jour.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Get hashmaliciousUnknownBrowse
                                                      • 13.85.23.86
                                                      • 184.28.90.27
                                                      file.exeGet hashmaliciousUnknownBrowse
                                                      • 13.85.23.86
                                                      • 184.28.90.27
                                                      http://azgop.org/Get hashmaliciousUnknownBrowse
                                                      • 13.85.23.86
                                                      • 184.28.90.27
                                                      file.exeGet hashmaliciousUnknownBrowse
                                                      • 13.85.23.86
                                                      • 184.28.90.27
                                                      file.exeGet hashmaliciousUnknownBrowse
                                                      • 13.85.23.86
                                                      • 184.28.90.27
                                                      file.exeGet hashmaliciousUnknownBrowse
                                                      • 13.85.23.86
                                                      • 184.28.90.27
                                                      No context
                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Sep 30 21:42:09 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                      Category:dropped
                                                      Size (bytes):2677
                                                      Entropy (8bit):3.9781108324261654
                                                      Encrypted:false
                                                      SSDEEP:48:8ew0dYTcYAHKidAKZdA1oehwiZUklqehQy+3:8vHvovy
                                                      MD5:EB8F29D8D3533D03FDD0FF392FF60BC0
                                                      SHA1:58603F277E0B738DD98E4736781F4498B60792A8
                                                      SHA-256:105304121BEAE6AF296C89C59D790A731975C35BCD585FE5CDC8BB7065455309
                                                      SHA-512:A47E7C26BC0D9AE660C3417856CF709A15AB0AF358D69DF38D396FC6B57F703F0FCC895F44E33FD35485C4D8F0F2D7343D79AF21ED6EEEC8FE39F1B243BD260B
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:L..................F.@.. ...$+.,.....h......N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW)C..PROGRA~1..t......O.I>YC.....B...............J.....V...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V>YC.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V>YC.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V>YC............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V>YE............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........8..~.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Sep 30 21:42:09 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                      Category:dropped
                                                      Size (bytes):2679
                                                      Entropy (8bit):3.9919946505824435
                                                      Encrypted:false
                                                      SSDEEP:48:80w0dYTcYAHKidAKZdA1leh/iZUkAQkqehfy+2:85HvC9QWy
                                                      MD5:009CF82501CE14177D55B11E8E6F5ADC
                                                      SHA1:55F6913F9EAEFF8EF46EBA9F6EDC1A4CF1A59DAA
                                                      SHA-256:E6778C5343ED8550BD336F1CBE13BD725C81D404508177E5CAF126D0EF875B30
                                                      SHA-512:3A927BD0F65067ACA72D3E960720F7F028BE657C98318038AE0DA8400E04D2F14A08B6B3A52A96C5A3E4889F608A0F076CB00B9FF8D09B09F04C4E92AFCDE3C9
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:L..................F.@.. ...$+.,....\.......N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW)C..PROGRA~1..t......O.I>YC.....B...............J.....V...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V>YC.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V>YC.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V>YC............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V>YE............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........8..~.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 5 07:00:51 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                      Category:dropped
                                                      Size (bytes):2693
                                                      Entropy (8bit):4.005613010052517
                                                      Encrypted:false
                                                      SSDEEP:48:8Aw0dYTcYbHKidAKZdA14t5eh7sFiZUkmgqeh7sVy+BX:8tHvvnjy
                                                      MD5:BE202AD485C6FEE2D89D0F53D08A6648
                                                      SHA1:05AFF6E0857F6BDF567F2805FE1D0A5DE9CD34BA
                                                      SHA-256:76A78D6B41F319D2EF74B7280361BD9C4EA73457607FC269F7A57E738B62DB50
                                                      SHA-512:D8E4C47D81627C856403CA9615479A49B70F4A810DA55E0A6C886EEC8A804ED27E6A6A2103458646C93C01811B0E75DBAC8EF09ED1B9C9F00C16A67FAC954A60
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:L..................F.@.. ...$+.,.....C..b...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW)C..PROGRA~1..t......O.I>YC.....B...............J.....V...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V>YC.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V>YC.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V>YC............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VEW.@...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........8..~.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Sep 30 21:42:09 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                      Category:dropped
                                                      Size (bytes):2681
                                                      Entropy (8bit):3.993305191230751
                                                      Encrypted:false
                                                      SSDEEP:48:8aw0dYTcYAHKidAKZdA16ehDiZUkwqehLy+R:8jHvZdy
                                                      MD5:5D7C5BFD989313A37F36313B190B99A2
                                                      SHA1:7318C7EDAFA6C140ACE0A2AA93CE940A7FFBB6A9
                                                      SHA-256:9A010458361DC200E6929835C847F894C6D5B55033BE03ED6CB34BFB2A5E9F3C
                                                      SHA-512:40E4D41B66BF7C294601DE07C461B4B96AC9945B3D16A4C582366E46D9729332988FA936B0B0E1330AE647B97223F351ACD9779FAAB197276E776E1A338099DF
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:L..................F.@.. ...$+.,.....U......N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW)C..PROGRA~1..t......O.I>YC.....B...............J.....V...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V>YC.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V>YC.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V>YC............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V>YE............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........8..~.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Sep 30 21:42:09 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                      Category:dropped
                                                      Size (bytes):2681
                                                      Entropy (8bit):3.9809607012948147
                                                      Encrypted:false
                                                      SSDEEP:48:89w0dYTcYAHKidAKZdA1UehBiZUk1W1qehJy+C:8KHvJ9py
                                                      MD5:1D32A8F916F3F47F3012CF14F0B95E73
                                                      SHA1:34B5F2A6591B10FB6B8CCD69A3F51825D093F747
                                                      SHA-256:267F8A049CC4175C0F475B339D6F98DBDE10AD7C8D550AD0BD32FC318B1A3C10
                                                      SHA-512:82544E3C9E191AEB1B1BF5A77CDA280806D559617FAB73830845C3CF57E7F641DB798DD2AC1BA5AA7D8963B4479270DC8D760B873AAB51A68780831DB4C71605
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:L..................F.@.. ...$+.,....qA......N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW)C..PROGRA~1..t......O.I>YC.....B...............J.....V...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V>YC.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V>YC.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V>YC............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V>YE............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........8..~.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Sep 30 21:42:09 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                      Category:dropped
                                                      Size (bytes):2683
                                                      Entropy (8bit):3.9931572183694004
                                                      Encrypted:false
                                                      SSDEEP:48:8Ww0dYTcYAHKidAKZdA1duTrehOuTbbiZUk5OjqehOuTbjy+yT+:8HHv2TYTbxWOvTbjy7T
                                                      MD5:EA6BD35ACF62BE26D518404A46CFE453
                                                      SHA1:43B6817C76F9979CDBA1BA99D1CFC6A8441E22D5
                                                      SHA-256:201DF935478F13E3C58EDC971268D287960C422A4E2B7B841AF1A496C287380C
                                                      SHA-512:7D481BEE656D318A31C382300FFEE9054DBE171A62F1D5CE1B51A91A6DAEDBB47C43BDF02181A97C19FDDBFB458AD428A068776F60D235DBCD76B2C97C0DE13B
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:L..................F.@.. ...$+.,....u......N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW)C..PROGRA~1..t......O.I>YC.....B...............J.....V...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V>YC.....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V>YC.....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V>YC............................"&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V>YE............................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i...........8..~.....C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      File Type:ASCII text, with very long lines (395)
                                                      Category:downloaded
                                                      Size (bytes):1652
                                                      Entropy (8bit):5.296387798840289
                                                      Encrypted:false
                                                      SSDEEP:48:o7YNJvl3WlDQENrpB3stYCIgMxILNH/wf7DVTBpdQrw:o5fpB8iDwYlGw
                                                      MD5:F18EA2D35027D6173E2864B5863CB6E3
                                                      SHA1:1979174E786593DAFD2B23084F26332AB929216C
                                                      SHA-256:547E151C2D842255451D651B749239B28DED9F803B524A77BD1E14D878BDAF58
                                                      SHA-512:A031A439A99BCA557951A75234766033145E7D05E8453A4FE9BC0EA091E49BA59AF1479850D1E896B2D114575A80CCE111A787E7EEA9A7F288C78AD325436C18
                                                      Malicious:false
                                                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHcuwDoV1_a7sThPZwbu2Ah9zAL5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=xUdipf,OTA3Ae,A1yn5d,fKUV3e,aurFic,Ug7Xab,NwH0H,OmgaI,gychg,w9hDv,EEDORb,Mlhmy,ZfAoz,kWgXee,ovKuLd,yDVVkb,ebZ3mb,ZDZcre,A7fCU"
                                                      Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("w9hDv");._.zg(_.Kla);_.$z=function(a){_.X.call(this,a.Fa);this.aa=a.Wa.cache};_.J(_.$z,_.X);_.$z.Ba=function(){return{Wa:{cache:_.Zs}}};_.$z.prototype.execute=function(a){_.Gb(a,function(b){var c;_.df(b)&&(c=b.eb.jc(b.jb));c&&this.aa.oG(c)},this);return{}};_.iu(_.Qla,_.$z);._.l();._.k("lOO0Vd");._.HZa=new _.uf(_.Km);._.l();._.k("ZDZcre");.var ZG=function(a){_.X.call(this,a.Fa);this.Nl=a.Ea.Nl;this.G3=a.Ea.metadata;this.aa=a.Ea.Ws};_.J(ZG,_.X);ZG.Ba=function(){return{Ea:{Nl:_.DG,metadata:_.HZa,Ws:_.AG}}};ZG.prototype.execute=function(a){var b=this;a=this.aa.create(a);return _.Gb(a,function(c){var d=b.G3.getType(c.Md())===2?b.Nl.Pb(c):b.Nl.fetch(c);return _.Jl(c,_.EG)?d.then(function(e){return _.Jd(e)}):d},this)};_.iu(_.Vla,ZG);._.l();._.k("K5nYTd");._.GZa=new _.uf(_.Rla);._.l();._.k("sP4Vbe");.._.l();._.k("kMFpHd");.._.l();._.k("A7fCU");.var GG=function(a){_.X.call(this,a
                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      File Type:ASCII text, with very long lines (683)
                                                      Category:downloaded
                                                      Size (bytes):3131
                                                      Entropy (8bit):5.3750044852869046
                                                      Encrypted:false
                                                      SSDEEP:48:o7zfN/cD498xdg+Y5jNQ8js6npwk0OmNAEZbpMzR4EQBcW5QcHj9KWfGAeFKRrw:oCD9dA5jOEGh+EFqR4rhqUhzff9w
                                                      MD5:39693D34EE3D1829DBB1627C4FC6687B
                                                      SHA1:A03303C2F027F3749B48D5134D1F8FB3E495C6E9
                                                      SHA-256:03B0C1B4E402E0BCF75D530DD9085B25357EEFD09E238453DE1F3A042542C076
                                                      SHA-512:AC0749EDC33DA0EC0E40470388DD797B6528AD08B8FAC1C2AC42F85198131052BA1B533E90409D35DA237607E8B07D591FA6BA580B6A90B0D0AB2282A01F7585
                                                      Malicious:false
                                                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=A1yn5d,A7fCU,AvtSve,CMcBD,E87wgc,EEDORb,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,Mlhmy,MpJwZc,NOeYWe,NTMZac,NwH0H,O6y8ed,OTA3Ae,OmgaI,PHUIyb,PrPYRd,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,Ug7Xab,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZfAoz,_b,_tp,aC1iue,aW3pY,aurFic,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,ebZ3mb,f8Gu1e,fKUV3e,gJzDyc,gychg,hc6Ubd,inNHtf,iyZMqd,kWgXee,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,ovKuLd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xUdipf,xiZRqc,y5vRwf,yDVVkb,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHcuwDoV1_a7sThPZwbu2Ah9zAL5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=ZwDk9d,RMhBfe"
                                                      Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("ZwDk9d");.var bA=function(a){_.X.call(this,a.Fa)};_.J(bA,_.X);bA.Ba=_.X.Ba;bA.prototype.wR=function(a){return _.af(this,{Wa:{HS:_.ol}}).then(function(b){var c=window._wjdd,d=window._wjdc;return!c&&d?new _.oi(function(e){window._wjdc=function(f){d(f);e(PJa(f,b,a))}}):PJa(c,b,a)})};var PJa=function(a,b,c){return(a=a&&a[c])?a:b.Wa.HS.wR(c)};.bA.prototype.aa=function(a,b){var c=_.csa(b).Gj;if(c.startsWith("$")){var d=_.jm.get(a);_.xq[b]&&(d||(d={},_.jm.set(a,d)),d[c]=_.xq[b],delete _.xq[b],_.yq--);if(d)if(a=d[c])b=_.ef(a);else throw Error("Jb`"+b);else b=null}else b=null;return b};_.iu(_.Mfa,bA);._.l();._.k("SNUn3");._.OJa=new _.uf(_.Ag);._.l();._.k("RMhBfe");.var QJa=function(a){var b=_.wq(a);return b?new _.oi(function(c,d){var e=function(){b=_.wq(a);var f=_.Tfa(a,b);f?c(f.getAttribute("jsdata")):window.document.readyState=="complete"?(f=["Unable to find deferred jsdata wit
                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      File Type:ASCII text, with very long lines (3346)
                                                      Category:downloaded
                                                      Size (bytes):22827
                                                      Entropy (8bit):5.420322672717721
                                                      Encrypted:false
                                                      SSDEEP:384:/jqdWXWfyA20UUjDE8BSUxDJs16KHvSN34kaHaN+587SaXD2mLR0H:/jqdWXAUUjDE84Wi6KPSKjHaN+58+0J2
                                                      MD5:2B29741A316862EE788996DD29116DD5
                                                      SHA1:9D5551916D4452E977C39B8D69CF88DF2AAA462B
                                                      SHA-256:62955C853976B722EFBB4C116A10DB3FF54580EDD7495D280177550B8F4289AB
                                                      SHA-512:6E37C3258F07F29909763728DADE0CD40A3602D55D9099F78B37756926FCF2A50008B82876B518FEAF3E56617F0F7D1D37A73C346A99A58E6AD8BCD6689E9B15
                                                      Malicious:false
                                                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=AvtSve,CMcBD,E87wgc,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PHUIyb,PrPYRd,Rkm0ef,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,f8Gu1e,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHcuwDoV1_a7sThPZwbu2Ah9zAL5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=RqjULd"
                                                      Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.pu.prototype.da=_.ca(38,function(){return _.vj(this,3)});_.Vy=function(a,b){this.key=a;this.defaultValue=!1;this.flagName=b};_.Vy.prototype.ctor=function(a){return typeof a==="boolean"?a:this.defaultValue};_.Wy=function(){this.ka=!0;var a=_.Bj(_.jk(_.Fe("TSDtV",window),_.pya),_.pu,1,_.uj())[0];if(a){var b={};for(var c=_.n(_.Bj(a,_.qya,2,_.uj())),d=c.next();!d.done;d=c.next()){d=d.value;var e=_.Nj(d,1).toString();switch(_.xj(d,_.qu)){case 3:b[e]=_.Lj(d,_.pj(d,_.qu,3));break;case 2:b[e]=_.Nj(d,_.pj(d,_.qu,2));break;case 4:b[e]=_.Oj(d,_.pj(d,_.qu,4));break;case 5:b[e]=_.L(d,_.pj(d,_.qu,5));break;case 6:b[e]=_.Sj(d,_.kf,6,_.qu);break;default:throw Error("id`"+_.xj(d,_.qu));}}}else b={};this.ea=b;this.token=.a?a.da():null};_.Wy.prototype.aa=function(a){if(!this.ka||a.key in this.ea)a=a.ctor(this.ea[a.key]);else if(_.Fe("nQyAE",window)){var b=_.sya(a.flagName);if(b===null)a=a.def
                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      File Type:ASCII text, with very long lines (2544)
                                                      Category:downloaded
                                                      Size (bytes):358292
                                                      Entropy (8bit):5.622523467644739
                                                      Encrypted:false
                                                      SSDEEP:3072:sy/lJpABa9hEP2iyjV5ygVLdh3YB4qyhLD6Crjyp3Sm5pnrjtuo0MpLEKusgI8sw:TyTNoygVWyhoDAMpL5gI8seqfhP3p+L
                                                      MD5:14049A4F8FB34A2FA52A0358C72B2F2E
                                                      SHA1:680985BDBE3FA830B31A9F02D40AFE925C12E70E
                                                      SHA-256:56C112F31C6F61735FE5EBD188AD0928406F04454AFEC139297328D3EE6540B4
                                                      SHA-512:5637742A7E2936540D957BA8A09991478EF0D4C28A3DA92D5260C7D5DA7BFD20811AFA26C0B53DD88D4A536B3C40A21ACA3310EFC17508A1C806B76ACB320631
                                                      Malicious:false
                                                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=AvtSve,EFQ78c,EIOG1e,GwYlN,I6YDgd,IZT63,K0PMbc,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PrPYRd,Rkm0ef,SCuOPb,STuCOe,SpsfSb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,ZakeSe,_b,_tp,aC1iue,aW3pY,bSspM,byfTOb,cYShmd,eVCnO,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,lwddkf,m9oV,mzzZzc,n73qwf,njlZCf,oLggrd,qPfo0c,qmdT9,rCcCxc,siKnQd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,y5vRwf,zbML3c,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHcuwDoV1_a7sThPZwbu2Ah9zAL5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=K1ZKnb,ziZ8Mc,b3kMqb,mvkUhe,CMcBD,Fndnac,t2srLd,EN3i8d,z0u0L,xiZRqc"
                                                      Preview:"use strict";_F_installCss(".r4WGQb{position:relative}.Dl08I>:first-child{margin-top:0}.Dl08I>:last-child{margin-bottom:0}.IzwVE{color:#1f1f1f;color:var(--gm3-sys-color-on-surface,#1f1f1f);font-family:\"Google Sans\",roboto,\"Noto Sans Myanmar UI\",arial,sans-serif;font-size:1.25rem;font-weight:400;letter-spacing:0rem;line-height:1.2}.l5PPKe{color:#1f1f1f;color:var(--gm3-sys-color-on-surface,#1f1f1f);font-size:1rem}.l5PPKe .dMNVAe{margin:0;padding:0}.l5PPKe>:first-child{margin-top:0;padding-top:0}.l5PPKe>:last-child{margin-bottom:0;padding-bottom:0}.Dl08I{margin:0;padding:0;position:relative}.Dl08I>.SmR8:only-child{padding-top:1px}.Dl08I>.SmR8:only-child::before{top:0}.Dl08I>.SmR8:not(first-child){padding-bottom:1px}.Dl08I>.SmR8::after{bottom:0}.Dl08I>.SmR8:only-child::before,.Dl08I>.SmR8::after{border-bottom:1px solid #c4c7c5;border-bottom:1px solid var(--gm3-sys-color-outline-variant,#c4c7c5);content:\"\";height:0;left:0;position:absolute;width:100%}.aZvCDf{margin-top:8px;margin-left
                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      File Type:MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                                                      Category:downloaded
                                                      Size (bytes):5430
                                                      Entropy (8bit):3.6534652184263736
                                                      Encrypted:false
                                                      SSDEEP:48:wIJct3xIAxG/7nvWDtZcdYLtX7B6QXL3aqG8Q:wIJct+A47v+rcqlBPG9B
                                                      MD5:F3418A443E7D841097C714D69EC4BCB8
                                                      SHA1:49263695F6B0CDD72F45CF1B775E660FDC36C606
                                                      SHA-256:6DA5620880159634213E197FAFCA1DDE0272153BE3E4590818533FAB8D040770
                                                      SHA-512:82D017C4B7EC8E0C46E8B75DA0CA6A52FD8BCE7FCF4E556CBDF16B49FC81BE9953FE7E25A05F63ECD41C7272E8BB0A9FD9AEDF0AC06CB6032330B096B3702563
                                                      Malicious:false
                                                      URL:https://www.google.com/favicon.ico
                                                      Preview:............ .h...&... .... .........(....... ..... ............................................0...................................................................................................................................v.].X.:.X.:.r.Y........................................q.X.S.4.S.4.S.4.S.4.S.4.S.4...X....................0........q.W.S.4.X.:.................J...A...g.........................K.H.V.8..........................F..B.....................,.......................................B..............................................B..B..B..B..B...u..........................................B..B..B..B..B...{.................5.......k...........................................................7R..8F.................................................2........Vb..5C..;I..................R^.....................0................Xc..5C..5C..5C..5C..5C..5C..lv..........................................]i..<J..:G..Zf....................................................
                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      File Type:ASCII text, with very long lines (553)
                                                      Category:downloaded
                                                      Size (bytes):603951
                                                      Entropy (8bit):5.789948381047936
                                                      Encrypted:false
                                                      SSDEEP:3072:W0pApkygA62bwwdnO2YflNYhFGOizdGj008PpVVM96C5bMEPQUhts6FV8eKqtVAT:WlgNmwwdnOsF98oNGuQRAYqXsI1+
                                                      MD5:A97373CC3F8795654F3C8C6B57066AE7
                                                      SHA1:F7BECFDDE230EF537E8745B598DCED737C490C3C
                                                      SHA-256:A1B0568D555DC4B4AF4CC5A6C41E838B702816445C04FF002C8A13058387F311
                                                      SHA-512:47C76D26F4F9F206F93186800E06D3DBE1FDD0A1BA23FB9A3556390DE7F86C1FFB2C78FE307FB944C690475BFBAE9738C38233E00FDDFA9775A3B2030081D7F1
                                                      Malicious:false
                                                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/excm=_b,_tp,identifierview/ed=1/dg=0/wt=2/ujg=1/rs=AOaEmlEQAz5EZnBR6fK6LIn1v8ILsATM3g/m=_b,_tp"
                                                      Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._._F_toggles_initialize=function(a){(typeof globalThis!=="undefined"?globalThis:typeof self!=="undefined"?self:this)._F_toggles=a||[]};(0,_._F_toggles_initialize)([0x286081c4, 0x2046d860, 0x1ce13c40, 0x51407a0, 0x1908, 0x0, 0x1b400000, 0x19a00000, 0x0, ]);./*.. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright Google LLC. SPDX-License-Identifier: Apache-2.0.*/./*.. Copyright 2024 Google, Inc. SPDX-License-Identifier: MIT.*/./*. SPDX-License-Identifier: Apache-2.0.*/./*. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/.var baa,daa,Na,Ua,gaa,iaa,lb,qaa,xaa,Daa,Iaa,Laa,Mb,Maa,Rb,Vb,Wb,Naa,Oaa,Xb,Paa,Qaa,Raa,ac,Waa,Yaa,ic,jc,kc,cba,dba,hba,kba,mba,nba,rba,uba,oba,tba,sba,qba,pba,vba,zba,Dba,Eba,Bba,Kc,Lc,Hba,Jba,Nba,Oba,Pba,Qba,Mba,Rba,Tba,gd,Vba,Wba,Yba,$ba,Zba,bca,cca,dca,eca,gca,fca,ica,jca,kca,lca,oca,r
                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      File Type:ASCII text, with very long lines (533)
                                                      Category:downloaded
                                                      Size (bytes):9210
                                                      Entropy (8bit):5.3872171131917925
                                                      Encrypted:false
                                                      SSDEEP:192:FK/pAzN7GZ068Hqhqu6DQaVapzYjgKItwdiwUsYRTi1j1t9bRl9:FqI7GZ04dRYjghtgisYYbt9ll9
                                                      MD5:AB70454DE18E1CE16E61EAC290FC304D
                                                      SHA1:68532B5E8B262D7E14B8F4507AA69A61146B3C18
                                                      SHA-256:B32D746867CC4FA21FD39437502F401D952D0A3E8DC708DFB7D58B85F256C0F1
                                                      SHA-512:A123C517380BEF0B47F23A5A6E1D16650FE39D9C701F9FA5ADD79294973C118E8EA3A7BA32CB63C3DFC0CE0F843FB86BFFCAA2AAE987629E7DFF84F176DEBB98
                                                      Malicious:false
                                                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=AvtSve,CMcBD,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,MpJwZc,NOeYWe,NTMZac,O6y8ed,PrPYRd,Rkm0ef,SCuOPb,STuCOe,SpsfSb,UUJqVe,Uas9Hd,WpP9Yc,XVq9Qb,YHI3We,YTxL4,ZakeSe,_b,_tp,aC1iue,aW3pY,b3kMqb,bSspM,byfTOb,cYShmd,eVCnO,gJzDyc,hc6Ubd,inNHtf,iyZMqd,lsjVmc,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,qPfo0c,qmdT9,rCcCxc,siKnQd,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,ws9Tlc,xBaz7b,xQtZb,xiZRqc,y5vRwf,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHcuwDoV1_a7sThPZwbu2Ah9zAL5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=ltDFwf,SD8Jgb,rmumx,E87wgc,qPYxq,Tbb4sb,pxq3x,f8Gu1e,soHxf,YgOFye,yRXbo,bTi8wc,ywOR5c,PHUIyb"
                                                      Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.gNa=_.y("SD8Jgb",[]);._.QX=function(a,b){if(typeof b==="string")a.Nc(b);else if(b instanceof _.Ip&&b.ia&&b.ia===_.B)b=_.$a(b.ww()),a.empty().append(b);else if(b instanceof _.Wa)b=_.$a(b),a.empty().append(b);else if(b instanceof Node)a.empty().append(b);else throw Error("Vf");};_.RX=function(a){var b=_.Lo(a,"[jsslot]");if(b.size()>0)return b;b=new _.Jo([_.Qk("span")]);_.Mo(b,"jsslot","");a.empty().append(b);return b};_.TKb=function(a){return a===null||typeof a==="string"&&_.Ki(a)};._.k("SD8Jgb");._.WX=function(a){_.Y.call(this,a.Fa);this.Ua=a.controller.Ua;this.kd=a.controllers.kd[0]||null;this.header=a.controller.header;this.nav=a.controller.nav;var b;(b=this.oa().find("button:not([type])").el())==null||b.setAttribute("type","button")};_.J(_.WX,_.Y);_.WX.Ba=function(){return{controller:{Ua:{jsname:"n7vHCb",ctor:_.hv},header:{jsname:"tJHJj",ctor:_.hv},nav:{jsname:"DH6Rkf",ct
                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      File Type:Web Open Font Format (Version 2), TrueType, length 52280, version 1.0
                                                      Category:downloaded
                                                      Size (bytes):52280
                                                      Entropy (8bit):7.995413196679271
                                                      Encrypted:true
                                                      SSDEEP:1536:1rvqtK8DZilXxwJ8mMwAZy7phqsFLdG3B4d:xytBZits8bw4wzbFxG3B4d
                                                      MD5:F61F0D4D0F968D5BBA39A84C76277E1A
                                                      SHA1:AA3693EA140ECA418B4B2A30F6A68F6F43B4BEB2
                                                      SHA-256:57147F08949ABABE7DEEF611435AE418475A693E3823769A25C2A39B6EAD9CCC
                                                      SHA-512:6C3BD90F709BCF9151C9ED9FFEA55C4F6883E7FDA2A4E26BF018C83FE1CFBE4F4AA0DB080D6D024070D53B2257472C399C8AC44EEFD38B9445640EFA85D5C487
                                                      Malicious:false
                                                      URL:https://fonts.gstatic.com/s/googlesans/v58/4UaRrENHsxJlGDuGo1OIlJfC6l_24rlCK1Yo_Iq2vgCI.woff2
                                                      Preview:wOF2.......8.....................................^...$..4?HVAR..?MVAR9.`?STAT.*',..J/.......`..(..Z.0..R.6.$.... .....K..[..q..c..T.....>.P.j.`.w..#...%......N.".....$..3.0.6......... .L.rX/r[j.y.|*(.4.%#.....2.v.m..-..%.....;-.Y.{..&..O=#l@...k..7g..ZI...#.Z./+T..r7...M..3).Z%.x....s..sL..[A!.5*1w'/.8V..2Z..%.X.h.o.).]..9..Q`.$.....7..kZ.~O........d..g.n.d.Rw+&....Cz..uy#..fz,(.J....v.%..`..9.....h...?O..:...c%.....6s....xl..#...5..._......1.>.)"U.4 W....?%......6//!$...!.n9C@n...........!""^.....W..Z<.7.x.."UT.T....E.."R>.R..t.....H d..e_.K../.+8.Q.P.ZQ....;...U....]......._.e*......71.?.7.ORv.?...l...G|.P...|:...I.X..2.,.L........d.g.]}W#uW]QnuP-s.;.-Y.....].......C..j_.M0...y.......J..........NY..@A...,....-.F......'..w./j5g.vUS...U..0.&...y7.LP.....%.....Y......Y..D. e.A..G.?.$.......6...eaK.n5.m...N...,...+BCl..L> .E9~.b[.w.x....6<...}.e...%V....O.......*.?...a..#[eE.4..p..$...].....%......o._......N.._~..El....b..A.0.r8.....|..D.d..
                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      File Type:ASCII text, with very long lines (1694)
                                                      Category:downloaded
                                                      Size (bytes):32499
                                                      Entropy (8bit):5.361345284201954
                                                      Encrypted:false
                                                      SSDEEP:768:mLX1O+aL6fgyIiREM4RKmh90toLoTswtF3ATcbDR6kIsnJd9DPyMv/FI:U2M4oltoLoTswtFoc/tIsnXFLI
                                                      MD5:D5C3FB8EAE24AB7E40009338B5078496
                                                      SHA1:5638BF5986A6445A88CD79A9B690B744B126BEC2
                                                      SHA-256:597C14D360D690BCFDC2B8D315E6BB8879AEF33DE6C30D274743079BDB63C6B0
                                                      SHA-512:6AE434850D473BEF15AA694AB4862596982CDDA6BD3991991D3ADD8F4A5F61DFBF8756D0DA98B72EF083909D68CF7B6B148A6488E9381F92FBF15CCB20176A0E
                                                      Malicious:false
                                                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=_b,_tp/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHcuwDoV1_a7sThPZwbu2Ah9zAL5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=byfTOb,lsjVmc,LEikZe"
                                                      Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{.var qua=function(a,b){this.da=a;this.ea=b;if(!c){var c=new _.gp("//www.google.com/images/cleardot.gif");_.rp(c)}this.ka=c};_.h=qua.prototype;_.h.Vc=null;_.h.QY=1E4;_.h.Iz=!1;_.h.TP=0;_.h.qJ=null;_.h.DU=null;_.h.setTimeout=function(a){this.QY=a};_.h.start=function(){if(this.Iz)throw Error("dc");this.Iz=!0;this.TP=0;rua(this)};_.h.stop=function(){sua(this);this.Iz=!1};.var rua=function(a){a.TP++;navigator!==null&&"onLine"in navigator&&!navigator.onLine?_.om((0,_.eg)(a.JG,a,!1),0):(a.aa=new Image,a.aa.onload=(0,_.eg)(a.Xia,a),a.aa.onerror=(0,_.eg)(a.Wia,a),a.aa.onabort=(0,_.eg)(a.Via,a),a.qJ=_.om(a.Yia,a.QY,a),a.aa.src=String(a.ka))};_.h=qua.prototype;_.h.Xia=function(){this.JG(!0)};_.h.Wia=function(){this.JG(!1)};_.h.Via=function(){this.JG(!1)};_.h.Yia=function(){this.JG(!1)};._.h.JG=function(a){sua(this);a?(this.Iz=!1,this.da.call(this.ea,!0)):this.TP<=0?rua(this):(this.Iz=!1,
                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      File Type:ASCII text, with very long lines (3190)
                                                      Category:downloaded
                                                      Size (bytes):339369
                                                      Entropy (8bit):5.533022690974177
                                                      Encrypted:false
                                                      SSDEEP:3072:9hFx8tVGv15Iyr4t4s2GvgHVTYDh+rvVvurtVEWzcLmLyszIm8j2kzU:9NlvE+zTYDh+rvh8cLMijFg
                                                      MD5:FF16B667178352EFDF164CE3F16A8F55
                                                      SHA1:E9B1BC661337502E31306B5E7AE37D93C0551455
                                                      SHA-256:625EC33FBA1BFF3734490AC15C8430CDB5850E9159B80F607E093BB73B7F243B
                                                      SHA-512:F197393CB05F94BCEDA0FE3176842E09CFCFC2348DE22C9815DD8369D5D333038E8F93F426994482E2E9731A859FA9B6B6062BAD4AA3BFD3C0730281C4CCADB9
                                                      Malicious:false
                                                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=LEikZe,_b,_tp,byfTOb,lsjVmc/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHcuwDoV1_a7sThPZwbu2Ah9zAL5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=n73qwf,SCuOPb,IZT63,vfuNJf,UUJqVe,ws9Tlc,siKnQd,XVq9Qb,STuCOe,njlZCf,m9oV,vjKJJ,y5vRwf,iyZMqd,NTMZac,mzzZzc,rCcCxc,vvMGie,NOeYWe,O6y8ed,L9OGUe,PrPYRd,MpJwZc,qPfo0c,cYShmd,hc6Ubd,Rkm0ef,KUM7Z,oLggrd,inNHtf,L1AAkb,WpP9Yc,lwddkf,gJzDyc,SpsfSb,aC1iue,tUnxGc,aW3pY,ZakeSe,EFQ78c,xQtZb,I6YDgd,zbML3c,zr1jrb,vHEMJe,YHI3We,YTxL4,bSspM,Uas9Hd,zy0vNb,K0PMbc,AvtSve,qmdT9,MY7mZe,xBaz7b,GwYlN,eVCnO,EIOG1e,LDQI"
                                                      Preview:"use strict";_F_installCss(".EE6QGf{border-bottom-style:solid;border-bottom-width:1px;padding:16px;width:100%;z-index:6;background:#fff;background:var(--gm3-sys-color-surface-container-lowest,#fff);border-color:#c4c7c5;border-color:var(--gm3-sys-color-outline-variant,#c4c7c5);display:block;position:relative}.EE6QGf~.S7xv8,.EE6QGf~.gfM9Zd{padding-top:inherit}@media (min-width:600px){.EE6QGf{align-items:center;display:flex;left:0;position:fixed;top:0}.EE6QGf~.S7xv8,.EE6QGf~.gfM9Zd{padding-top:150px}}@media (min-width:600px) and (orientation:landscape){.EE6QGf{display:block;position:relative}.EE6QGf~.S7xv8,.EE6QGf~.gfM9Zd{padding-top:inherit}}@media (min-width:960px) and (orientation:landscape){.EE6QGf{align-items:center;display:flex;left:0;position:fixed;top:0}.EE6QGf~.S7xv8,.EE6QGf~.gfM9Zd{padding-top:150px}}.PZB4Lc{display:flex;width:100%}.YLIzab{font-family:\"Google Sans\",roboto,\"Noto Sans Myanmar UI\",arial,sans-serif;font-size:1rem;font-weight:500;letter-spacing:0rem;line-height:1
                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      File Type:ASCII text, with very long lines (468)
                                                      Category:downloaded
                                                      Size (bytes):1858
                                                      Entropy (8bit):5.253939888205379
                                                      Encrypted:false
                                                      SSDEEP:48:o7BNJfeFb8L3A6FHqIy5Z+d70OCzSfvi/3fM/r8ZQzRrw:oFuILhFHrVCz0vLZz9w
                                                      MD5:10FF6F99E3228E96AFD6E2C30EF97C0A
                                                      SHA1:4AE3DCB8D1F5A0C302D5BAD9DFF5050A7A5E8130
                                                      SHA-256:95E5546E1C7F311D07BB5050CC456A973E43BCC4777BA6014757376016537679
                                                      SHA-512:116C0B1CAC98A27044100005545AB66BE5F4801D75DC259093A9F145B3A4ACD8DC1C360AF525F6DC8421CD54B675A78023D2ED8B57F5946A3969543758C673C9
                                                      Malicious:false
                                                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=A1yn5d,A7fCU,AvtSve,CMcBD,E87wgc,EEDORb,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,Mlhmy,MpJwZc,NOeYWe,NTMZac,NwH0H,O6y8ed,OTA3Ae,OmgaI,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,Ug7Xab,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZfAoz,ZwDk9d,_b,_tp,aC1iue,aW3pY,aurFic,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,ebZ3mb,f8Gu1e,fKUV3e,gJzDyc,gychg,hc6Ubd,inNHtf,iyZMqd,kWgXee,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,ovKuLd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xUdipf,xiZRqc,y5vRwf,yDVVkb,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHcuwDoV1_a7sThPZwbu2Ah9zAL5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=iAskyc,ziXSP"
                                                      Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("iAskyc");._.$Z=function(a){_.X.call(this,a.Fa);this.window=a.Ea.window.get();this.Mc=a.Ea.Mc};_.J(_.$Z,_.X);_.$Z.Ba=function(){return{Ea:{window:_.lu,Mc:_.vE}}};_.$Z.prototype.Mo=function(){};_.$Z.prototype.addEncryptionRecoveryMethod=function(){};_.a_=function(a){return(a==null?void 0:a.Go)||function(){}};_.b_=function(a){return(a==null?void 0:a.N2)||function(){}};_.OOb=function(a){return(a==null?void 0:a.Mp)||function(){}};._.POb=function(a){return new Map(Array.from(a,function(b){var c=_.n(b);b=c.next().value;c=c.next().value;return[b,c.map(function(d){return{epoch:d.epoch,key:new Uint8Array(d.key)}})]}))};_.QOb=function(a){setTimeout(function(){throw a;},0)};_.$Z.prototype.WN=function(){return!0};_.iu(_.Dn,_.$Z);._.l();._.k("ziXSP");.var t_=function(a){_.$Z.call(this,a.Fa)};_.J(t_,_.$Z);t_.Ba=_.$Z.Ba;t_.prototype.Mo=function(a,b,c){var d;if((d=this.window.chrome)==nu
                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      File Type:ASCII text, with very long lines (755)
                                                      Category:downloaded
                                                      Size (bytes):1416
                                                      Entropy (8bit):5.299417038163051
                                                      Encrypted:false
                                                      SSDEEP:24:kMYD7JqrxsNL90YIzFK/Hb5eNhz1uktdDuvKKKGbLZ99GbSSF/ZR8OkdnprGJ:o7JopFN+ASCKKGbF99GbSS3RY7rw
                                                      MD5:6AEAE74D22F7C2D9658B057EA5D85069
                                                      SHA1:2F4644F53FB4E8EC4AFD49A31C55853F062D284C
                                                      SHA-256:EBFE7B5A1020808B9A02667ECC0E7E460643CBDE84F0B9C410C70A91C9726667
                                                      SHA-512:C43F067D649CBC3091B9878715F718E47CD753C860EBEB20CD387C325640C2EF3CA9556D0689852CEF667C8E83BF42568BEF33C8A92BC07FDB91CB7EA608162D
                                                      Malicious:false
                                                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=A1yn5d,A7fCU,AvtSve,CMcBD,E87wgc,EEDORb,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,Mlhmy,MpJwZc,NOeYWe,NTMZac,NwH0H,O6y8ed,OTA3Ae,OmgaI,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,Ug7Xab,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZfAoz,ZwDk9d,_b,_tp,aC1iue,aW3pY,aurFic,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,ebZ3mb,f8Gu1e,fKUV3e,gJzDyc,gychg,hc6Ubd,inNHtf,iyZMqd,kWgXee,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,ovKuLd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xUdipf,xiZRqc,y5vRwf,yDVVkb,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHcuwDoV1_a7sThPZwbu2Ah9zAL5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=P6sQOc"
                                                      Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("P6sQOc");.var MZa=!!(_.Nh[1]&16);var OZa=function(a,b,c,d,e){this.ea=a;this.ta=b;this.ka=c;this.Ca=d;this.Ga=e;this.aa=0;this.da=NZa(this)},PZa=function(a){var b={};_.Ma(a.hS(),function(e){b[e]=!0});var c=a.WR(),d=a.cS();return new OZa(a.XO(),c.aa()*1E3,a.oR(),d.aa()*1E3,b)},NZa=function(a){return Math.random()*Math.min(a.ta*Math.pow(a.ka,a.aa),a.Ca)},HG=function(a,b){return a.aa>=a.ea?!1:b!=null?!!a.Ga[b]:!0};var IG=function(a){_.X.call(this,a.Fa);this.da=a.Ea.mV;this.ea=a.Ea.metadata;a=a.Ea.lga;this.fetch=a.fetch.bind(a)};_.J(IG,_.X);IG.Ba=function(){return{Ea:{mV:_.KZa,metadata:_.HZa,lga:_.AZa}}};IG.prototype.aa=function(a,b){if(this.ea.getType(a.Md())!==1)return _.Vm(a);var c=this.da.JU;return(c=c?PZa(c):null)&&HG(c)?_.mya(a,QZa(this,a,b,c)):_.Vm(a)};.var QZa=function(a,b,c,d){return c.then(function(e){return e},function(e){if(MZa)if(e instanceof _.qf){if(!e.status||
                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      File Type:ASCII text, with very long lines (569)
                                                      Category:downloaded
                                                      Size (bytes):3471
                                                      Entropy (8bit):5.5174491302699495
                                                      Encrypted:false
                                                      SSDEEP:96:ojAmjTJ/fJgpIcB7Fd2tilGBEMO/A6VxV08w:vUTJpgDJXM0ApJ
                                                      MD5:2D999C87DD54C7FE6400D267C33FBB23
                                                      SHA1:414C3A329C2760325EDBACBD7A221D7F8DBFEEE8
                                                      SHA-256:76D55A1AFC1D39CB04D60EB04E45A538A0E75EE2871561C84CC89B1C13596BCC
                                                      SHA-512:72D923BB71DD147139962FF8E2BD0E336E0F6409C212AC2F25387D0F3B4FC9365F5A6D40E2980BB1065534888362C97D6B7663E362D29166B5915D2A9DA7D238
                                                      Malicious:false
                                                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=A1yn5d,A7fCU,AvtSve,CMcBD,E87wgc,EEDORb,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,Mlhmy,MpJwZc,NOeYWe,NTMZac,NwH0H,O6y8ed,OTA3Ae,OmgaI,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,Ug7Xab,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZfAoz,ZwDk9d,_b,_tp,aC1iue,aW3pY,aurFic,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,ebZ3mb,f8Gu1e,fKUV3e,gJzDyc,gychg,hc6Ubd,iAskyc,inNHtf,iyZMqd,kWgXee,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,ovKuLd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xUdipf,xiZRqc,y5vRwf,yDVVkb,yRXbo,ywOR5c,z0u0L,zbML3c,ziXSP,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHcuwDoV1_a7sThPZwbu2Ah9zAL5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=Wt6vjf,hhhU8,FCpbqb,WhJNk"
                                                      Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.k("Wt6vjf");.var Txa=function(){var a=_.Ke();return _.L(a,1)},Tt=function(a){this.Da=_.t(a,0,Tt.messageId)};_.J(Tt,_.w);Tt.prototype.Ha=function(){return _.Hj(this,1)};Tt.prototype.Va=function(a){return _.Yj(this,1,a)};Tt.messageId="f.bo";var Ut=function(){_.km.call(this)};_.J(Ut,_.km);Ut.prototype.ud=function(){this.jT=!1;Uxa(this);_.km.prototype.ud.call(this)};Ut.prototype.aa=function(){Vxa(this);if(this.hC)return Wxa(this),!1;if(!this.sV)return Vt(this),!0;this.dispatchEvent("p");if(!this.fP)return Vt(this),!0;this.jM?(this.dispatchEvent("r"),Vt(this)):Wxa(this);return!1};.var Xxa=function(a){var b=new _.gp(a.z4);a.WP!=null&&_.Mn(b,"authuser",a.WP);return b},Wxa=function(a){a.hC=!0;var b=Xxa(a),c="rt=r&f_uid="+_.sk(a.fP);_.fn(b,(0,_.eg)(a.ea,a),"POST",c)};.Ut.prototype.ea=function(a){a=a.target;Vxa(this);if(_.jn(a)){this.RJ=0;if(this.jM)this.hC=!1,this.dispatchEvent("r")
                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      File Type:ASCII text, with very long lines (522)
                                                      Category:downloaded
                                                      Size (bytes):5049
                                                      Entropy (8bit):5.317800104741948
                                                      Encrypted:false
                                                      SSDEEP:96:oHX9gPiPrfnHhsB0TR6kg1oDPJzLmM18Vh1z2fEZ54TZtnqj6w:EtEAr6BmPZtOeEvW/ncP
                                                      MD5:CE53EF566B68CCF2D62FA044CFB0D138
                                                      SHA1:F48EC60289F2B55E8B388601206888F8295B1EB1
                                                      SHA-256:E6CC5114D92811D5DE0663266D4B63F367834AFA0FC3BAFA54F707038C59D010
                                                      SHA-512:20B434881DE971E263669E6096C01665D4D35B0FBFF47D312A4A442645EE962A8CE6AD7E68246D4EE9691BD30D9B1DDCF7059226492E1B58CD3191B63B001E4D
                                                      Malicious:false
                                                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=A1yn5d,A7fCU,AvtSve,CMcBD,E87wgc,EEDORb,EFQ78c,EIOG1e,EN3i8d,FCpbqb,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,Mlhmy,MpJwZc,NOeYWe,NTMZac,NwH0H,O6y8ed,OTA3Ae,OmgaI,P6sQOc,PHUIyb,PrPYRd,RMhBfe,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,Ug7Xab,WhJNk,WpP9Yc,Wt6vjf,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZZ4WUe,ZakeSe,ZfAoz,ZwDk9d,_b,_tp,aC1iue,aW3pY,aurFic,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,ebZ3mb,f8Gu1e,fKUV3e,gJzDyc,gychg,hc6Ubd,hhhU8,iAskyc,inNHtf,iyZMqd,kWgXee,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,ovKuLd,pxq3x,q0xTif,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,sOXFj,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xUdipf,xiZRqc,y5vRwf,yDVVkb,yRXbo,ywOR5c,z0u0L,zbML3c,ziXSP,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHcuwDoV1_a7sThPZwbu2Ah9zAL5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=wg1P6b"
                                                      Preview:"use strict";this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.$Ma=_.y("wg1P6b",[_.OA,_.Fn,_.Rn]);._.k("wg1P6b");.var M5a;M5a=_.oh(["aria-"]);._.mJ=function(a){_.Y.call(this,a.Fa);this.Ja=this.ta=this.aa=this.viewportElement=this.La=null;this.Tc=a.Ea.qf;this.ab=a.Ea.focus;this.Lc=a.Ea.Lc;this.ea=this.Ei();a=-1*parseInt(_.Fo(this.Ei().el(),"marginTop")||"0",10);var b=parseInt(_.Fo(this.Ei().el(),"marginBottom")||"0",10);this.Ta={top:a,right:0,bottom:b,left:0};a=_.gf(this.getData("isMenuDynamic"),!1);b=_.gf(this.getData("isMenuHoisted"),!1);this.Ga=a?1:b?2:0;this.ka=!1;this.Ca=1;this.Ga!==1&&(this.aa=this.Sa("U0exHf").children().Sc(0),_.fu(this,.N5a(this,this.aa.el())));_.mF(this.oa())&&(a=this.oa().el(),b=this.De.bind(this),a.__soy_skip_handler=b)};_.J(_.mJ,_.Y);_.mJ.Ba=function(){return{Ea:{qf:_.SE,focus:_.BE,Lc:_.mu}}};_.mJ.prototype.pF=function(a){var b=a.source;this.La=b;var c;((c=a.data)==null?0:c.Jy)?(a=a.data.Jy,this.Ca=a==="MOUS
                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      File Type:HTML document, ASCII text, with very long lines (681)
                                                      Category:downloaded
                                                      Size (bytes):4070
                                                      Entropy (8bit):5.362700670482359
                                                      Encrypted:false
                                                      SSDEEP:96:GUpT+TmXtdW1qsHFcn7t7CnyWYvNTcLaQOw:lpT+qXW1PFcn7tGnyWY1TGb
                                                      MD5:ED368A20CB303C0E7C6A3E6E43C2E14F
                                                      SHA1:429A5C538B45221F80405163D1F87912DD73C05A
                                                      SHA-256:93BA77AD4B11E0A70C0D36576F0DF24E27F50001EA02BAA6D357E034532D97F2
                                                      SHA-512:DE74BBADE910475DD245FFEFD4E1FD10137DE710B1C920D33BA52554911496E1339EF3C1F6D9D315CBC98A60ABE5687A3E7D8BEE483708E18D25722E794BDBE9
                                                      Malicious:false
                                                      URL:"https://www.gstatic.com/_/mss/boq-identity/_/js/k=boq-identity.AccountsSignInUi.en._s1fC-CLCMs.es5.O/ck=boq-identity.AccountsSignInUi.gkspycgpiCY.L.B1.O/am=xIFgKBi2EQjEE86BHlAUCBkAAAAAAAAAALQBAIBm/d=1/exm=A1yn5d,A7fCU,AvtSve,CMcBD,E87wgc,EEDORb,EFQ78c,EIOG1e,EN3i8d,Fndnac,GwYlN,I6YDgd,IZT63,K0PMbc,K1ZKnb,KUM7Z,L1AAkb,L9OGUe,LDQI,LEikZe,MY7mZe,Mlhmy,MpJwZc,NOeYWe,NTMZac,NwH0H,O6y8ed,OTA3Ae,OmgaI,PHUIyb,PrPYRd,Rkm0ef,RqjULd,SCuOPb,SD8Jgb,STuCOe,SpsfSb,Tbb4sb,UUJqVe,Uas9Hd,Ug7Xab,WpP9Yc,XVq9Qb,YHI3We,YTxL4,YgOFye,ZDZcre,ZakeSe,ZfAoz,_b,_tp,aC1iue,aW3pY,aurFic,b3kMqb,bSspM,bTi8wc,byfTOb,cYShmd,eVCnO,ebZ3mb,f8Gu1e,fKUV3e,gJzDyc,gychg,hc6Ubd,inNHtf,iyZMqd,kWgXee,lsjVmc,ltDFwf,lwddkf,m9oV,mvkUhe,mzzZzc,n73qwf,njlZCf,oLggrd,ovKuLd,pxq3x,qPYxq,qPfo0c,qmdT9,rCcCxc,rmumx,siKnQd,soHxf,t2srLd,tUnxGc,vHEMJe,vfuNJf,vjKJJ,vvMGie,w9hDv,ws9Tlc,xBaz7b,xQtZb,xUdipf,xiZRqc,y5vRwf,yDVVkb,yRXbo,ywOR5c,z0u0L,zbML3c,ziZ8Mc,zr1jrb,zy0vNb/excm=_b,_tp,identifierview/ed=1/wt=2/ujg=1/rs=AOaEmlHcuwDoV1_a7sThPZwbu2Ah9zAL5g/ee=ASJRFf:DAnQ7e;Al0B8:kibjWe;DaIJ8c:iAskyc;EVNhjf:pw70Gc;EkYFhd:GwYlN;EmZ2Bf:zr1jrb;JsbNhc:Xd8iUd;K5nYTd:ZDZcre;LBgRLc:XVMNvd;Me32dd:MEeYgc;NPKaK:PVlQOd;NSEoX:lazG7b;Pjplud:EEDORb;QGR0gd:Mlhmy;SMDL4c:K0PMbc;SNUn3:ZwDk9d;ScI3Yc:e7Hzgb;UpnZUd:nnwwYc;Uvc8o:VDovNc;XdiAjb:NLiXbe;YIZmRd:A1yn5d;a56pNe:JEfCwb;cEt90b:ws9Tlc;dIoSBb:SpsfSb;dowIGb:ebZ3mb;eBAeSb:zbML3c;iFQyKf:vfuNJf;lOO0Vd:OTA3Ae;nAFL3:NTMZac;nTuGK:JKNPM;oGtAuc:sOXFj;oSUNyd:K0PMbc;oXZmbc:tUnxGc;pXdRYb:L9OGUe;qafBPd:yDVVkb;qddgKe:xQtZb;vNjB7d:YTxL4;wR5FRb:siKnQd;yxTchf:KUM7Z/m=sOXFj,q0xTif,ZZ4WUe"
                                                      Preview:"use strict";_F_installCss(".N7rBcd{overflow-x:auto}sentinel{}");.this.default_AccountsSignInUi=this.default_AccountsSignInUi||{};(function(_){var window=this;.try{._.zg(_.dqa);._.k("sOXFj");.var ou=function(a){_.X.call(this,a.Fa)};_.J(ou,_.X);ou.Ba=_.X.Ba;ou.prototype.aa=function(a){return a()};_.iu(_.cqa,ou);._.l();._.k("oGtAuc");._.oya=new _.uf(_.dqa);._.l();._.k("q0xTif");.var iza=function(a){var b=function(d){_.Zn(d)&&(_.Zn(d).Gc=null,_.yu(d,null));d.XyHi9&&(d.XyHi9=null)};b(a);a=a.querySelectorAll("[c-wiz]");for(var c=0;c<a.length;c++)b(a[c])},Ku=function(a){_.et.call(this,a.Fa);this.Qa=this.dom=null;if(this.Vk()){var b=_.Jm(this.Mg(),[_.Om,_.Nm]);b=_.ri([b[_.Om],b[_.Nm]]).then(function(c){this.Qa=c[0];this.dom=c[1]},null,this);_.cu(this,b)}this.Ra=a.Xl.Hda};_.J(Ku,_.et);Ku.Ba=function(){return{Xl:{Hda:function(a){return _.Ye(a)}}}};Ku.prototype.yp=function(a){return this.Ra.yp(a)};.Ku.prototype.getData=function(a){return this.Ra.getData(a)};Ku.prototype.vp=function(){_.Ft(this.d
                                                      Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:downloaded
                                                      Size (bytes):84
                                                      Entropy (8bit):4.875266466142591
                                                      Encrypted:false
                                                      SSDEEP:3:DZFJu0+WVTBCq2Bjdw2KsJJuYHSKnZ:lFJuuVTBudw29nu4SKZ
                                                      MD5:87B6333E98B7620EA1FF98D1A837A39E
                                                      SHA1:105DE6815B0885357DE1414BFC0D77FCC9E924EF
                                                      SHA-256:DCD3C133C5C40BECD4100BBE6EDAE84C9735E778E4234A5E8395C56FF8A733BA
                                                      SHA-512:867D7943D813685FAA76394E53199750C55817E836FD19C933F74D11E9657CE66719A6D6B2E39EE1DE62358BCE364E38A55F4E138DF92337DE6985DDCD5D0994
                                                      Malicious:false
                                                      URL:https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISHgmA6QC9dWevzxIFDRkBE_oSBQ3oIX6GEgUN05ioBw==?alt=proto
                                                      Preview:Cj0KBw0ZARP6GgAKKQ3oIX6GGgQISxgCKhwIClIYCg5AIS4jJF8qLSY/Ky8lLBABGP////8PCgcN05ioBxoA
                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Entropy (8bit):6.579675855847615
                                                      TrID:
                                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                      • DOS Executable Generic (2002/1) 0.02%
                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                      File name:file.exe
                                                      File size:917'504 bytes
                                                      MD5:93847e39e6beb5fef14983e436a58dbd
                                                      SHA1:bb656458c1419f8ade2af5528af162b9a321f59b
                                                      SHA256:bd7999eeec5f99abdab2fc9ef13ee82334827064dd6a50e6d445b4121724e7b4
                                                      SHA512:20b393ed1180aaf95e945b411b18f152fe083f8834558c3f5c48df9fe280efa3f82a2d06f165f099b0c5ea749ed647bc67e0ce7495a5d048e6b881f52534ceb5
                                                      SSDEEP:12288:6qDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDganTH:6qDEvCTbMWu7rQYlBQcBiT6rprG8aTH
                                                      TLSH:7E159E0273D1C062FF9B92334B5AF6515BBC69260123E61F13981DB9BE701B1563E7A3
                                                      File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                      Icon Hash:aaf3e3e3938382a0
                                                      Entrypoint:0x420577
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                      DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                      Time Stamp:0x66FB28CD [Mon Sep 30 22:40:13 2024 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:5
                                                      OS Version Minor:1
                                                      File Version Major:5
                                                      File Version Minor:1
                                                      Subsystem Version Major:5
                                                      Subsystem Version Minor:1
                                                      Import Hash:948cc502fe9226992dce9417f952fce3
                                                      Instruction
                                                      call 00007F5FB0C96393h
                                                      jmp 00007F5FB0C95C9Fh
                                                      push ebp
                                                      mov ebp, esp
                                                      push esi
                                                      push dword ptr [ebp+08h]
                                                      mov esi, ecx
                                                      call 00007F5FB0C95E7Dh
                                                      mov dword ptr [esi], 0049FDF0h
                                                      mov eax, esi
                                                      pop esi
                                                      pop ebp
                                                      retn 0004h
                                                      and dword ptr [ecx+04h], 00000000h
                                                      mov eax, ecx
                                                      and dword ptr [ecx+08h], 00000000h
                                                      mov dword ptr [ecx+04h], 0049FDF8h
                                                      mov dword ptr [ecx], 0049FDF0h
                                                      ret
                                                      push ebp
                                                      mov ebp, esp
                                                      push esi
                                                      push dword ptr [ebp+08h]
                                                      mov esi, ecx
                                                      call 00007F5FB0C95E4Ah
                                                      mov dword ptr [esi], 0049FE0Ch
                                                      mov eax, esi
                                                      pop esi
                                                      pop ebp
                                                      retn 0004h
                                                      and dword ptr [ecx+04h], 00000000h
                                                      mov eax, ecx
                                                      and dword ptr [ecx+08h], 00000000h
                                                      mov dword ptr [ecx+04h], 0049FE14h
                                                      mov dword ptr [ecx], 0049FE0Ch
                                                      ret
                                                      push ebp
                                                      mov ebp, esp
                                                      push esi
                                                      mov esi, ecx
                                                      lea eax, dword ptr [esi+04h]
                                                      mov dword ptr [esi], 0049FDD0h
                                                      and dword ptr [eax], 00000000h
                                                      and dword ptr [eax+04h], 00000000h
                                                      push eax
                                                      mov eax, dword ptr [ebp+08h]
                                                      add eax, 04h
                                                      push eax
                                                      call 00007F5FB0C98A3Dh
                                                      pop ecx
                                                      pop ecx
                                                      mov eax, esi
                                                      pop esi
                                                      pop ebp
                                                      retn 0004h
                                                      lea eax, dword ptr [ecx+04h]
                                                      mov dword ptr [ecx], 0049FDD0h
                                                      push eax
                                                      call 00007F5FB0C98A88h
                                                      pop ecx
                                                      ret
                                                      push ebp
                                                      mov ebp, esp
                                                      push esi
                                                      mov esi, ecx
                                                      lea eax, dword ptr [esi+04h]
                                                      mov dword ptr [esi], 0049FDD0h
                                                      push eax
                                                      call 00007F5FB0C98A71h
                                                      test byte ptr [ebp+08h], 00000001h
                                                      pop ecx
                                                      Programming Language:
                                                      • [ C ] VS2008 SP1 build 30729
                                                      • [IMP] VS2008 SP1 build 30729
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x9548.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xde0000x7594.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .rsrc0xd40000x95480x9600feb6cb0d0a0b6ce094eb9e57911afe63False0.2833072916666667data5.1660807891532805IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0xde0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                      RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                      RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                      RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                      RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                      RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                      RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                      RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                      RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                      RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                      RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                      RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                                      RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                                      RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                                      RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                                      RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                      RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                      RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                      RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                      RT_RCDATA0xdc7b80x80edata1.0053346265761396
                                                      RT_GROUP_ICON0xdcfc80x76dataEnglishGreat Britain0.6610169491525424
                                                      RT_GROUP_ICON0xdd0400x14dataEnglishGreat Britain1.25
                                                      RT_GROUP_ICON0xdd0540x14dataEnglishGreat Britain1.15
                                                      RT_GROUP_ICON0xdd0680x14dataEnglishGreat Britain1.25
                                                      RT_VERSION0xdd07c0xdcdataEnglishGreat Britain0.6181818181818182
                                                      RT_MANIFEST0xdd1580x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                      DLLImport
                                                      WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                      VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                      WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                      COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                      MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                      WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                      PSAPI.DLLGetProcessMemoryInfo
                                                      IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                      USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                      UxTheme.dllIsThemeActive
                                                      KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                      USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                      GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                      COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                      ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                      SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                      ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                      OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                      Language of compilation systemCountry where language is spokenMap
                                                      EnglishGreat Britain
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Oct 1, 2024 00:41:56.068274975 CEST49673443192.168.2.823.206.229.226
                                                      Oct 1, 2024 00:41:56.380897999 CEST49672443192.168.2.823.206.229.226
                                                      Oct 1, 2024 00:41:56.990221024 CEST49676443192.168.2.852.182.143.211
                                                      Oct 1, 2024 00:41:58.255745888 CEST49671443192.168.2.8204.79.197.203
                                                      Oct 1, 2024 00:41:58.599464893 CEST4967780192.168.2.8192.229.211.108
                                                      Oct 1, 2024 00:42:05.677822113 CEST49673443192.168.2.823.206.229.226
                                                      Oct 1, 2024 00:42:05.986066103 CEST49672443192.168.2.823.206.229.226
                                                      Oct 1, 2024 00:42:06.599466085 CEST49676443192.168.2.852.182.143.211
                                                      Oct 1, 2024 00:42:07.603468895 CEST49705443192.168.2.8216.58.206.78
                                                      Oct 1, 2024 00:42:07.603523016 CEST44349705216.58.206.78192.168.2.8
                                                      Oct 1, 2024 00:42:07.603605986 CEST49705443192.168.2.8216.58.206.78
                                                      Oct 1, 2024 00:42:07.605135918 CEST49705443192.168.2.8216.58.206.78
                                                      Oct 1, 2024 00:42:07.605148077 CEST44349705216.58.206.78192.168.2.8
                                                      Oct 1, 2024 00:42:07.669285059 CEST4434970423.206.229.226192.168.2.8
                                                      Oct 1, 2024 00:42:07.669365883 CEST49704443192.168.2.823.206.229.226
                                                      Oct 1, 2024 00:42:08.242799997 CEST44349705216.58.206.78192.168.2.8
                                                      Oct 1, 2024 00:42:08.243100882 CEST49705443192.168.2.8216.58.206.78
                                                      Oct 1, 2024 00:42:08.243119001 CEST44349705216.58.206.78192.168.2.8
                                                      Oct 1, 2024 00:42:08.243534088 CEST44349705216.58.206.78192.168.2.8
                                                      Oct 1, 2024 00:42:08.243597031 CEST49705443192.168.2.8216.58.206.78
                                                      Oct 1, 2024 00:42:08.244826078 CEST44349705216.58.206.78192.168.2.8
                                                      Oct 1, 2024 00:42:08.244884968 CEST49705443192.168.2.8216.58.206.78
                                                      Oct 1, 2024 00:42:08.246792078 CEST49705443192.168.2.8216.58.206.78
                                                      Oct 1, 2024 00:42:08.246881008 CEST44349705216.58.206.78192.168.2.8
                                                      Oct 1, 2024 00:42:08.247064114 CEST49705443192.168.2.8216.58.206.78
                                                      Oct 1, 2024 00:42:08.247072935 CEST44349705216.58.206.78192.168.2.8
                                                      Oct 1, 2024 00:42:08.295713902 CEST49705443192.168.2.8216.58.206.78
                                                      Oct 1, 2024 00:42:08.523191929 CEST44349705216.58.206.78192.168.2.8
                                                      Oct 1, 2024 00:42:08.523279905 CEST44349705216.58.206.78192.168.2.8
                                                      Oct 1, 2024 00:42:08.523485899 CEST49705443192.168.2.8216.58.206.78
                                                      Oct 1, 2024 00:42:08.524153948 CEST49705443192.168.2.8216.58.206.78
                                                      Oct 1, 2024 00:42:08.524174929 CEST44349705216.58.206.78192.168.2.8
                                                      Oct 1, 2024 00:42:08.533891916 CEST49711443192.168.2.8142.250.186.46
                                                      Oct 1, 2024 00:42:08.533924103 CEST44349711142.250.186.46192.168.2.8
                                                      Oct 1, 2024 00:42:08.533989906 CEST49711443192.168.2.8142.250.186.46
                                                      Oct 1, 2024 00:42:08.534312963 CEST49711443192.168.2.8142.250.186.46
                                                      Oct 1, 2024 00:42:08.534327984 CEST44349711142.250.186.46192.168.2.8
                                                      Oct 1, 2024 00:42:09.231703043 CEST4967780192.168.2.8192.229.211.108
                                                      Oct 1, 2024 00:42:09.279109001 CEST44349711142.250.186.46192.168.2.8
                                                      Oct 1, 2024 00:42:09.281512022 CEST49711443192.168.2.8142.250.186.46
                                                      Oct 1, 2024 00:42:09.281533957 CEST44349711142.250.186.46192.168.2.8
                                                      Oct 1, 2024 00:42:09.281940937 CEST44349711142.250.186.46192.168.2.8
                                                      Oct 1, 2024 00:42:09.282011032 CEST49711443192.168.2.8142.250.186.46
                                                      Oct 1, 2024 00:42:09.282639980 CEST44349711142.250.186.46192.168.2.8
                                                      Oct 1, 2024 00:42:09.282694101 CEST49711443192.168.2.8142.250.186.46
                                                      Oct 1, 2024 00:42:09.283593893 CEST49711443192.168.2.8142.250.186.46
                                                      Oct 1, 2024 00:42:09.283653975 CEST44349711142.250.186.46192.168.2.8
                                                      Oct 1, 2024 00:42:09.283755064 CEST49711443192.168.2.8142.250.186.46
                                                      Oct 1, 2024 00:42:09.283763885 CEST44349711142.250.186.46192.168.2.8
                                                      Oct 1, 2024 00:42:09.327738047 CEST49711443192.168.2.8142.250.186.46
                                                      Oct 1, 2024 00:42:09.589543104 CEST44349711142.250.186.46192.168.2.8
                                                      Oct 1, 2024 00:42:09.589561939 CEST44349711142.250.186.46192.168.2.8
                                                      Oct 1, 2024 00:42:09.589638948 CEST44349711142.250.186.46192.168.2.8
                                                      Oct 1, 2024 00:42:09.589649916 CEST49711443192.168.2.8142.250.186.46
                                                      Oct 1, 2024 00:42:09.589688063 CEST49711443192.168.2.8142.250.186.46
                                                      Oct 1, 2024 00:42:09.618587971 CEST49711443192.168.2.8142.250.186.46
                                                      Oct 1, 2024 00:42:09.618607044 CEST44349711142.250.186.46192.168.2.8
                                                      Oct 1, 2024 00:42:11.540513039 CEST49716443192.168.2.8216.58.212.164
                                                      Oct 1, 2024 00:42:11.540549994 CEST44349716216.58.212.164192.168.2.8
                                                      Oct 1, 2024 00:42:11.540626049 CEST49716443192.168.2.8216.58.212.164
                                                      Oct 1, 2024 00:42:11.540824890 CEST49716443192.168.2.8216.58.212.164
                                                      Oct 1, 2024 00:42:11.540843010 CEST44349716216.58.212.164192.168.2.8
                                                      Oct 1, 2024 00:42:12.194679022 CEST44349716216.58.212.164192.168.2.8
                                                      Oct 1, 2024 00:42:12.214620113 CEST49716443192.168.2.8216.58.212.164
                                                      Oct 1, 2024 00:42:12.214634895 CEST44349716216.58.212.164192.168.2.8
                                                      Oct 1, 2024 00:42:12.215848923 CEST44349716216.58.212.164192.168.2.8
                                                      Oct 1, 2024 00:42:12.215924978 CEST49716443192.168.2.8216.58.212.164
                                                      Oct 1, 2024 00:42:12.219268084 CEST49716443192.168.2.8216.58.212.164
                                                      Oct 1, 2024 00:42:12.219357967 CEST44349716216.58.212.164192.168.2.8
                                                      Oct 1, 2024 00:42:12.264857054 CEST49716443192.168.2.8216.58.212.164
                                                      Oct 1, 2024 00:42:12.264883995 CEST44349716216.58.212.164192.168.2.8
                                                      Oct 1, 2024 00:42:12.311749935 CEST49716443192.168.2.8216.58.212.164
                                                      Oct 1, 2024 00:42:12.376576900 CEST49717443192.168.2.8184.28.90.27
                                                      Oct 1, 2024 00:42:12.376630068 CEST44349717184.28.90.27192.168.2.8
                                                      Oct 1, 2024 00:42:12.376715899 CEST49717443192.168.2.8184.28.90.27
                                                      Oct 1, 2024 00:42:12.378201962 CEST49717443192.168.2.8184.28.90.27
                                                      Oct 1, 2024 00:42:12.378227949 CEST44349717184.28.90.27192.168.2.8
                                                      Oct 1, 2024 00:42:13.035137892 CEST44349717184.28.90.27192.168.2.8
                                                      Oct 1, 2024 00:42:13.035238981 CEST49717443192.168.2.8184.28.90.27
                                                      Oct 1, 2024 00:42:13.039793015 CEST49717443192.168.2.8184.28.90.27
                                                      Oct 1, 2024 00:42:13.039809942 CEST44349717184.28.90.27192.168.2.8
                                                      Oct 1, 2024 00:42:13.040060997 CEST44349717184.28.90.27192.168.2.8
                                                      Oct 1, 2024 00:42:13.076411963 CEST49717443192.168.2.8184.28.90.27
                                                      Oct 1, 2024 00:42:13.119404078 CEST44349717184.28.90.27192.168.2.8
                                                      Oct 1, 2024 00:42:13.309946060 CEST44349717184.28.90.27192.168.2.8
                                                      Oct 1, 2024 00:42:13.310005903 CEST44349717184.28.90.27192.168.2.8
                                                      Oct 1, 2024 00:42:13.310050964 CEST49717443192.168.2.8184.28.90.27
                                                      Oct 1, 2024 00:42:13.310137033 CEST49717443192.168.2.8184.28.90.27
                                                      Oct 1, 2024 00:42:13.310153961 CEST44349717184.28.90.27192.168.2.8
                                                      Oct 1, 2024 00:42:13.310164928 CEST49717443192.168.2.8184.28.90.27
                                                      Oct 1, 2024 00:42:13.310169935 CEST44349717184.28.90.27192.168.2.8
                                                      Oct 1, 2024 00:42:13.363502026 CEST49720443192.168.2.8184.28.90.27
                                                      Oct 1, 2024 00:42:13.363562107 CEST44349720184.28.90.27192.168.2.8
                                                      Oct 1, 2024 00:42:13.363650084 CEST49720443192.168.2.8184.28.90.27
                                                      Oct 1, 2024 00:42:13.363977909 CEST49720443192.168.2.8184.28.90.27
                                                      Oct 1, 2024 00:42:13.364007950 CEST44349720184.28.90.27192.168.2.8
                                                      Oct 1, 2024 00:42:14.079252005 CEST44349720184.28.90.27192.168.2.8
                                                      Oct 1, 2024 00:42:14.079435110 CEST49720443192.168.2.8184.28.90.27
                                                      Oct 1, 2024 00:42:14.080713034 CEST49720443192.168.2.8184.28.90.27
                                                      Oct 1, 2024 00:42:14.080735922 CEST44349720184.28.90.27192.168.2.8
                                                      Oct 1, 2024 00:42:14.080975056 CEST44349720184.28.90.27192.168.2.8
                                                      Oct 1, 2024 00:42:14.083923101 CEST49720443192.168.2.8184.28.90.27
                                                      Oct 1, 2024 00:42:14.127413034 CEST44349720184.28.90.27192.168.2.8
                                                      Oct 1, 2024 00:42:14.357136011 CEST44349720184.28.90.27192.168.2.8
                                                      Oct 1, 2024 00:42:14.357203007 CEST44349720184.28.90.27192.168.2.8
                                                      Oct 1, 2024 00:42:14.357553959 CEST49720443192.168.2.8184.28.90.27
                                                      Oct 1, 2024 00:42:14.359491110 CEST49720443192.168.2.8184.28.90.27
                                                      Oct 1, 2024 00:42:14.359491110 CEST49720443192.168.2.8184.28.90.27
                                                      Oct 1, 2024 00:42:14.359503031 CEST44349720184.28.90.27192.168.2.8
                                                      Oct 1, 2024 00:42:14.359513044 CEST44349720184.28.90.27192.168.2.8
                                                      Oct 1, 2024 00:42:16.189616919 CEST49732443192.168.2.813.85.23.86
                                                      Oct 1, 2024 00:42:16.189651966 CEST4434973213.85.23.86192.168.2.8
                                                      Oct 1, 2024 00:42:16.189810991 CEST49732443192.168.2.813.85.23.86
                                                      Oct 1, 2024 00:42:16.190924883 CEST49732443192.168.2.813.85.23.86
                                                      Oct 1, 2024 00:42:16.190943003 CEST4434973213.85.23.86192.168.2.8
                                                      Oct 1, 2024 00:42:16.629081964 CEST49733443192.168.2.8172.217.16.142
                                                      Oct 1, 2024 00:42:16.629106045 CEST44349733172.217.16.142192.168.2.8
                                                      Oct 1, 2024 00:42:16.629185915 CEST49733443192.168.2.8172.217.16.142
                                                      Oct 1, 2024 00:42:16.629580975 CEST49733443192.168.2.8172.217.16.142
                                                      Oct 1, 2024 00:42:16.629591942 CEST44349733172.217.16.142192.168.2.8
                                                      Oct 1, 2024 00:42:16.898721933 CEST4434973213.85.23.86192.168.2.8
                                                      Oct 1, 2024 00:42:16.898808956 CEST49732443192.168.2.813.85.23.86
                                                      Oct 1, 2024 00:42:16.900815010 CEST49732443192.168.2.813.85.23.86
                                                      Oct 1, 2024 00:42:16.900830984 CEST4434973213.85.23.86192.168.2.8
                                                      Oct 1, 2024 00:42:16.901082993 CEST4434973213.85.23.86192.168.2.8
                                                      Oct 1, 2024 00:42:16.950632095 CEST49732443192.168.2.813.85.23.86
                                                      Oct 1, 2024 00:42:17.206077099 CEST49732443192.168.2.813.85.23.86
                                                      Oct 1, 2024 00:42:17.247415066 CEST4434973213.85.23.86192.168.2.8
                                                      Oct 1, 2024 00:42:17.261395931 CEST44349733172.217.16.142192.168.2.8
                                                      Oct 1, 2024 00:42:17.261693001 CEST49733443192.168.2.8172.217.16.142
                                                      Oct 1, 2024 00:42:17.261714935 CEST44349733172.217.16.142192.168.2.8
                                                      Oct 1, 2024 00:42:17.262073040 CEST44349733172.217.16.142192.168.2.8
                                                      Oct 1, 2024 00:42:17.262125015 CEST49733443192.168.2.8172.217.16.142
                                                      Oct 1, 2024 00:42:17.262756109 CEST44349733172.217.16.142192.168.2.8
                                                      Oct 1, 2024 00:42:17.262811899 CEST49733443192.168.2.8172.217.16.142
                                                      Oct 1, 2024 00:42:17.264338970 CEST49733443192.168.2.8172.217.16.142
                                                      Oct 1, 2024 00:42:17.264394045 CEST44349733172.217.16.142192.168.2.8
                                                      Oct 1, 2024 00:42:17.264828920 CEST49733443192.168.2.8172.217.16.142
                                                      Oct 1, 2024 00:42:17.264834881 CEST44349733172.217.16.142192.168.2.8
                                                      Oct 1, 2024 00:42:17.312004089 CEST49733443192.168.2.8172.217.16.142
                                                      Oct 1, 2024 00:42:17.443491936 CEST4434973213.85.23.86192.168.2.8
                                                      Oct 1, 2024 00:42:17.443512917 CEST4434973213.85.23.86192.168.2.8
                                                      Oct 1, 2024 00:42:17.443521023 CEST4434973213.85.23.86192.168.2.8
                                                      Oct 1, 2024 00:42:17.443535089 CEST4434973213.85.23.86192.168.2.8
                                                      Oct 1, 2024 00:42:17.443562031 CEST4434973213.85.23.86192.168.2.8
                                                      Oct 1, 2024 00:42:17.443582058 CEST49732443192.168.2.813.85.23.86
                                                      Oct 1, 2024 00:42:17.443608046 CEST4434973213.85.23.86192.168.2.8
                                                      Oct 1, 2024 00:42:17.443625927 CEST49732443192.168.2.813.85.23.86
                                                      Oct 1, 2024 00:42:17.443654060 CEST49732443192.168.2.813.85.23.86
                                                      Oct 1, 2024 00:42:17.444490910 CEST4434973213.85.23.86192.168.2.8
                                                      Oct 1, 2024 00:42:17.444566965 CEST4434973213.85.23.86192.168.2.8
                                                      Oct 1, 2024 00:42:17.444576979 CEST49732443192.168.2.813.85.23.86
                                                      Oct 1, 2024 00:42:17.444621086 CEST49732443192.168.2.813.85.23.86
                                                      Oct 1, 2024 00:42:17.455945015 CEST49732443192.168.2.813.85.23.86
                                                      Oct 1, 2024 00:42:17.455966949 CEST4434973213.85.23.86192.168.2.8
                                                      Oct 1, 2024 00:42:17.455982924 CEST49732443192.168.2.813.85.23.86
                                                      Oct 1, 2024 00:42:17.455991983 CEST4434973213.85.23.86192.168.2.8
                                                      Oct 1, 2024 00:42:17.577101946 CEST44349733172.217.16.142192.168.2.8
                                                      Oct 1, 2024 00:42:17.577363014 CEST44349733172.217.16.142192.168.2.8
                                                      Oct 1, 2024 00:42:17.577413082 CEST49733443192.168.2.8172.217.16.142
                                                      Oct 1, 2024 00:42:17.577430964 CEST44349733172.217.16.142192.168.2.8
                                                      Oct 1, 2024 00:42:17.577441931 CEST44349733172.217.16.142192.168.2.8
                                                      Oct 1, 2024 00:42:17.577466011 CEST49733443192.168.2.8172.217.16.142
                                                      Oct 1, 2024 00:42:17.582287073 CEST44349733172.217.16.142192.168.2.8
                                                      Oct 1, 2024 00:42:17.582328081 CEST49733443192.168.2.8172.217.16.142
                                                      Oct 1, 2024 00:42:17.582336903 CEST44349733172.217.16.142192.168.2.8
                                                      Oct 1, 2024 00:42:17.588634968 CEST44349733172.217.16.142192.168.2.8
                                                      Oct 1, 2024 00:42:17.588663101 CEST44349733172.217.16.142192.168.2.8
                                                      Oct 1, 2024 00:42:17.588675022 CEST49733443192.168.2.8172.217.16.142
                                                      Oct 1, 2024 00:42:17.588680983 CEST44349733172.217.16.142192.168.2.8
                                                      Oct 1, 2024 00:42:17.588710070 CEST49733443192.168.2.8172.217.16.142
                                                      Oct 1, 2024 00:42:17.595442057 CEST44349733172.217.16.142192.168.2.8
                                                      Oct 1, 2024 00:42:17.595491886 CEST49733443192.168.2.8172.217.16.142
                                                      Oct 1, 2024 00:42:17.601229906 CEST44349733172.217.16.142192.168.2.8
                                                      Oct 1, 2024 00:42:17.601264000 CEST44349733172.217.16.142192.168.2.8
                                                      Oct 1, 2024 00:42:17.601293087 CEST49733443192.168.2.8172.217.16.142
                                                      Oct 1, 2024 00:42:17.601300955 CEST44349733172.217.16.142192.168.2.8
                                                      Oct 1, 2024 00:42:17.601337910 CEST49733443192.168.2.8172.217.16.142
                                                      Oct 1, 2024 00:42:17.663777113 CEST44349733172.217.16.142192.168.2.8
                                                      Oct 1, 2024 00:42:17.663845062 CEST49733443192.168.2.8172.217.16.142
                                                      Oct 1, 2024 00:42:17.663903952 CEST44349733172.217.16.142192.168.2.8
                                                      Oct 1, 2024 00:42:17.663949013 CEST49733443192.168.2.8172.217.16.142
                                                      Oct 1, 2024 00:42:17.666820049 CEST44349733172.217.16.142192.168.2.8
                                                      Oct 1, 2024 00:42:17.666872025 CEST49733443192.168.2.8172.217.16.142
                                                      Oct 1, 2024 00:42:17.672935009 CEST44349733172.217.16.142192.168.2.8
                                                      Oct 1, 2024 00:42:17.672970057 CEST44349733172.217.16.142192.168.2.8
                                                      Oct 1, 2024 00:42:17.672986031 CEST49733443192.168.2.8172.217.16.142
                                                      Oct 1, 2024 00:42:17.672998905 CEST44349733172.217.16.142192.168.2.8
                                                      Oct 1, 2024 00:42:17.673037052 CEST49733443192.168.2.8172.217.16.142
                                                      Oct 1, 2024 00:42:17.679344893 CEST44349733172.217.16.142192.168.2.8
                                                      Oct 1, 2024 00:42:17.679399967 CEST49733443192.168.2.8172.217.16.142
                                                      Oct 1, 2024 00:42:17.685532093 CEST44349733172.217.16.142192.168.2.8
                                                      Oct 1, 2024 00:42:17.685597897 CEST49733443192.168.2.8172.217.16.142
                                                      Oct 1, 2024 00:42:17.685611963 CEST44349733172.217.16.142192.168.2.8
                                                      Oct 1, 2024 00:42:17.691939116 CEST44349733172.217.16.142192.168.2.8
                                                      Oct 1, 2024 00:42:17.691989899 CEST49733443192.168.2.8172.217.16.142
                                                      Oct 1, 2024 00:42:17.692006111 CEST44349733172.217.16.142192.168.2.8
                                                      Oct 1, 2024 00:42:17.698272943 CEST44349733172.217.16.142192.168.2.8
                                                      Oct 1, 2024 00:42:17.698321104 CEST49733443192.168.2.8172.217.16.142
                                                      Oct 1, 2024 00:42:17.698331118 CEST44349733172.217.16.142192.168.2.8
                                                      Oct 1, 2024 00:42:17.698539972 CEST49733443192.168.2.8172.217.16.142
                                                      Oct 1, 2024 00:42:17.698565006 CEST44349733172.217.16.142192.168.2.8
                                                      Oct 1, 2024 00:42:17.698610067 CEST49733443192.168.2.8172.217.16.142
                                                      Oct 1, 2024 00:42:18.082967997 CEST49737443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:18.083029985 CEST44349737172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:18.083105087 CEST49737443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:18.100368977 CEST49738443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:18.100425959 CEST44349738172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:18.100487947 CEST49738443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:18.101547003 CEST49737443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:18.101563931 CEST44349737172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:18.101867914 CEST49738443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:18.101881027 CEST44349738172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:18.761852026 CEST44349738172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:18.762178898 CEST49738443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:18.762206078 CEST44349738172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:18.762594938 CEST44349738172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:18.762664080 CEST49738443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:18.763303041 CEST44349738172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:18.763370991 CEST49738443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:18.766204119 CEST49738443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:18.766294003 CEST44349738172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:18.766930103 CEST49738443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:18.766946077 CEST44349738172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:18.766958952 CEST44349737172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:18.767183065 CEST49737443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:18.767193079 CEST44349737172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:18.767584085 CEST44349737172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:18.767640114 CEST49737443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:18.768311024 CEST44349737172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:18.768358946 CEST49737443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:18.768527031 CEST49737443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:18.768594980 CEST44349737172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:18.768660069 CEST49737443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:18.768666983 CEST44349737172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:18.812179089 CEST49738443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:18.812351942 CEST49737443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:19.008404970 CEST49704443192.168.2.823.206.229.226
                                                      Oct 1, 2024 00:42:19.008404970 CEST49704443192.168.2.823.206.229.226
                                                      Oct 1, 2024 00:42:19.010988951 CEST49744443192.168.2.823.206.229.226
                                                      Oct 1, 2024 00:42:19.011032104 CEST4434974423.206.229.226192.168.2.8
                                                      Oct 1, 2024 00:42:19.011725903 CEST49744443192.168.2.823.206.229.226
                                                      Oct 1, 2024 00:42:19.012094975 CEST49744443192.168.2.823.206.229.226
                                                      Oct 1, 2024 00:42:19.012109995 CEST4434974423.206.229.226192.168.2.8
                                                      Oct 1, 2024 00:42:19.013222933 CEST4434970423.206.229.226192.168.2.8
                                                      Oct 1, 2024 00:42:19.013236046 CEST4434970423.206.229.226192.168.2.8
                                                      Oct 1, 2024 00:42:19.041254997 CEST49716443192.168.2.8216.58.212.164
                                                      Oct 1, 2024 00:42:19.061743975 CEST44349738172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:19.062196970 CEST44349738172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:19.062262058 CEST49738443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:19.062340021 CEST49738443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:19.062365055 CEST44349738172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:19.062376022 CEST49738443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:19.062458038 CEST49738443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:19.063375950 CEST49745443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:19.063429117 CEST44349745172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:19.063568115 CEST49745443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:19.064171076 CEST49745443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:19.064194918 CEST44349745172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:19.069086075 CEST44349737172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:19.069569111 CEST44349737172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:19.069577932 CEST49737443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:19.069602966 CEST44349737172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:19.069624901 CEST49737443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:19.069647074 CEST49737443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:19.070535898 CEST49746443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:19.070578098 CEST44349746172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:19.070766926 CEST49746443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:19.071074963 CEST49746443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:19.071098089 CEST44349746172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:19.087404966 CEST44349716216.58.212.164192.168.2.8
                                                      Oct 1, 2024 00:42:19.308070898 CEST44349716216.58.212.164192.168.2.8
                                                      Oct 1, 2024 00:42:19.308124065 CEST44349716216.58.212.164192.168.2.8
                                                      Oct 1, 2024 00:42:19.308160067 CEST44349716216.58.212.164192.168.2.8
                                                      Oct 1, 2024 00:42:19.308191061 CEST44349716216.58.212.164192.168.2.8
                                                      Oct 1, 2024 00:42:19.308207989 CEST49716443192.168.2.8216.58.212.164
                                                      Oct 1, 2024 00:42:19.308233023 CEST44349716216.58.212.164192.168.2.8
                                                      Oct 1, 2024 00:42:19.308248043 CEST49716443192.168.2.8216.58.212.164
                                                      Oct 1, 2024 00:42:19.308605909 CEST44349716216.58.212.164192.168.2.8
                                                      Oct 1, 2024 00:42:19.308649063 CEST49716443192.168.2.8216.58.212.164
                                                      Oct 1, 2024 00:42:19.309978008 CEST49716443192.168.2.8216.58.212.164
                                                      Oct 1, 2024 00:42:19.309992075 CEST44349716216.58.212.164192.168.2.8
                                                      Oct 1, 2024 00:42:19.614692926 CEST4434974423.206.229.226192.168.2.8
                                                      Oct 1, 2024 00:42:19.616889954 CEST49744443192.168.2.823.206.229.226
                                                      Oct 1, 2024 00:42:19.697918892 CEST44349745172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:19.700330019 CEST49745443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:19.700347900 CEST44349745172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:19.700716019 CEST44349745172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:19.700764894 CEST49745443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:19.701422930 CEST44349745172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:19.701472998 CEST49745443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:19.703742981 CEST49745443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:19.703795910 CEST44349745172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:19.704216003 CEST49745443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:19.704222918 CEST44349745172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:19.704236031 CEST49745443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:19.722331047 CEST44349746172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:19.722796917 CEST49746443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:19.722807884 CEST44349746172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:19.723172903 CEST44349746172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:19.723226070 CEST49746443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:19.723915100 CEST44349746172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:19.723957062 CEST49746443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:19.723963976 CEST44349746172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:19.724307060 CEST49746443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:19.724363089 CEST44349746172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:19.724452019 CEST49746443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:19.724458933 CEST44349746172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:19.724471092 CEST49746443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:19.751394987 CEST44349745172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:19.767393112 CEST44349746172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:19.911396980 CEST44349745172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:19.911436081 CEST49745443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:19.919394016 CEST49746443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:19.921058893 CEST44349745172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:19.921998978 CEST44349745172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:19.922069073 CEST49745443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:19.922785044 CEST49745443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:19.922796011 CEST44349745172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:19.941029072 CEST44349746172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:19.941145897 CEST44349746172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:19.941262007 CEST49746443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:19.942399979 CEST49746443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:19.942406893 CEST44349746172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:25.687402964 CEST49752443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:25.687446117 CEST44349752172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:25.687633038 CEST49752443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:25.688021898 CEST49752443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:25.688040018 CEST44349752172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:26.322479963 CEST44349752172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:26.322798014 CEST49752443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:26.322829962 CEST44349752172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:26.323554039 CEST44349752172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:26.323865891 CEST49752443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:26.323930025 CEST44349752172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:26.324003935 CEST49752443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:26.324024916 CEST49752443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:26.324295044 CEST44349752172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:26.645560026 CEST44349752172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:26.646450996 CEST44349752172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:26.646579981 CEST49752443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:26.648255110 CEST49752443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:26.648277998 CEST44349752172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:38.830509901 CEST4434974423.206.229.226192.168.2.8
                                                      Oct 1, 2024 00:42:38.830651045 CEST49744443192.168.2.823.206.229.226
                                                      Oct 1, 2024 00:42:47.660985947 CEST4970380192.168.2.888.221.110.106
                                                      Oct 1, 2024 00:42:47.666039944 CEST804970388.221.110.106192.168.2.8
                                                      Oct 1, 2024 00:42:47.666208029 CEST4970380192.168.2.888.221.110.106
                                                      Oct 1, 2024 00:42:48.078686953 CEST49753443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:48.078738928 CEST44349753172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:48.078835964 CEST49753443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:48.079134941 CEST49753443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:48.079149008 CEST44349753172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:48.713633060 CEST44349753172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:48.714939117 CEST49753443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:48.714971066 CEST44349753172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:48.715501070 CEST44349753172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:48.724627018 CEST49754443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:48.724680901 CEST44349754172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:48.724745035 CEST49754443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:48.725014925 CEST49753443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:48.725137949 CEST44349753172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:48.725236893 CEST49754443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:48.725245953 CEST44349754172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:48.725649118 CEST49753443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:48.725692034 CEST49753443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:48.725766897 CEST44349753172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:49.019063950 CEST44349753172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:49.033883095 CEST44349753172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:49.033945084 CEST49753443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:49.034238100 CEST49753443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:49.034257889 CEST44349753172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:49.384845972 CEST44349754172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:49.385179043 CEST49754443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:49.385193110 CEST44349754172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:49.385560036 CEST44349754172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:49.385852098 CEST49754443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:49.385910034 CEST44349754172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:49.386002064 CEST49754443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:49.386013985 CEST49754443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:49.386027098 CEST44349754172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:49.619733095 CEST44349754172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:49.620721102 CEST44349754172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:49.620800018 CEST49754443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:49.621104956 CEST49754443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:49.621121883 CEST44349754172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:49.688347101 CEST49755443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:49.688399076 CEST44349755172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:49.688507080 CEST49755443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:49.688834906 CEST49755443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:49.688855886 CEST44349755172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:50.349726915 CEST44349755172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:50.350117922 CEST49755443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:50.350145102 CEST44349755172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:50.350735903 CEST44349755172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:50.351038933 CEST49755443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:50.351111889 CEST44349755172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:50.351197004 CEST49755443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:50.351197004 CEST49755443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:50.351233006 CEST44349755172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:50.658056974 CEST44349755172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:50.658657074 CEST44349755172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:50.658751011 CEST49755443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:50.659121990 CEST49755443192.168.2.8172.217.18.14
                                                      Oct 1, 2024 00:42:50.659142017 CEST44349755172.217.18.14192.168.2.8
                                                      Oct 1, 2024 00:42:54.426877022 CEST49756443192.168.2.813.85.23.86
                                                      Oct 1, 2024 00:42:54.426930904 CEST4434975613.85.23.86192.168.2.8
                                                      Oct 1, 2024 00:42:54.427009106 CEST49756443192.168.2.813.85.23.86
                                                      Oct 1, 2024 00:42:54.427390099 CEST49756443192.168.2.813.85.23.86
                                                      Oct 1, 2024 00:42:54.427402973 CEST4434975613.85.23.86192.168.2.8
                                                      Oct 1, 2024 00:42:55.344896078 CEST4434975613.85.23.86192.168.2.8
                                                      Oct 1, 2024 00:42:55.345036030 CEST49756443192.168.2.813.85.23.86
                                                      Oct 1, 2024 00:42:55.346421003 CEST49756443192.168.2.813.85.23.86
                                                      Oct 1, 2024 00:42:55.346430063 CEST4434975613.85.23.86192.168.2.8
                                                      Oct 1, 2024 00:42:55.346683025 CEST4434975613.85.23.86192.168.2.8
                                                      Oct 1, 2024 00:42:55.348014116 CEST49756443192.168.2.813.85.23.86
                                                      Oct 1, 2024 00:42:55.395394087 CEST4434975613.85.23.86192.168.2.8
                                                      Oct 1, 2024 00:42:55.613289118 CEST4434975613.85.23.86192.168.2.8
                                                      Oct 1, 2024 00:42:55.613308907 CEST4434975613.85.23.86192.168.2.8
                                                      Oct 1, 2024 00:42:55.613322973 CEST4434975613.85.23.86192.168.2.8
                                                      Oct 1, 2024 00:42:55.613430977 CEST49756443192.168.2.813.85.23.86
                                                      Oct 1, 2024 00:42:55.613460064 CEST4434975613.85.23.86192.168.2.8
                                                      Oct 1, 2024 00:42:55.613509893 CEST49756443192.168.2.813.85.23.86
                                                      Oct 1, 2024 00:42:55.614888906 CEST4434975613.85.23.86192.168.2.8
                                                      Oct 1, 2024 00:42:55.614924908 CEST4434975613.85.23.86192.168.2.8
                                                      Oct 1, 2024 00:42:55.614979982 CEST49756443192.168.2.813.85.23.86
                                                      Oct 1, 2024 00:42:55.614986897 CEST4434975613.85.23.86192.168.2.8
                                                      Oct 1, 2024 00:42:55.614998102 CEST4434975613.85.23.86192.168.2.8
                                                      Oct 1, 2024 00:42:55.615003109 CEST49756443192.168.2.813.85.23.86
                                                      Oct 1, 2024 00:42:55.615053892 CEST49756443192.168.2.813.85.23.86
                                                      Oct 1, 2024 00:42:55.616410017 CEST49756443192.168.2.813.85.23.86
                                                      Oct 1, 2024 00:42:55.616425991 CEST4434975613.85.23.86192.168.2.8
                                                      Oct 1, 2024 00:42:55.616483927 CEST49756443192.168.2.813.85.23.86
                                                      Oct 1, 2024 00:42:55.616488934 CEST4434975613.85.23.86192.168.2.8
                                                      Oct 1, 2024 00:43:11.594083071 CEST49758443192.168.2.8216.58.212.164
                                                      Oct 1, 2024 00:43:11.594197989 CEST44349758216.58.212.164192.168.2.8
                                                      Oct 1, 2024 00:43:11.594301939 CEST49758443192.168.2.8216.58.212.164
                                                      Oct 1, 2024 00:43:11.594527006 CEST49758443192.168.2.8216.58.212.164
                                                      Oct 1, 2024 00:43:11.594564915 CEST44349758216.58.212.164192.168.2.8
                                                      Oct 1, 2024 00:43:12.225831985 CEST44349758216.58.212.164192.168.2.8
                                                      Oct 1, 2024 00:43:12.226250887 CEST49758443192.168.2.8216.58.212.164
                                                      Oct 1, 2024 00:43:12.226284027 CEST44349758216.58.212.164192.168.2.8
                                                      Oct 1, 2024 00:43:12.226643085 CEST44349758216.58.212.164192.168.2.8
                                                      Oct 1, 2024 00:43:12.226952076 CEST49758443192.168.2.8216.58.212.164
                                                      Oct 1, 2024 00:43:12.227013111 CEST44349758216.58.212.164192.168.2.8
                                                      Oct 1, 2024 00:43:12.279603958 CEST49758443192.168.2.8216.58.212.164
                                                      Oct 1, 2024 00:43:18.711415052 CEST49760443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:18.711462975 CEST44349760172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:18.711528063 CEST49760443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:18.711760998 CEST49760443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:18.711781025 CEST44349760172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:19.353879929 CEST44349760172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:19.354409933 CEST49760443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:19.354444027 CEST44349760172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:19.354815960 CEST44349760172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:19.355120897 CEST49760443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:19.355180979 CEST44349760172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:19.355264902 CEST49760443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:19.355281115 CEST49760443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:19.355329990 CEST44349760172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:19.652640104 CEST44349760172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:19.653388977 CEST44349760172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:19.653455973 CEST49760443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:19.653765917 CEST49760443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:19.653805017 CEST44349760172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:20.127486944 CEST49761443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:20.127536058 CEST44349761172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:20.127619028 CEST49761443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:20.127854109 CEST49761443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:20.127871990 CEST44349761172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:20.772108078 CEST44349761172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:20.772414923 CEST49761443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:20.772453070 CEST44349761172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:20.772847891 CEST44349761172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:20.773164988 CEST49761443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:20.773241043 CEST44349761172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:20.773349047 CEST49761443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:20.773370028 CEST49761443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:20.773427010 CEST44349761172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:21.076561928 CEST44349761172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:21.076711893 CEST44349761172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:21.076767921 CEST49761443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:21.077122927 CEST49761443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:21.077143908 CEST44349761172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:22.146648884 CEST44349758216.58.212.164192.168.2.8
                                                      Oct 1, 2024 00:43:22.146727085 CEST44349758216.58.212.164192.168.2.8
                                                      Oct 1, 2024 00:43:22.146898031 CEST49758443192.168.2.8216.58.212.164
                                                      Oct 1, 2024 00:43:35.093278885 CEST49758443192.168.2.8216.58.212.164
                                                      Oct 1, 2024 00:43:35.093321085 CEST44349758216.58.212.164192.168.2.8
                                                      Oct 1, 2024 00:43:48.987345934 CEST49763443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:48.987410069 CEST44349763172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:48.987478971 CEST49763443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:48.987925053 CEST49763443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:48.987940073 CEST44349763172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:49.625931978 CEST44349763172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:49.626305103 CEST49763443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:49.626317024 CEST44349763172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:49.626691103 CEST44349763172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:49.627321005 CEST49763443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:49.627321005 CEST49763443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:49.627334118 CEST44349763172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:49.627342939 CEST49763443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:49.627396107 CEST44349763172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:49.670056105 CEST49763443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:49.965579987 CEST44349763172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:49.975028038 CEST44349763172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:49.975178957 CEST49763443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:49.975301981 CEST49763443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:49.975313902 CEST44349763172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:52.813699961 CEST49764443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:52.813755035 CEST44349764172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:52.813831091 CEST49764443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:52.814133883 CEST49764443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:52.814148903 CEST44349764172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:53.456413984 CEST44349764172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:53.462527990 CEST49764443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:53.462554932 CEST44349764172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:53.463007927 CEST44349764172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:53.463426113 CEST49764443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:53.463491917 CEST44349764172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:53.463608980 CEST49764443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:53.463640928 CEST49764443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:53.463644981 CEST44349764172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:53.783107996 CEST44349764172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:53.783551931 CEST44349764172.217.16.206192.168.2.8
                                                      Oct 1, 2024 00:43:53.783629894 CEST49764443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:53.841902971 CEST49764443192.168.2.8172.217.16.206
                                                      Oct 1, 2024 00:43:53.841928959 CEST44349764172.217.16.206192.168.2.8
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Oct 1, 2024 00:42:07.571696997 CEST5686953192.168.2.81.1.1.1
                                                      Oct 1, 2024 00:42:07.572052002 CEST6472253192.168.2.81.1.1.1
                                                      Oct 1, 2024 00:42:07.576004982 CEST53604331.1.1.1192.168.2.8
                                                      Oct 1, 2024 00:42:07.578457117 CEST53568691.1.1.1192.168.2.8
                                                      Oct 1, 2024 00:42:07.578587055 CEST53647221.1.1.1192.168.2.8
                                                      Oct 1, 2024 00:42:07.628971100 CEST53542481.1.1.1192.168.2.8
                                                      Oct 1, 2024 00:42:08.526659966 CEST6395153192.168.2.81.1.1.1
                                                      Oct 1, 2024 00:42:08.526792049 CEST6065753192.168.2.81.1.1.1
                                                      Oct 1, 2024 00:42:08.533257961 CEST53606571.1.1.1192.168.2.8
                                                      Oct 1, 2024 00:42:08.533375025 CEST53639511.1.1.1192.168.2.8
                                                      Oct 1, 2024 00:42:08.632432938 CEST53496621.1.1.1192.168.2.8
                                                      Oct 1, 2024 00:42:11.529303074 CEST5076253192.168.2.81.1.1.1
                                                      Oct 1, 2024 00:42:11.529479027 CEST6316453192.168.2.81.1.1.1
                                                      Oct 1, 2024 00:42:11.539580107 CEST53507621.1.1.1192.168.2.8
                                                      Oct 1, 2024 00:42:11.539702892 CEST53631641.1.1.1192.168.2.8
                                                      Oct 1, 2024 00:42:14.360042095 CEST53501851.1.1.1192.168.2.8
                                                      Oct 1, 2024 00:42:16.619080067 CEST5144753192.168.2.81.1.1.1
                                                      Oct 1, 2024 00:42:16.619254112 CEST4952553192.168.2.81.1.1.1
                                                      Oct 1, 2024 00:42:16.628284931 CEST53514471.1.1.1192.168.2.8
                                                      Oct 1, 2024 00:42:16.628313065 CEST53495251.1.1.1192.168.2.8
                                                      Oct 1, 2024 00:42:18.066764116 CEST5548653192.168.2.81.1.1.1
                                                      Oct 1, 2024 00:42:18.066982031 CEST6108153192.168.2.81.1.1.1
                                                      Oct 1, 2024 00:42:18.073348999 CEST53554861.1.1.1192.168.2.8
                                                      Oct 1, 2024 00:42:18.073559999 CEST53610811.1.1.1192.168.2.8
                                                      Oct 1, 2024 00:42:20.304791927 CEST53552761.1.1.1192.168.2.8
                                                      Oct 1, 2024 00:42:25.768177032 CEST53646801.1.1.1192.168.2.8
                                                      Oct 1, 2024 00:42:45.371045113 CEST53539231.1.1.1192.168.2.8
                                                      Oct 1, 2024 00:42:47.409873962 CEST138138192.168.2.8192.168.2.255
                                                      Oct 1, 2024 00:43:07.178234100 CEST53619301.1.1.1192.168.2.8
                                                      Oct 1, 2024 00:43:07.493385077 CEST53651711.1.1.1192.168.2.8
                                                      Oct 1, 2024 00:43:18.700274944 CEST53581491.1.1.1192.168.2.8
                                                      Oct 1, 2024 00:43:18.703459024 CEST5784053192.168.2.81.1.1.1
                                                      Oct 1, 2024 00:43:18.703627110 CEST5558553192.168.2.81.1.1.1
                                                      Oct 1, 2024 00:43:18.710208893 CEST53578401.1.1.1192.168.2.8
                                                      Oct 1, 2024 00:43:18.711046934 CEST53555851.1.1.1192.168.2.8
                                                      Oct 1, 2024 00:43:35.101459980 CEST53645661.1.1.1192.168.2.8
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Oct 1, 2024 00:42:07.571696997 CEST192.168.2.81.1.1.10x726Standard query (0)youtube.comA (IP address)IN (0x0001)false
                                                      Oct 1, 2024 00:42:07.572052002 CEST192.168.2.81.1.1.10x8cc5Standard query (0)youtube.com65IN (0x0001)false
                                                      Oct 1, 2024 00:42:08.526659966 CEST192.168.2.81.1.1.10xce18Standard query (0)www.youtube.comA (IP address)IN (0x0001)false
                                                      Oct 1, 2024 00:42:08.526792049 CEST192.168.2.81.1.1.10xbc2eStandard query (0)www.youtube.com65IN (0x0001)false
                                                      Oct 1, 2024 00:42:11.529303074 CEST192.168.2.81.1.1.10x51adStandard query (0)www.google.comA (IP address)IN (0x0001)false
                                                      Oct 1, 2024 00:42:11.529479027 CEST192.168.2.81.1.1.10x92a2Standard query (0)www.google.com65IN (0x0001)false
                                                      Oct 1, 2024 00:42:16.619080067 CEST192.168.2.81.1.1.10xe3a1Standard query (0)accounts.youtube.comA (IP address)IN (0x0001)false
                                                      Oct 1, 2024 00:42:16.619254112 CEST192.168.2.81.1.1.10x47dcStandard query (0)accounts.youtube.com65IN (0x0001)false
                                                      Oct 1, 2024 00:42:18.066764116 CEST192.168.2.81.1.1.10x4f2fStandard query (0)play.google.comA (IP address)IN (0x0001)false
                                                      Oct 1, 2024 00:42:18.066982031 CEST192.168.2.81.1.1.10x6020Standard query (0)play.google.com65IN (0x0001)false
                                                      Oct 1, 2024 00:43:18.703459024 CEST192.168.2.81.1.1.10x855Standard query (0)play.google.comA (IP address)IN (0x0001)false
                                                      Oct 1, 2024 00:43:18.703627110 CEST192.168.2.81.1.1.10xc7d7Standard query (0)play.google.com65IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Oct 1, 2024 00:42:07.578457117 CEST1.1.1.1192.168.2.80x726No error (0)youtube.com216.58.206.78A (IP address)IN (0x0001)false
                                                      Oct 1, 2024 00:42:07.578587055 CEST1.1.1.1192.168.2.80x8cc5No error (0)youtube.com65IN (0x0001)false
                                                      Oct 1, 2024 00:42:08.533257961 CEST1.1.1.1192.168.2.80xbc2eNo error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                      Oct 1, 2024 00:42:08.533257961 CEST1.1.1.1192.168.2.80xbc2eNo error (0)youtube-ui.l.google.com65IN (0x0001)false
                                                      Oct 1, 2024 00:42:08.533375025 CEST1.1.1.1192.168.2.80xce18No error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                      Oct 1, 2024 00:42:08.533375025 CEST1.1.1.1192.168.2.80xce18No error (0)youtube-ui.l.google.com142.250.186.46A (IP address)IN (0x0001)false
                                                      Oct 1, 2024 00:42:08.533375025 CEST1.1.1.1192.168.2.80xce18No error (0)youtube-ui.l.google.com172.217.16.206A (IP address)IN (0x0001)false
                                                      Oct 1, 2024 00:42:08.533375025 CEST1.1.1.1192.168.2.80xce18No error (0)youtube-ui.l.google.com172.217.18.14A (IP address)IN (0x0001)false
                                                      Oct 1, 2024 00:42:08.533375025 CEST1.1.1.1192.168.2.80xce18No error (0)youtube-ui.l.google.com142.250.185.206A (IP address)IN (0x0001)false
                                                      Oct 1, 2024 00:42:08.533375025 CEST1.1.1.1192.168.2.80xce18No error (0)youtube-ui.l.google.com142.250.181.238A (IP address)IN (0x0001)false
                                                      Oct 1, 2024 00:42:08.533375025 CEST1.1.1.1192.168.2.80xce18No error (0)youtube-ui.l.google.com142.250.185.110A (IP address)IN (0x0001)false
                                                      Oct 1, 2024 00:42:08.533375025 CEST1.1.1.1192.168.2.80xce18No error (0)youtube-ui.l.google.com142.250.184.206A (IP address)IN (0x0001)false
                                                      Oct 1, 2024 00:42:08.533375025 CEST1.1.1.1192.168.2.80xce18No error (0)youtube-ui.l.google.com142.250.185.78A (IP address)IN (0x0001)false
                                                      Oct 1, 2024 00:42:08.533375025 CEST1.1.1.1192.168.2.80xce18No error (0)youtube-ui.l.google.com142.250.186.142A (IP address)IN (0x0001)false
                                                      Oct 1, 2024 00:42:08.533375025 CEST1.1.1.1192.168.2.80xce18No error (0)youtube-ui.l.google.com142.250.186.110A (IP address)IN (0x0001)false
                                                      Oct 1, 2024 00:42:08.533375025 CEST1.1.1.1192.168.2.80xce18No error (0)youtube-ui.l.google.com142.250.185.238A (IP address)IN (0x0001)false
                                                      Oct 1, 2024 00:42:08.533375025 CEST1.1.1.1192.168.2.80xce18No error (0)youtube-ui.l.google.com216.58.206.78A (IP address)IN (0x0001)false
                                                      Oct 1, 2024 00:42:08.533375025 CEST1.1.1.1192.168.2.80xce18No error (0)youtube-ui.l.google.com142.250.185.142A (IP address)IN (0x0001)false
                                                      Oct 1, 2024 00:42:08.533375025 CEST1.1.1.1192.168.2.80xce18No error (0)youtube-ui.l.google.com142.250.184.238A (IP address)IN (0x0001)false
                                                      Oct 1, 2024 00:42:08.533375025 CEST1.1.1.1192.168.2.80xce18No error (0)youtube-ui.l.google.com142.250.186.78A (IP address)IN (0x0001)false
                                                      Oct 1, 2024 00:42:08.533375025 CEST1.1.1.1192.168.2.80xce18No error (0)youtube-ui.l.google.com142.250.185.174A (IP address)IN (0x0001)false
                                                      Oct 1, 2024 00:42:11.539580107 CEST1.1.1.1192.168.2.80x51adNo error (0)www.google.com216.58.212.164A (IP address)IN (0x0001)false
                                                      Oct 1, 2024 00:42:11.539702892 CEST1.1.1.1192.168.2.80x92a2No error (0)www.google.com65IN (0x0001)false
                                                      Oct 1, 2024 00:42:16.628284931 CEST1.1.1.1192.168.2.80xe3a1No error (0)accounts.youtube.comwww3.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                      Oct 1, 2024 00:42:16.628284931 CEST1.1.1.1192.168.2.80xe3a1No error (0)www3.l.google.com172.217.16.142A (IP address)IN (0x0001)false
                                                      Oct 1, 2024 00:42:16.628313065 CEST1.1.1.1192.168.2.80x47dcNo error (0)accounts.youtube.comwww3.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                      Oct 1, 2024 00:42:18.073348999 CEST1.1.1.1192.168.2.80x4f2fNo error (0)play.google.com172.217.18.14A (IP address)IN (0x0001)false
                                                      Oct 1, 2024 00:43:18.710208893 CEST1.1.1.1192.168.2.80x855No error (0)play.google.com172.217.16.206A (IP address)IN (0x0001)false
                                                      • youtube.com
                                                      • www.youtube.com
                                                      • fs.microsoft.com
                                                      • slscr.update.microsoft.com
                                                      • https:
                                                        • accounts.youtube.com
                                                        • www.google.com
                                                        • play.google.com
                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.849705216.58.206.784437796C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-09-30 22:42:08 UTC847OUTGET /account?=https://accounts.google.com/v3/signin/challenge/pwd HTTP/1.1
                                                      Host: youtube.com
                                                      Connection: keep-alive
                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                      sec-ch-ua-mobile: ?0
                                                      sec-ch-ua-platform: "Windows"
                                                      Upgrade-Insecure-Requests: 1
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                      X-Client-Data: CIW2yQEIorbJAQipncoBCOj/ygEIkqHLAQiFoM0BCNy9zQEIucrNAQiK080BCMfUzQEIodbNAQio2M0BCPnA1BUYwcvMARi60s0BGMXYzQEY642lFw==
                                                      Sec-Fetch-Site: none
                                                      Sec-Fetch-Mode: navigate
                                                      Sec-Fetch-User: ?1
                                                      Sec-Fetch-Dest: document
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US,en;q=0.9
                                                      2024-09-30 22:42:08 UTC1704INHTTP/1.1 301 Moved Permanently
                                                      Content-Type: application/binary
                                                      X-Content-Type-Options: nosniff
                                                      Expires: Mon, 30 Sep 2024 22:42:08 GMT
                                                      Date: Mon, 30 Sep 2024 22:42:08 GMT
                                                      Cache-Control: private, max-age=31536000
                                                      Location: https://www.youtube.com/account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd
                                                      X-Frame-Options: SAMEORIGIN
                                                      Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                      Origin-Trial: AmhMBR6zCLzDDxpW+HfpP67BqwIknWnyMOXOQGfzYswFmJe+fgaI6XZgAzcxOrzNtP7hEDsOo1jdjFnVr2IdxQ4AAAB4eyJvcmlnaW4iOiJodHRwczovL3lvdXR1YmUuY29tOjQ0MyIsImZlYXR1cmUiOiJXZWJWaWV3WFJlcXVlc3RlZFdpdGhEZXByZWNhdGlvbiIsImV4cGlyeSI6MTc1ODA2NzE5OSwiaXNTdWJkb21haW4iOnRydWV9
                                                      Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                      Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="youtube_main"
                                                      Content-Security-Policy: require-trusted-types-for 'script'
                                                      Report-To: {"group":"youtube_main","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/youtube_main"}]}
                                                      Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                      Vary: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                      Server: ESF
                                                      Content-Length: 0
                                                      X-XSS-Protection: 0
                                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                      Connection: close


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      1192.168.2.849711142.250.186.464437796C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-09-30 22:42:09 UTC865OUTGET /account?=https%3A%2F%2Faccounts.google.com%2Fv3%2Fsignin%2Fchallenge%2Fpwd HTTP/1.1
                                                      Host: www.youtube.com
                                                      Connection: keep-alive
                                                      Upgrade-Insecure-Requests: 1
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                      X-Client-Data: CIW2yQEIorbJAQipncoBCOj/ygEIkqHLAQiFoM0BCNy9zQEIucrNAQiK080BCMfUzQEIodbNAQio2M0BCPnA1BUYwcvMARi60s0BGMXYzQEY642lFw==
                                                      Sec-Fetch-Site: none
                                                      Sec-Fetch-Mode: navigate
                                                      Sec-Fetch-User: ?1
                                                      Sec-Fetch-Dest: document
                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                      sec-ch-ua-mobile: ?0
                                                      sec-ch-ua-platform: "Windows"
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US,en;q=0.9
                                                      2024-09-30 22:42:09 UTC2634INHTTP/1.1 303 See Other
                                                      Content-Type: application/binary
                                                      X-Content-Type-Options: nosniff
                                                      Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                      Pragma: no-cache
                                                      Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                      Date: Mon, 30 Sep 2024 22:42:09 GMT
                                                      Location: https://accounts.google.com/ServiceLogin?service=youtube&uilel=3&passive=true&continue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%253F%253Dhttps%25253A%25252F%25252Faccounts.google.com%25252Fv3%25252Fsignin%25252Fchallenge%25252Fpwd%26feature%3Dredirect_login&hl=en
                                                      X-Frame-Options: SAMEORIGIN
                                                      Strict-Transport-Security: max-age=31536000
                                                      Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                      Content-Security-Policy: require-trusted-types-for 'script'
                                                      Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="youtube_main"
                                                      Origin-Trial: AmhMBR6zCLzDDxpW+HfpP67BqwIknWnyMOXOQGfzYswFmJe+fgaI6XZgAzcxOrzNtP7hEDsOo1jdjFnVr2IdxQ4AAAB4eyJvcmlnaW4iOiJodHRwczovL3lvdXR1YmUuY29tOjQ0MyIsImZlYXR1cmUiOiJXZWJWaWV3WFJlcXVlc3RlZFdpdGhEZXByZWNhdGlvbiIsImV4cGlyeSI6MTc1ODA2NzE5OSwiaXNTdWJkb21haW4iOnRydWV9
                                                      Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                      Vary: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                      Report-To: {"group":"youtube_main","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/youtube_main"}]}
                                                      P3P: CP="This is not a P3P policy! See http://support.google.com/accounts/answer/151657?hl=en for more info."
                                                      Server: ESF
                                                      Content-Length: 0
                                                      X-XSS-Protection: 0
                                                      Set-Cookie: GPS=1; Domain=.youtube.com; Expires=Mon, 30-Sep-2024 23:12:09 GMT; Path=/; Secure; HttpOnly
                                                      Set-Cookie: YSC=4e5jegcHGPc; Domain=.youtube.com; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                                                      Set-Cookie: VISITOR_INFO1_LIVE=moZjcjgMsco; Domain=.youtube.com; Expires=Sat, 29-Mar-2025 22:42:09 GMT; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                                                      Set-Cookie: VISITOR_PRIVACY_METADATA=CgJVUxIEGgAgYQ%3D%3D; Domain=.youtube.com; Expires=Sat, 29-Mar-2025 22:42:09 GMT; Path=/; Secure; HttpOnly; SameSite=none; Partitioned
                                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                      Connection: close


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      2192.168.2.849717184.28.90.27443
                                                      TimestampBytes transferredDirectionData
                                                      2024-09-30 22:42:13 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
                                                      Connection: Keep-Alive
                                                      Accept: */*
                                                      Accept-Encoding: identity
                                                      User-Agent: Microsoft BITS/7.8
                                                      Host: fs.microsoft.com
                                                      2024-09-30 22:42:13 UTC467INHTTP/1.1 200 OK
                                                      Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                                                      Content-Type: application/octet-stream
                                                      ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                                                      Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                                                      Server: ECAcc (lpl/EF06)
                                                      X-CID: 11
                                                      X-Ms-ApiVersion: Distribute 1.2
                                                      X-Ms-Region: prod-neu-z1
                                                      Cache-Control: public, max-age=237817
                                                      Date: Mon, 30 Sep 2024 22:42:13 GMT
                                                      Connection: close
                                                      X-CID: 2


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      3192.168.2.849720184.28.90.27443
                                                      TimestampBytes transferredDirectionData
                                                      2024-09-30 22:42:14 UTC239OUTGET /fs/windows/config.json HTTP/1.1
                                                      Connection: Keep-Alive
                                                      Accept: */*
                                                      Accept-Encoding: identity
                                                      If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
                                                      Range: bytes=0-2147483646
                                                      User-Agent: Microsoft BITS/7.8
                                                      Host: fs.microsoft.com
                                                      2024-09-30 22:42:14 UTC515INHTTP/1.1 200 OK
                                                      ApiVersion: Distribute 1.1
                                                      Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                                                      Content-Type: application/octet-stream
                                                      ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                                                      Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                                                      Server: ECAcc (lpl/EF06)
                                                      X-CID: 11
                                                      X-Ms-ApiVersion: Distribute 1.2
                                                      X-Ms-Region: prod-weu-z1
                                                      Cache-Control: public, max-age=237760
                                                      Date: Mon, 30 Sep 2024 22:42:14 GMT
                                                      Content-Length: 55
                                                      Connection: close
                                                      X-CID: 2
                                                      2024-09-30 22:42:14 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
                                                      Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      4192.168.2.84973213.85.23.86443
                                                      TimestampBytes transferredDirectionData
                                                      2024-09-30 22:42:17 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=1hFSlGOzLX4mB+T&MD=hayC8FLE HTTP/1.1
                                                      Connection: Keep-Alive
                                                      Accept: */*
                                                      User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                                      Host: slscr.update.microsoft.com
                                                      2024-09-30 22:42:17 UTC560INHTTP/1.1 200 OK
                                                      Cache-Control: no-cache
                                                      Pragma: no-cache
                                                      Content-Type: application/octet-stream
                                                      Expires: -1
                                                      Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                                      ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
                                                      MS-CorrelationId: 97f716ce-9a79-43dd-b508-23e94e1feac7
                                                      MS-RequestId: 22670bbd-106e-4de0-bfb9-813f5ead022c
                                                      MS-CV: KuoV9gRqdkiHVISJ.0
                                                      X-Microsoft-SLSClientCache: 2880
                                                      Content-Disposition: attachment; filename=environment.cab
                                                      X-Content-Type-Options: nosniff
                                                      Date: Mon, 30 Sep 2024 22:42:17 GMT
                                                      Connection: close
                                                      Content-Length: 24490
                                                      2024-09-30 22:42:17 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
                                                      Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
                                                      2024-09-30 22:42:17 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
                                                      Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      5192.168.2.849733172.217.16.1424437796C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-09-30 22:42:17 UTC1232OUTGET /accounts/CheckConnection?pmpo=https%3A%2F%2Faccounts.google.com&v=-911596174&timestamp=1727736135802 HTTP/1.1
                                                      Host: accounts.youtube.com
                                                      Connection: keep-alive
                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                      sec-ch-ua-mobile: ?0
                                                      sec-ch-ua-full-version: "117.0.5938.132"
                                                      sec-ch-ua-arch: "x86"
                                                      sec-ch-ua-platform: "Windows"
                                                      sec-ch-ua-platform-version: "10.0.0"
                                                      sec-ch-ua-model: ""
                                                      sec-ch-ua-bitness: "64"
                                                      sec-ch-ua-wow64: ?0
                                                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                      Upgrade-Insecure-Requests: 1
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                      X-Client-Data: CIW2yQEIorbJAQipncoBCOj/ygEIkqHLAQiFoM0BCNy9zQEIucrNAQiK080BCMfUzQEIodbNAQio2M0BCPnA1BUYwcvMARi60s0BGMXYzQEY642lFw==
                                                      Sec-Fetch-Site: cross-site
                                                      Sec-Fetch-Mode: navigate
                                                      Sec-Fetch-User: ?1
                                                      Sec-Fetch-Dest: iframe
                                                      Referer: https://accounts.google.com/
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US,en;q=0.9
                                                      2024-09-30 22:42:17 UTC1969INHTTP/1.1 200 OK
                                                      Content-Type: text/html; charset=utf-8
                                                      X-Frame-Options: ALLOW-FROM https://accounts.google.com
                                                      Content-Security-Policy: frame-ancestors https://accounts.google.com
                                                      Content-Security-Policy: script-src 'report-sample' 'nonce-f_ho9W3XgrgQfgmQ_DjjcA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport;worker-src 'self'
                                                      Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport/allowlist
                                                      Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/AccountsDomainCookiesCheckConnectionHttp/cspreport
                                                      Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                      Pragma: no-cache
                                                      Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                      Date: Mon, 30 Sep 2024 22:42:17 GMT
                                                      Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                      Cross-Origin-Opener-Policy: same-origin
                                                      Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                      Cross-Origin-Resource-Policy: cross-origin
                                                      reporting-endpoints: default="/_/AccountsDomainCookiesCheckConnectionHttp/web-reports?context=eJzjstDikmII0JBikPj6kkkNiJ3SZ7AGAHHSv_OsBUB8ufsS63UgVu25xGoMxEUSV1gbgFiIh-PkpTfb2QRWHLt-l1FJLym_MD4zJTWvJLOkMiU_NzEzLzk_Pzsztbg4tagstSjeyMDIxMDSyEjPwCK-wAAA_W8uDg"
                                                      Server: ESF
                                                      X-XSS-Protection: 0
                                                      X-Content-Type-Options: nosniff
                                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                      Accept-Ranges: none
                                                      Vary: Accept-Encoding
                                                      Connection: close
                                                      Transfer-Encoding: chunked
                                                      2024-09-30 22:42:17 UTC1969INData Raw: 37 36 32 30 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 20 6e 6f 6e 63 65 3d 22 66 5f 68 6f 39 57 33 58 67 72 67 51 66 67 6d 51 5f 44 6a 6a 63 41 22 3e 22 75 73 65 20 73 74 72 69 63 74 22 3b 74 68 69 73 2e 64 65 66 61 75 6c 74 5f 41 63 63 6f 75 6e 74 73 44 6f 6d 61 69 6e 63 6f 6f 6b 69 65 73 43 68 65 63 6b 63 6f 6e 6e 65 63 74 69 6f 6e 4a 73 3d 74 68 69 73 2e 64 65 66 61 75 6c 74 5f 41 63 63 6f 75 6e 74 73 44 6f 6d 61 69 6e 63 6f 6f 6b 69 65 73 43 68 65 63 6b 63 6f 6e 6e 65 63 74 69 6f 6e 4a 73 7c 7c 7b 7d 3b 28 66 75 6e 63 74 69 6f 6e 28 5f 29 7b 76 61 72 20 77 69 6e 64 6f 77 3d 74 68 69 73 3b 0a 74 72 79 7b 0a 5f 2e 5f 46 5f 74 6f 67 67 6c 65 73 5f 69 6e 69 74 69 61 6c 69 7a 65 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 28 74 79 70 65 6f
                                                      Data Ascii: 7620<html><head><script nonce="f_ho9W3XgrgQfgmQ_DjjcA">"use strict";this.default_AccountsDomaincookiesCheckconnectionJs=this.default_AccountsDomaincookiesCheckconnectionJs||{};(function(_){var window=this;try{_._F_toggles_initialize=function(a){(typeo
                                                      2024-09-30 22:42:17 UTC1969INData Raw: 54 72 69 64 65 6e 74 5c 2f 28 5c 64 2e 5c 64 29 2f 2e 65 78 65 63 28 62 29 2c 0a 63 5b 31 5d 3d 3d 22 37 2e 30 22 29 69 66 28 62 26 26 62 5b 31 5d 29 73 77 69 74 63 68 28 62 5b 31 5d 29 7b 63 61 73 65 20 22 34 2e 30 22 3a 61 3d 22 38 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 35 2e 30 22 3a 61 3d 22 39 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 36 2e 30 22 3a 61 3d 22 31 30 2e 30 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 37 2e 30 22 3a 61 3d 22 31 31 2e 30 22 7d 65 6c 73 65 20 61 3d 22 37 2e 30 22 3b 65 6c 73 65 20 61 3d 63 5b 31 5d 3b 62 3d 61 7d 65 6c 73 65 20 62 3d 22 22 3b 72 65 74 75 72 6e 20 62 7d 76 61 72 20 64 3d 52 65 67 45 78 70 28 22 28 5b 41 2d 5a 5d 5b 5c 5c 77 20 5d 2b 29 2f 28 5b 5e 5c 5c 73 5d 2b 29 5c 5c 73 2a 28 3f 3a 5c 5c 28
                                                      Data Ascii: Trident\/(\d.\d)/.exec(b),c[1]=="7.0")if(b&&b[1])switch(b[1]){case "4.0":a="8.0";break;case "5.0":a="9.0";break;case "6.0":a="10.0";break;case "7.0":a="11.0"}else a="7.0";else a=c[1];b=a}else b="";return b}var d=RegExp("([A-Z][\\w ]+)/([^\\s]+)\\s*(?:\\(
                                                      2024-09-30 22:42:17 UTC1969INData Raw: 74 63 68 28 74 79 70 65 6f 66 20 61 29 7b 63 61 73 65 20 22 6e 75 6d 62 65 72 22 3a 72 65 74 75 72 6e 20 69 73 46 69 6e 69 74 65 28 61 29 3f 61 3a 53 74 72 69 6e 67 28 61 29 3b 63 61 73 65 20 22 62 69 67 69 6e 74 22 3a 72 65 74 75 72 6e 28 41 61 3f 0a 61 3e 3d 42 61 26 26 61 3c 3d 43 61 3a 61 5b 30 5d 3d 3d 3d 22 2d 22 3f 75 61 28 61 2c 44 61 29 3a 75 61 28 61 2c 45 61 29 29 3f 4e 75 6d 62 65 72 28 61 29 3a 53 74 72 69 6e 67 28 61 29 3b 63 61 73 65 20 22 62 6f 6f 6c 65 61 6e 22 3a 72 65 74 75 72 6e 20 61 3f 31 3a 30 3b 63 61 73 65 20 22 6f 62 6a 65 63 74 22 3a 69 66 28 61 29 69 66 28 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 61 29 29 7b 69 66 28 43 28 61 29 29 72 65 74 75 72 6e 7d 65 6c 73 65 20 69 66 28 46 61 26 26 61 21 3d 6e 75 6c 6c 26 26 61 20 69 6e
                                                      Data Ascii: tch(typeof a){case "number":return isFinite(a)?a:String(a);case "bigint":return(Aa?a>=Ba&&a<=Ca:a[0]==="-"?ua(a,Da):ua(a,Ea))?Number(a):String(a);case "boolean":return a?1:0;case "object":if(a)if(Array.isArray(a)){if(C(a))return}else if(Fa&&a!=null&&a in
                                                      2024-09-30 22:42:17 UTC1969INData Raw: 7b 76 61 72 20 62 3b 69 66 28 61 26 26 28 62 3d 51 61 29 21 3d 6e 75 6c 6c 26 26 62 2e 68 61 73 28 61 29 26 26 28 62 3d 61 2e 43 29 29 66 6f 72 28 76 61 72 20 63 3d 30 3b 63 3c 62 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 7b 76 61 72 20 64 3d 62 5b 63 5d 3b 69 66 28 63 3d 3d 3d 62 2e 6c 65 6e 67 74 68 2d 31 26 26 41 28 64 29 29 66 6f 72 28 76 61 72 20 65 20 69 6e 20 64 29 7b 76 61 72 20 66 3d 64 5b 65 5d 3b 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 66 29 26 26 0a 52 61 28 66 2c 61 29 7d 65 6c 73 65 20 41 72 72 61 79 2e 69 73 41 72 72 61 79 28 64 29 26 26 52 61 28 64 2c 61 29 7d 61 3d 45 3f 61 2e 43 3a 4d 61 28 61 2e 43 2c 50 61 2c 76 6f 69 64 20 30 2c 76 6f 69 64 20 30 2c 21 31 29 3b 65 3d 21 45 3b 69 66 28 62 3d 61 2e 6c 65 6e 67 74 68 29 7b 64 3d 61 5b 62 2d
                                                      Data Ascii: {var b;if(a&&(b=Qa)!=null&&b.has(a)&&(b=a.C))for(var c=0;c<b.length;c++){var d=b[c];if(c===b.length-1&&A(d))for(var e in d){var f=d[e];Array.isArray(f)&&Ra(f,a)}else Array.isArray(d)&&Ra(d,a)}a=E?a.C:Ma(a.C,Pa,void 0,void 0,!1);e=!E;if(b=a.length){d=a[b-
                                                      2024-09-30 22:42:17 UTC1969INData Raw: 6f 6c 2e 69 74 65 72 61 74 6f 72 22 2c 66 75 6e 63 74 69 6f 6e 28 61 29 7b 69 66 28 61 29 72 65 74 75 72 6e 20 61 3b 61 3d 53 79 6d 62 6f 6c 28 22 63 22 29 3b 66 6f 72 28 76 61 72 20 62 3d 22 41 72 72 61 79 20 49 6e 74 38 41 72 72 61 79 20 55 69 6e 74 38 41 72 72 61 79 20 55 69 6e 74 38 43 6c 61 6d 70 65 64 41 72 72 61 79 20 49 6e 74 31 36 41 72 72 61 79 20 55 69 6e 74 31 36 41 72 72 61 79 20 49 6e 74 33 32 41 72 72 61 79 20 55 69 6e 74 33 32 41 72 72 61 79 20 46 6c 6f 61 74 33 32 41 72 72 61 79 20 46 6c 6f 61 74 36 34 41 72 72 61 79 22 2e 73 70 6c 69 74 28 22 20 22 29 2c 63 3d 30 3b 63 3c 62 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 7b 76 61 72 20 64 3d 57 61 5b 62 5b 63 5d 5d 3b 74 79 70 65 6f 66 20 64 3d 3d 3d 22 66 75 6e 63 74 69 6f 6e 22 26 26 74 79 70 65
                                                      Data Ascii: ol.iterator",function(a){if(a)return a;a=Symbol("c");for(var b="Array Int8Array Uint8Array Uint8ClampedArray Int16Array Uint16Array Int32Array Uint32Array Float32Array Float64Array".split(" "),c=0;c<b.length;c++){var d=Wa[b[c]];typeof d==="function"&&type
                                                      2024-09-30 22:42:17 UTC1969INData Raw: 29 3b 65 28 22 66 72 65 65 7a 65 22 29 3b 65 28 22 70 72 65 76 65 6e 74 45 78 74 65 6e 73 69 6f 6e 73 22 29 3b 65 28 22 73 65 61 6c 22 29 3b 76 61 72 20 68 3d 30 2c 67 3d 66 75 6e 63 74 69 6f 6e 28 6b 29 7b 74 68 69 73 2e 67 3d 28 68 2b 3d 4d 61 74 68 2e 72 61 6e 64 6f 6d 28 29 2b 31 29 2e 74 6f 53 74 72 69 6e 67 28 29 3b 69 66 28 6b 29 7b 6b 3d 48 28 6b 29 3b 66 6f 72 28 76 61 72 20 6c 3b 21 28 6c 3d 6b 2e 6e 65 78 74 28 29 29 2e 64 6f 6e 65 3b 29 6c 3d 6c 2e 76 61 6c 75 65 2c 74 68 69 73 2e 73 65 74 28 6c 5b 30 5d 2c 6c 5b 31 5d 29 7d 7d 3b 67 2e 70 72 6f 74 6f 74 79 70 65 2e 73 65 74 3d 66 75 6e 63 74 69 6f 6e 28 6b 2c 6c 29 7b 69 66 28 21 63 28 6b 29 29 74 68 72 6f 77 20 45 72 72 6f 72 28 22 69 22 29 3b 64 28 6b 29 3b 69 66 28 21 49 28 6b 2c 66 29 29
                                                      Data Ascii: );e("freeze");e("preventExtensions");e("seal");var h=0,g=function(k){this.g=(h+=Math.random()+1).toString();if(k){k=H(k);for(var l;!(l=k.next()).done;)l=l.value,this.set(l[0],l[1])}};g.prototype.set=function(k,l){if(!c(k))throw Error("i");d(k);if(!I(k,f))
                                                      2024-09-30 22:42:17 UTC1969INData Raw: 75 72 6e 20 67 2e 76 61 6c 75 65 7d 29 7d 3b 63 2e 70 72 6f 74 6f 74 79 70 65 2e 66 6f 72 45 61 63 68 3d 66 75 6e 63 74 69 6f 6e 28 67 2c 6b 29 7b 66 6f 72 28 76 61 72 20 6c 3d 74 68 69 73 2e 65 6e 74 72 69 65 73 28 29 2c 6d 3b 21 28 6d 3d 6c 2e 6e 65 78 74 28 29 29 2e 64 6f 6e 65 3b 29 6d 3d 0a 6d 2e 76 61 6c 75 65 2c 67 2e 63 61 6c 6c 28 6b 2c 6d 5b 31 5d 2c 6d 5b 30 5d 2c 74 68 69 73 29 7d 3b 63 2e 70 72 6f 74 6f 74 79 70 65 5b 53 79 6d 62 6f 6c 2e 69 74 65 72 61 74 6f 72 5d 3d 63 2e 70 72 6f 74 6f 74 79 70 65 2e 65 6e 74 72 69 65 73 3b 76 61 72 20 64 3d 66 75 6e 63 74 69 6f 6e 28 67 2c 6b 29 7b 76 61 72 20 6c 3d 6b 26 26 74 79 70 65 6f 66 20 6b 3b 6c 3d 3d 22 6f 62 6a 65 63 74 22 7c 7c 6c 3d 3d 22 66 75 6e 63 74 69 6f 6e 22 3f 62 2e 68 61 73 28 6b 29
                                                      Data Ascii: urn g.value})};c.prototype.forEach=function(g,k){for(var l=this.entries(),m;!(m=l.next()).done;)m=m.value,g.call(k,m[1],m[0],this)};c.prototype[Symbol.iterator]=c.prototype.entries;var d=function(g,k){var l=k&&typeof k;l=="object"||l=="function"?b.has(k)
                                                      2024-09-30 22:42:17 UTC1969INData Raw: 6f 6e 28 61 29 7b 72 65 74 75 72 6e 20 61 3f 61 3a 66 75 6e 63 74 69 6f 6e 28 62 29 7b 72 65 74 75 72 6e 20 74 79 70 65 6f 66 20 62 3d 3d 3d 22 6e 75 6d 62 65 72 22 26 26 69 73 4e 61 4e 28 62 29 7d 7d 29 3b 76 61 72 20 66 62 3d 66 62 7c 7c 7b 7d 2c 71 3d 74 68 69 73 7c 7c 73 65 6c 66 2c 67 62 3d 71 2e 5f 46 5f 74 6f 67 67 6c 65 73 7c 7c 5b 5d 2c 68 62 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 61 3d 61 2e 73 70 6c 69 74 28 22 2e 22 29 3b 66 6f 72 28 76 61 72 20 62 3d 71 2c 63 3d 30 3b 63 3c 61 2e 6c 65 6e 67 74 68 3b 63 2b 2b 29 69 66 28 62 3d 62 5b 61 5b 63 5d 5d 2c 62 3d 3d 6e 75 6c 6c 29 72 65 74 75 72 6e 20 6e 75 6c 6c 3b 72 65 74 75 72 6e 20 62 7d 2c 69 62 3d 22 63 6c 6f 73 75 72 65 5f 75 69 64 5f 22 2b 28 4d 61 74 68 2e 72 61 6e 64 6f 6d 28 29 2a 31 45
                                                      Data Ascii: on(a){return a?a:function(b){return typeof b==="number"&&isNaN(b)}});var fb=fb||{},q=this||self,gb=q._F_toggles||[],hb=function(a){a=a.split(".");for(var b=q,c=0;c<a.length;c++)if(b=b[a[c]],b==null)return null;return b},ib="closure_uid_"+(Math.random()*1E
                                                      2024-09-30 22:42:17 UTC1969INData Raw: 74 65 78 74 5f 5f 39 38 34 33 38 32 3d 7b 7d 29 3b 61 2e 5f 5f 63 6c 6f 73 75 72 65 5f 5f 65 72 72 6f 72 5f 5f 63 6f 6e 74 65 78 74 5f 5f 39 38 34 33 38 32 2e 73 65 76 65 72 69 74 79 3d 62 7d 3b 76 61 72 20 71 62 3d 66 75 6e 63 74 69 6f 6e 28 61 2c 62 2c 63 29 7b 63 3d 63 7c 7c 71 3b 76 61 72 20 64 3d 63 2e 6f 6e 65 72 72 6f 72 2c 65 3d 21 21 62 3b 63 2e 6f 6e 65 72 72 6f 72 3d 66 75 6e 63 74 69 6f 6e 28 66 2c 68 2c 67 2c 6b 2c 6c 29 7b 64 26 26 64 28 66 2c 68 2c 67 2c 6b 2c 6c 29 3b 61 28 7b 6d 65 73 73 61 67 65 3a 66 2c 66 69 6c 65 4e 61 6d 65 3a 68 2c 6c 69 6e 65 3a 67 2c 6c 69 6e 65 4e 75 6d 62 65 72 3a 67 2c 63 61 3a 6b 2c 65 72 72 6f 72 3a 6c 7d 29 3b 72 65 74 75 72 6e 20 65 7d 7d 2c 74 62 3d 66 75 6e 63 74 69 6f 6e 28 61 29 7b 76 61 72 20 62 3d 68
                                                      Data Ascii: text__984382={});a.__closure__error__context__984382.severity=b};var qb=function(a,b,c){c=c||q;var d=c.onerror,e=!!b;c.onerror=function(f,h,g,k,l){d&&d(f,h,g,k,l);a({message:f,fileName:h,line:g,lineNumber:g,ca:k,error:l});return e}},tb=function(a){var b=h
                                                      2024-09-30 22:42:17 UTC1969INData Raw: 22 6e 75 6d 62 65 72 22 3a 66 3d 53 74 72 69 6e 67 28 66 29 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 62 6f 6f 6c 65 61 6e 22 3a 66 3d 66 3f 22 74 72 75 65 22 3a 22 66 61 6c 73 65 22 3b 62 72 65 61 6b 3b 63 61 73 65 20 22 66 75 6e 63 74 69 6f 6e 22 3a 66 3d 28 66 3d 73 62 28 66 29 29 3f 66 3a 22 5b 66 6e 5d 22 3b 62 72 65 61 6b 3b 64 65 66 61 75 6c 74 3a 66 3d 0a 74 79 70 65 6f 66 20 66 7d 66 2e 6c 65 6e 67 74 68 3e 34 30 26 26 28 66 3d 66 2e 73 6c 69 63 65 28 30 2c 34 30 29 2b 22 2e 2e 2e 22 29 3b 63 2e 70 75 73 68 28 66 29 7d 62 2e 70 75 73 68 28 61 29 3b 63 2e 70 75 73 68 28 22 29 5c 6e 22 29 3b 74 72 79 7b 63 2e 70 75 73 68 28 77 62 28 61 2e 63 61 6c 6c 65 72 2c 62 29 29 7d 63 61 74 63 68 28 68 29 7b 63 2e 70 75 73 68 28 22 5b 65 78 63 65 70 74 69 6f 6e
                                                      Data Ascii: "number":f=String(f);break;case "boolean":f=f?"true":"false";break;case "function":f=(f=sb(f))?f:"[fn]";break;default:f=typeof f}f.length>40&&(f=f.slice(0,40)+"...");c.push(f)}b.push(a);c.push(")\n");try{c.push(wb(a.caller,b))}catch(h){c.push("[exception


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      6192.168.2.849738172.217.18.144437796C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-09-30 22:42:18 UTC549OUTOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                      Host: play.google.com
                                                      Connection: keep-alive
                                                      Accept: */*
                                                      Access-Control-Request-Method: POST
                                                      Access-Control-Request-Headers: x-goog-authuser
                                                      Origin: https://accounts.google.com
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                      Sec-Fetch-Mode: cors
                                                      Sec-Fetch-Site: same-site
                                                      Sec-Fetch-Dest: empty
                                                      Referer: https://accounts.google.com/
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US,en;q=0.9
                                                      2024-09-30 22:42:19 UTC520INHTTP/1.1 200 OK
                                                      Access-Control-Allow-Origin: https://accounts.google.com
                                                      Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                      Access-Control-Max-Age: 86400
                                                      Access-Control-Allow-Credentials: true
                                                      Access-Control-Allow-Headers: X-Playlog-Web,authorization,origin,x-goog-authuser
                                                      Content-Type: text/plain; charset=UTF-8
                                                      Date: Mon, 30 Sep 2024 22:42:18 GMT
                                                      Server: Playlog
                                                      Content-Length: 0
                                                      X-XSS-Protection: 0
                                                      X-Frame-Options: SAMEORIGIN
                                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                      Connection: close


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      7192.168.2.849737172.217.18.144437796C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-09-30 22:42:18 UTC549OUTOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                      Host: play.google.com
                                                      Connection: keep-alive
                                                      Accept: */*
                                                      Access-Control-Request-Method: POST
                                                      Access-Control-Request-Headers: x-goog-authuser
                                                      Origin: https://accounts.google.com
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                      Sec-Fetch-Mode: cors
                                                      Sec-Fetch-Site: same-site
                                                      Sec-Fetch-Dest: empty
                                                      Referer: https://accounts.google.com/
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US,en;q=0.9
                                                      2024-09-30 22:42:19 UTC520INHTTP/1.1 200 OK
                                                      Access-Control-Allow-Origin: https://accounts.google.com
                                                      Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                      Access-Control-Max-Age: 86400
                                                      Access-Control-Allow-Credentials: true
                                                      Access-Control-Allow-Headers: X-Playlog-Web,authorization,origin,x-goog-authuser
                                                      Content-Type: text/plain; charset=UTF-8
                                                      Date: Mon, 30 Sep 2024 22:42:18 GMT
                                                      Server: Playlog
                                                      Content-Length: 0
                                                      X-XSS-Protection: 0
                                                      X-Frame-Options: SAMEORIGIN
                                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                      Connection: close


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      8192.168.2.849716216.58.212.1644437796C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-09-30 22:42:19 UTC1013OUTGET /favicon.ico HTTP/1.1
                                                      Host: www.google.com
                                                      Connection: keep-alive
                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                      sec-ch-ua-mobile: ?0
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                      sec-ch-ua-arch: "x86"
                                                      sec-ch-ua-full-version: "117.0.5938.132"
                                                      sec-ch-ua-platform-version: "10.0.0"
                                                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                      sec-ch-ua-bitness: "64"
                                                      sec-ch-ua-model: ""
                                                      sec-ch-ua-wow64: ?0
                                                      sec-ch-ua-platform: "Windows"
                                                      Accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
                                                      X-Client-Data: CIW2yQEIorbJAQipncoBCOj/ygEIkqHLAQiFoM0BCNy9zQEIucrNAQiK080BCMfUzQEIodbNAQio2M0BCPnA1BUYwcvMARi60s0BGMXYzQEY642lFw==
                                                      Sec-Fetch-Site: same-site
                                                      Sec-Fetch-Mode: no-cors
                                                      Sec-Fetch-Dest: image
                                                      Referer: https://accounts.google.com/
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US,en;q=0.9
                                                      2024-09-30 22:42:19 UTC706INHTTP/1.1 200 OK
                                                      Accept-Ranges: bytes
                                                      Cross-Origin-Resource-Policy: cross-origin
                                                      Cross-Origin-Opener-Policy-Report-Only: same-origin; report-to="static-on-bigtable"
                                                      Report-To: {"group":"static-on-bigtable","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/static-on-bigtable"}]}
                                                      Content-Length: 5430
                                                      X-Content-Type-Options: nosniff
                                                      Server: sffe
                                                      X-XSS-Protection: 0
                                                      Date: Mon, 30 Sep 2024 17:00:09 GMT
                                                      Expires: Tue, 08 Oct 2024 17:00:09 GMT
                                                      Cache-Control: public, max-age=691200
                                                      Last-Modified: Tue, 22 Oct 2019 18:30:00 GMT
                                                      Content-Type: image/x-icon
                                                      Vary: Accept-Encoding
                                                      Age: 20530
                                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                      Connection: close
                                                      2024-09-30 22:42:19 UTC684INData Raw: 00 00 01 00 02 00 10 10 00 00 01 00 20 00 68 04 00 00 26 00 00 00 20 20 00 00 01 00 20 00 a8 10 00 00 8e 04 00 00 28 00 00 00 10 00 00 00 20 00 00 00 01 00 20 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 30 fd fd fd 96 fd fd fd d8 fd fd fd f9 fd fd fd f9 fd fd fd d7 fd fd fd 94 fe fe fe 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd 99 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 95 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd c1 ff ff ff ff fa fd f9 ff b4 d9 a7 ff 76 ba 5d ff 58 ab 3a ff 58 aa 3a ff 72 b8 59 ff ac d5 9d ff f8 fb f6 ff ff
                                                      Data Ascii: h& ( 0.v]X:X:rY
                                                      2024-09-30 22:42:19 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d8 fd fd fd 99 ff ff ff ff 92 cf fb ff 37 52 ec ff 38 46 ea ff d0 d4 fa ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 96 fe fe fe 32 ff ff ff ff f9 f9 fe ff 56 62 ed ff 35 43 ea ff 3b 49 eb ff 95 9c f4 ff cf d2 fa ff d1 d4 fa ff 96 9d f4 ff 52 5e ed ff e1 e3 fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 30 00 00 00 00 fd fd fd 9d ff ff ff ff e8 ea fd ff 58 63 ee ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 6c 76 f0 ff ff ff ff ff ff ff ff ff fd fd fd 98 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd c3 ff ff ff ff f9 f9 fe ff a5 ac f6 ff 5d 69 ee ff 3c
                                                      Data Ascii: 7R8F2Vb5C;IR^0Xc5C5C5C5C5C5Clv]i<
                                                      2024-09-30 22:42:19 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d0 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fd fd fd 8b ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff b1 d8 a3 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 60 a5 35 ff ca 8e 3e ff f9 c1 9f ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 87 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 25 fd fd fd fb ff ff ff ff ff ff ff ff ff ff ff ff c2 e0 b7 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 6e b6 54 ff 9f ce 8d ff b7 da aa ff b8 db ab ff a5 d2 95 ff 7b bc 64 ff 54 a8 35 ff 53 a8 34 ff 77 a0 37 ff e3 89 41 ff f4 85 42 ff f4 85 42
                                                      Data Ascii: S4S4S4S4S4S4S4S4S4S4S4S4S4S4`5>%S4S4S4S4S4S4nT{dT5S4w7ABB
                                                      2024-09-30 22:42:19 UTC1390INData Raw: 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff fb d5 bf ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd ea fd fd fd cb ff ff ff ff ff ff ff ff ff ff ff ff 46 cd fc ff 05 bc fb ff 05 bc fb ff 05 bc fb ff 21 ae f9 ff fb fb ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd c8 fd fd fd 9c ff ff ff ff ff ff ff ff ff ff ff ff 86 df fd ff 05 bc fb ff 05 bc fb ff 15 93 f5 ff 34 49 eb ff b3 b8 f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                      Data Ascii: BBBBBBBF!4I
                                                      2024-09-30 22:42:19 UTC576INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d2 fe fe fe 24 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd 8d fd fd fd fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd fb fd fd fd 8b fe fe fe 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 27 fd fd fd 9f fd fd fd f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                      Data Ascii: $'


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      9192.168.2.849745172.217.18.144437796C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-09-30 22:42:19 UTC1120OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                      Host: play.google.com
                                                      Connection: keep-alive
                                                      Content-Length: 519
                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                      sec-ch-ua-mobile: ?0
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                      sec-ch-ua-arch: "x86"
                                                      Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                      sec-ch-ua-full-version: "117.0.5938.132"
                                                      sec-ch-ua-platform-version: "10.0.0"
                                                      X-Goog-AuthUser: 0
                                                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                      sec-ch-ua-bitness: "64"
                                                      sec-ch-ua-model: ""
                                                      sec-ch-ua-wow64: ?0
                                                      sec-ch-ua-platform: "Windows"
                                                      Accept: */*
                                                      Origin: https://accounts.google.com
                                                      X-Client-Data: CIW2yQEIorbJAQipncoBCOj/ygEIkqHLAQiFoM0BCNy9zQEIucrNAQiK080BCMfUzQEIodbNAQio2M0BCPnA1BUYwcvMARi60s0BGMXYzQEY642lFw==
                                                      Sec-Fetch-Site: same-site
                                                      Sec-Fetch-Mode: cors
                                                      Sec-Fetch-Dest: empty
                                                      Referer: https://accounts.google.com/
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US,en;q=0.9
                                                      2024-09-30 22:42:19 UTC519OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 37 33 36 31 33 37 31 31 38 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                      Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727736137118",null,null,null
                                                      2024-09-30 22:42:19 UTC932INHTTP/1.1 200 OK
                                                      Access-Control-Allow-Origin: https://accounts.google.com
                                                      Cross-Origin-Resource-Policy: cross-origin
                                                      Access-Control-Allow-Credentials: true
                                                      Access-Control-Allow-Headers: X-Playlog-Web
                                                      Set-Cookie: NID=518=UK3xGPGIm5flP0uVeo6rQyaE1yJP-AkvKe4Nh6eD5ZxaPxHea5e8buxUEaoPpGetHXRJJiwu7iKWeZt0Recrqh-DKRWup_56UYpZaVvRW1ALBNPxnCSNE6NuN7DjU1psJduRnHXP7cj-dQlkjrFTpr4Y18ZjnJsQKRzZBrh-TTw6dXwStA; expires=Tue, 01-Apr-2025 22:42:19 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                      P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                      Content-Type: text/plain; charset=UTF-8
                                                      Date: Mon, 30 Sep 2024 22:42:19 GMT
                                                      Server: Playlog
                                                      Cache-Control: private
                                                      X-XSS-Protection: 0
                                                      X-Frame-Options: SAMEORIGIN
                                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                      Accept-Ranges: none
                                                      Vary: Accept-Encoding
                                                      Expires: Mon, 30 Sep 2024 22:42:19 GMT
                                                      Connection: close
                                                      Transfer-Encoding: chunked
                                                      2024-09-30 22:42:19 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                      Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                      2024-09-30 22:42:19 UTC5INData Raw: 30 0d 0a 0d 0a
                                                      Data Ascii: 0


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      10192.168.2.849746172.217.18.144437796C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-09-30 22:42:19 UTC1120OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                      Host: play.google.com
                                                      Connection: keep-alive
                                                      Content-Length: 507
                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                      sec-ch-ua-mobile: ?0
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                      sec-ch-ua-arch: "x86"
                                                      Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                      sec-ch-ua-full-version: "117.0.5938.132"
                                                      sec-ch-ua-platform-version: "10.0.0"
                                                      X-Goog-AuthUser: 0
                                                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                      sec-ch-ua-bitness: "64"
                                                      sec-ch-ua-model: ""
                                                      sec-ch-ua-wow64: ?0
                                                      sec-ch-ua-platform: "Windows"
                                                      Accept: */*
                                                      Origin: https://accounts.google.com
                                                      X-Client-Data: CIW2yQEIorbJAQipncoBCOj/ygEIkqHLAQiFoM0BCNy9zQEIucrNAQiK080BCMfUzQEIodbNAQio2M0BCPnA1BUYwcvMARi60s0BGMXYzQEY642lFw==
                                                      Sec-Fetch-Site: same-site
                                                      Sec-Fetch-Mode: cors
                                                      Sec-Fetch-Dest: empty
                                                      Referer: https://accounts.google.com/
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US,en;q=0.9
                                                      2024-09-30 22:42:19 UTC507OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 37 33 36 31 33 37 32 35 35 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                      Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727736137255",null,null,null
                                                      2024-09-30 22:42:19 UTC932INHTTP/1.1 200 OK
                                                      Access-Control-Allow-Origin: https://accounts.google.com
                                                      Cross-Origin-Resource-Policy: cross-origin
                                                      Access-Control-Allow-Credentials: true
                                                      Access-Control-Allow-Headers: X-Playlog-Web
                                                      Set-Cookie: NID=518=SG8s7aBJUmpZqQuMyGfLQnF_9LWHDgxPELtm3HMb8MMWO6HTTinAQDmuiHsz3SAhf8hd9RzXNlE5d4RMmslKT-E95FYfVj2ngjDxM4418yJLEigHb9d_CQgeTFh98kves80t01pArN7UaNMRxw6mg90_LTgdbT2Wf09CBiRlROmoubYwvg; expires=Tue, 01-Apr-2025 22:42:19 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                      P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                      Content-Type: text/plain; charset=UTF-8
                                                      Date: Mon, 30 Sep 2024 22:42:19 GMT
                                                      Server: Playlog
                                                      Cache-Control: private
                                                      X-XSS-Protection: 0
                                                      X-Frame-Options: SAMEORIGIN
                                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                      Accept-Ranges: none
                                                      Vary: Accept-Encoding
                                                      Expires: Mon, 30 Sep 2024 22:42:19 GMT
                                                      Connection: close
                                                      Transfer-Encoding: chunked
                                                      2024-09-30 22:42:19 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                      Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                      2024-09-30 22:42:19 UTC5INData Raw: 30 0d 0a 0d 0a
                                                      Data Ascii: 0


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      11192.168.2.849752172.217.18.144437796C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-09-30 22:42:26 UTC1294OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                      Host: play.google.com
                                                      Connection: keep-alive
                                                      Content-Length: 1215
                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                      sec-ch-ua-mobile: ?0
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                      sec-ch-ua-arch: "x86"
                                                      Content-Type: text/plain;charset=UTF-8
                                                      sec-ch-ua-full-version: "117.0.5938.132"
                                                      sec-ch-ua-platform-version: "10.0.0"
                                                      X-Goog-AuthUser: 0
                                                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                      sec-ch-ua-bitness: "64"
                                                      sec-ch-ua-model: ""
                                                      sec-ch-ua-wow64: ?0
                                                      sec-ch-ua-platform: "Windows"
                                                      Accept: */*
                                                      Origin: https://accounts.google.com
                                                      X-Client-Data: CIW2yQEIorbJAQipncoBCOj/ygEIkqHLAQiFoM0BCNy9zQEIucrNAQiK080BCMfUzQEIodbNAQio2M0BCPnA1BUYwcvMARi60s0BGMXYzQEY642lFw==
                                                      Sec-Fetch-Site: same-site
                                                      Sec-Fetch-Mode: cors
                                                      Sec-Fetch-Dest: empty
                                                      Referer: https://accounts.google.com/
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US,en;q=0.9
                                                      Cookie: NID=518=SG8s7aBJUmpZqQuMyGfLQnF_9LWHDgxPELtm3HMb8MMWO6HTTinAQDmuiHsz3SAhf8hd9RzXNlE5d4RMmslKT-E95FYfVj2ngjDxM4418yJLEigHb9d_CQgeTFh98kves80t01pArN7UaNMRxw6mg90_LTgdbT2Wf09CBiRlROmoubYwvg
                                                      2024-09-30 22:42:26 UTC1215OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 34 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 35 35 38 2c 5b 5b 22 31 37 32 37 37 33 36 31 33 34 30 30 30 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c
                                                      Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,null,null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[4,0,0,0,0]]],558,[["1727736134000",null,null,null,
                                                      2024-09-30 22:42:26 UTC940INHTTP/1.1 200 OK
                                                      Access-Control-Allow-Origin: https://accounts.google.com
                                                      Cross-Origin-Resource-Policy: cross-origin
                                                      Access-Control-Allow-Credentials: true
                                                      Access-Control-Allow-Headers: X-Playlog-Web
                                                      Set-Cookie: NID=518=vJ8Msc4l_xcECxQFUzLdPxI95LPDF-Xzqi7dvgRZ3B2t_Vgz3r-HUv6MhtVVGh9waD_rs74w5796SQsHIVzXSJJq3n6jFTMk0r6giO7cPYh--O2SvJ40_QvybxadwtXSYiZPLhNqr732AfTzaVVTqSrcl5UBCcbYlMxU_tMz1EJJ6XKCJtgE6rQYeQ; expires=Tue, 01-Apr-2025 22:42:26 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                      P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                      Content-Type: text/plain; charset=UTF-8
                                                      Date: Mon, 30 Sep 2024 22:42:26 GMT
                                                      Server: Playlog
                                                      Cache-Control: private
                                                      X-XSS-Protection: 0
                                                      X-Frame-Options: SAMEORIGIN
                                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                      Accept-Ranges: none
                                                      Vary: Accept-Encoding
                                                      Expires: Mon, 30 Sep 2024 22:42:26 GMT
                                                      Connection: close
                                                      Transfer-Encoding: chunked
                                                      2024-09-30 22:42:26 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                      Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                      2024-09-30 22:42:26 UTC5INData Raw: 30 0d 0a 0d 0a
                                                      Data Ascii: 0


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      12192.168.2.849753172.217.18.144437796C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-09-30 22:42:48 UTC1325OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                      Host: play.google.com
                                                      Connection: keep-alive
                                                      Content-Length: 1531
                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                      sec-ch-ua-mobile: ?0
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                      sec-ch-ua-arch: "x86"
                                                      Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                      sec-ch-ua-full-version: "117.0.5938.132"
                                                      sec-ch-ua-platform-version: "10.0.0"
                                                      X-Goog-AuthUser: 0
                                                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                      sec-ch-ua-bitness: "64"
                                                      sec-ch-ua-model: ""
                                                      sec-ch-ua-wow64: ?0
                                                      sec-ch-ua-platform: "Windows"
                                                      Accept: */*
                                                      Origin: https://accounts.google.com
                                                      X-Client-Data: CIW2yQEIorbJAQipncoBCOj/ygEIkqHLAQiFoM0BCNy9zQEIucrNAQiK080BCMfUzQEIodbNAQio2M0BCPnA1BUYwcvMARi60s0BGMXYzQEY642lFw==
                                                      Sec-Fetch-Site: same-site
                                                      Sec-Fetch-Mode: cors
                                                      Sec-Fetch-Dest: empty
                                                      Referer: https://accounts.google.com/
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US,en;q=0.9
                                                      Cookie: NID=518=vJ8Msc4l_xcECxQFUzLdPxI95LPDF-Xzqi7dvgRZ3B2t_Vgz3r-HUv6MhtVVGh9waD_rs74w5796SQsHIVzXSJJq3n6jFTMk0r6giO7cPYh--O2SvJ40_QvybxadwtXSYiZPLhNqr732AfTzaVVTqSrcl5UBCcbYlMxU_tMz1EJJ6XKCJtgE6rQYeQ
                                                      2024-09-30 22:42:48 UTC1531OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 37 33 36 31 36 37 38 30 37 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                      Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727736167807",null,null,null
                                                      2024-09-30 22:42:49 UTC523INHTTP/1.1 200 OK
                                                      Access-Control-Allow-Origin: https://accounts.google.com
                                                      Cross-Origin-Resource-Policy: cross-origin
                                                      Access-Control-Allow-Credentials: true
                                                      Access-Control-Allow-Headers: X-Playlog-Web
                                                      Content-Type: text/plain; charset=UTF-8
                                                      Date: Mon, 30 Sep 2024 22:42:48 GMT
                                                      Server: Playlog
                                                      Cache-Control: private
                                                      X-XSS-Protection: 0
                                                      X-Frame-Options: SAMEORIGIN
                                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                      Accept-Ranges: none
                                                      Vary: Accept-Encoding
                                                      Connection: close
                                                      Transfer-Encoding: chunked
                                                      2024-09-30 22:42:49 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                      Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                      2024-09-30 22:42:49 UTC5INData Raw: 30 0d 0a 0d 0a
                                                      Data Ascii: 0


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      13192.168.2.849754172.217.18.144437796C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-09-30 22:42:49 UTC1285OUTPOST /log?hasfast=true&authuser=0&format=json HTTP/1.1
                                                      Host: play.google.com
                                                      Connection: keep-alive
                                                      Content-Length: 1042
                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                      sec-ch-ua-mobile: ?0
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                      sec-ch-ua-arch: "x86"
                                                      sec-ch-ua-full-version: "117.0.5938.132"
                                                      Content-Type: text/plain;charset=UTF-8
                                                      sec-ch-ua-platform-version: "10.0.0"
                                                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                      sec-ch-ua-bitness: "64"
                                                      sec-ch-ua-model: ""
                                                      sec-ch-ua-wow64: ?0
                                                      sec-ch-ua-platform: "Windows"
                                                      Accept: */*
                                                      Origin: https://accounts.google.com
                                                      X-Client-Data: CIW2yQEIorbJAQipncoBCOj/ygEIkqHLAQiFoM0BCNy9zQEIucrNAQiK080BCMfUzQEIodbNAQio2M0BCPnA1BUYwcvMARi60s0BGMXYzQEY642lFw==
                                                      Sec-Fetch-Site: same-site
                                                      Sec-Fetch-Mode: no-cors
                                                      Sec-Fetch-Dest: empty
                                                      Referer: https://accounts.google.com/
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US,en;q=0.9
                                                      Cookie: NID=518=vJ8Msc4l_xcECxQFUzLdPxI95LPDF-Xzqi7dvgRZ3B2t_Vgz3r-HUv6MhtVVGh9waD_rs74w5796SQsHIVzXSJJq3n6jFTMk0r6giO7cPYh--O2SvJ40_QvybxadwtXSYiZPLhNqr732AfTzaVVTqSrcl5UBCcbYlMxU_tMz1EJJ6XKCJtgE6rQYeQ
                                                      2024-09-30 22:42:49 UTC1042OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 62 6f 71 5f 69 64 65 6e 74 69 74 79 66 72 6f 6e 74 65 6e 64 61 75 74 68 75 69 73 65 72 76 65 72 5f 32 30 32 34 30 39 32 34 2e 30 32 5f 70 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 33 2c 30 2c 30
                                                      Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"boq_identityfrontendauthuiserver_20240924.02_p0",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[3,0,0
                                                      2024-09-30 22:42:49 UTC523INHTTP/1.1 200 OK
                                                      Access-Control-Allow-Origin: https://accounts.google.com
                                                      Cross-Origin-Resource-Policy: cross-origin
                                                      Access-Control-Allow-Credentials: true
                                                      Access-Control-Allow-Headers: X-Playlog-Web
                                                      Content-Type: text/plain; charset=UTF-8
                                                      Date: Mon, 30 Sep 2024 22:42:49 GMT
                                                      Server: Playlog
                                                      Cache-Control: private
                                                      X-XSS-Protection: 0
                                                      X-Frame-Options: SAMEORIGIN
                                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                      Accept-Ranges: none
                                                      Vary: Accept-Encoding
                                                      Connection: close
                                                      Transfer-Encoding: chunked
                                                      2024-09-30 22:42:49 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                      Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                      2024-09-30 22:42:49 UTC5INData Raw: 30 0d 0a 0d 0a
                                                      Data Ascii: 0


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      14192.168.2.849755172.217.18.144437796C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-09-30 22:42:50 UTC1325OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                      Host: play.google.com
                                                      Connection: keep-alive
                                                      Content-Length: 1269
                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                      sec-ch-ua-mobile: ?0
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                      sec-ch-ua-arch: "x86"
                                                      Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                      sec-ch-ua-full-version: "117.0.5938.132"
                                                      sec-ch-ua-platform-version: "10.0.0"
                                                      X-Goog-AuthUser: 0
                                                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                      sec-ch-ua-bitness: "64"
                                                      sec-ch-ua-model: ""
                                                      sec-ch-ua-wow64: ?0
                                                      sec-ch-ua-platform: "Windows"
                                                      Accept: */*
                                                      Origin: https://accounts.google.com
                                                      X-Client-Data: CIW2yQEIorbJAQipncoBCOj/ygEIkqHLAQiFoM0BCNy9zQEIucrNAQiK080BCMfUzQEIodbNAQio2M0BCPnA1BUYwcvMARi60s0BGMXYzQEY642lFw==
                                                      Sec-Fetch-Site: same-site
                                                      Sec-Fetch-Mode: cors
                                                      Sec-Fetch-Dest: empty
                                                      Referer: https://accounts.google.com/
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US,en;q=0.9
                                                      Cookie: NID=518=vJ8Msc4l_xcECxQFUzLdPxI95LPDF-Xzqi7dvgRZ3B2t_Vgz3r-HUv6MhtVVGh9waD_rs74w5796SQsHIVzXSJJq3n6jFTMk0r6giO7cPYh--O2SvJ40_QvybxadwtXSYiZPLhNqr732AfTzaVVTqSrcl5UBCcbYlMxU_tMz1EJJ6XKCJtgE6rQYeQ
                                                      2024-09-30 22:42:50 UTC1269OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 37 33 36 31 36 38 38 37 36 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                      Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727736168876",null,null,null
                                                      2024-09-30 22:42:50 UTC523INHTTP/1.1 200 OK
                                                      Access-Control-Allow-Origin: https://accounts.google.com
                                                      Cross-Origin-Resource-Policy: cross-origin
                                                      Access-Control-Allow-Credentials: true
                                                      Access-Control-Allow-Headers: X-Playlog-Web
                                                      Content-Type: text/plain; charset=UTF-8
                                                      Date: Mon, 30 Sep 2024 22:42:50 GMT
                                                      Server: Playlog
                                                      Cache-Control: private
                                                      X-XSS-Protection: 0
                                                      X-Frame-Options: SAMEORIGIN
                                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                      Accept-Ranges: none
                                                      Vary: Accept-Encoding
                                                      Connection: close
                                                      Transfer-Encoding: chunked
                                                      2024-09-30 22:42:50 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                      Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                      2024-09-30 22:42:50 UTC5INData Raw: 30 0d 0a 0d 0a
                                                      Data Ascii: 0


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      15192.168.2.84975613.85.23.86443
                                                      TimestampBytes transferredDirectionData
                                                      2024-09-30 22:42:55 UTC306OUTGET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=1hFSlGOzLX4mB+T&MD=hayC8FLE HTTP/1.1
                                                      Connection: Keep-Alive
                                                      Accept: */*
                                                      User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                                      Host: slscr.update.microsoft.com
                                                      2024-09-30 22:42:55 UTC560INHTTP/1.1 200 OK
                                                      Cache-Control: no-cache
                                                      Pragma: no-cache
                                                      Content-Type: application/octet-stream
                                                      Expires: -1
                                                      Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                                      ETag: "vic+p1MiJJ+/WMnK08jaWnCBGDfvkGRzPk9f8ZadQHg=_1440"
                                                      MS-CorrelationId: ebd8dd63-259d-4c0e-a0f8-d430449b8060
                                                      MS-RequestId: 0cf2ab6c-43f3-4c4d-803c-f9c1ff11c7fb
                                                      MS-CV: uz7L1Na59UygLaJ9.0
                                                      X-Microsoft-SLSClientCache: 1440
                                                      Content-Disposition: attachment; filename=environment.cab
                                                      X-Content-Type-Options: nosniff
                                                      Date: Mon, 30 Sep 2024 22:42:55 GMT
                                                      Connection: close
                                                      Content-Length: 30005
                                                      2024-09-30 22:42:55 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 8d 2b 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 5b 49 00 00 14 00 00 00 00 00 10 00 8d 2b 00 00 a8 49 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 72 4d 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 fe f6 51 be 21 2b 72 4d 43 4b ed 7c 05 58 54 eb da f6 14 43 49 37 0a 02 d2 b9 86 0e 41 52 a4 1b 24 a5 bb 43 24 44 18 94 90 92 52 41 3a 05 09 95 ee 54 b0 00 91 2e e9 12 10 04 11 c9 6f 10 b7 a2 67 9f bd cf 3e ff b7 ff b3 bf 73 ed e1 9a 99 f5 c6 7a d7 bb de f5 3e cf fd 3c f7 dc 17 4a 1a 52 e7 41 a8 97 1e 14 f4 e5 25 7d f4 05 82 82 c1 20 30 08 06 ba c3 05 02 11 7f a9 c1 ff d2 87 5c 1e f4 ed 65 8e 7a 1f f6 0a 40 03 1d 7b f9 83 2c 1c 2f db b8 3a 39 3a 58 38 ba 73 5e
                                                      Data Ascii: MSCF+D[I+IdrMenvironment.cabQ!+rMCK|XTCI7AR$C$DRA:T.og>sz><JRA%} 0\ez@{,/:9:X8s^
                                                      2024-09-30 22:42:55 UTC14181INData Raw: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 26 30 24 06 03 55 04 03 13 1d 4d 69 63 72 6f 73 6f 66 74 20 54 69 6d 65 2d 53 74 61 6d 70 20 50 43 41 20 32 30 31 30 30 1e 17 0d 32 33 31 30 31 32 31 39 30 37 32 35 5a 17 0d 32 35 30 31 31 30 31 39 30 37 32 35 5a 30 81 d2 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 2d 30 2b 06 03 55 04 0b 13 24 4d 69 63 72 6f
                                                      Data Ascii: UUS10UWashington10URedmond10UMicrosoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100231012190725Z250110190725Z010UUS10UWashington10URedmond10UMicrosoft Corporation1-0+U$Micro


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      16192.168.2.849760172.217.16.2064437796C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-09-30 22:43:19 UTC1325OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                      Host: play.google.com
                                                      Connection: keep-alive
                                                      Content-Length: 1309
                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                      sec-ch-ua-mobile: ?0
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                      sec-ch-ua-arch: "x86"
                                                      Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                      sec-ch-ua-full-version: "117.0.5938.132"
                                                      sec-ch-ua-platform-version: "10.0.0"
                                                      X-Goog-AuthUser: 0
                                                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                      sec-ch-ua-bitness: "64"
                                                      sec-ch-ua-model: ""
                                                      sec-ch-ua-wow64: ?0
                                                      sec-ch-ua-platform: "Windows"
                                                      Accept: */*
                                                      Origin: https://accounts.google.com
                                                      X-Client-Data: CIW2yQEIorbJAQipncoBCOj/ygEIkqHLAQiFoM0BCNy9zQEIucrNAQiK080BCMfUzQEIodbNAQio2M0BCPnA1BUYwcvMARi60s0BGMXYzQEY642lFw==
                                                      Sec-Fetch-Site: same-site
                                                      Sec-Fetch-Mode: cors
                                                      Sec-Fetch-Dest: empty
                                                      Referer: https://accounts.google.com/
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US,en;q=0.9
                                                      Cookie: NID=518=vJ8Msc4l_xcECxQFUzLdPxI95LPDF-Xzqi7dvgRZ3B2t_Vgz3r-HUv6MhtVVGh9waD_rs74w5796SQsHIVzXSJJq3n6jFTMk0r6giO7cPYh--O2SvJ40_QvybxadwtXSYiZPLhNqr732AfTzaVVTqSrcl5UBCcbYlMxU_tMz1EJJ6XKCJtgE6rQYeQ
                                                      2024-09-30 22:43:19 UTC1309OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 37 33 36 31 39 37 38 39 35 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                      Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727736197895",null,null,null
                                                      2024-09-30 22:43:19 UTC523INHTTP/1.1 200 OK
                                                      Access-Control-Allow-Origin: https://accounts.google.com
                                                      Cross-Origin-Resource-Policy: cross-origin
                                                      Access-Control-Allow-Credentials: true
                                                      Access-Control-Allow-Headers: X-Playlog-Web
                                                      Content-Type: text/plain; charset=UTF-8
                                                      Date: Mon, 30 Sep 2024 22:43:19 GMT
                                                      Server: Playlog
                                                      Cache-Control: private
                                                      X-XSS-Protection: 0
                                                      X-Frame-Options: SAMEORIGIN
                                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                      Accept-Ranges: none
                                                      Vary: Accept-Encoding
                                                      Connection: close
                                                      Transfer-Encoding: chunked
                                                      2024-09-30 22:43:19 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                      Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                      2024-09-30 22:43:19 UTC5INData Raw: 30 0d 0a 0d 0a
                                                      Data Ascii: 0


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      17192.168.2.849761172.217.16.2064437796C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-09-30 22:43:20 UTC1325OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                      Host: play.google.com
                                                      Connection: keep-alive
                                                      Content-Length: 1231
                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                      sec-ch-ua-mobile: ?0
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                      sec-ch-ua-arch: "x86"
                                                      Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                      sec-ch-ua-full-version: "117.0.5938.132"
                                                      sec-ch-ua-platform-version: "10.0.0"
                                                      X-Goog-AuthUser: 0
                                                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                      sec-ch-ua-bitness: "64"
                                                      sec-ch-ua-model: ""
                                                      sec-ch-ua-wow64: ?0
                                                      sec-ch-ua-platform: "Windows"
                                                      Accept: */*
                                                      Origin: https://accounts.google.com
                                                      X-Client-Data: CIW2yQEIorbJAQipncoBCOj/ygEIkqHLAQiFoM0BCNy9zQEIucrNAQiK080BCMfUzQEIodbNAQio2M0BCPnA1BUYwcvMARi60s0BGMXYzQEY642lFw==
                                                      Sec-Fetch-Site: same-site
                                                      Sec-Fetch-Mode: cors
                                                      Sec-Fetch-Dest: empty
                                                      Referer: https://accounts.google.com/
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US,en;q=0.9
                                                      Cookie: NID=518=vJ8Msc4l_xcECxQFUzLdPxI95LPDF-Xzqi7dvgRZ3B2t_Vgz3r-HUv6MhtVVGh9waD_rs74w5796SQsHIVzXSJJq3n6jFTMk0r6giO7cPYh--O2SvJ40_QvybxadwtXSYiZPLhNqr732AfTzaVVTqSrcl5UBCcbYlMxU_tMz1EJJ6XKCJtgE6rQYeQ
                                                      2024-09-30 22:43:20 UTC1231OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 37 33 36 31 39 39 33 31 39 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                      Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727736199319",null,null,null
                                                      2024-09-30 22:43:21 UTC523INHTTP/1.1 200 OK
                                                      Access-Control-Allow-Origin: https://accounts.google.com
                                                      Cross-Origin-Resource-Policy: cross-origin
                                                      Access-Control-Allow-Credentials: true
                                                      Access-Control-Allow-Headers: X-Playlog-Web
                                                      Content-Type: text/plain; charset=UTF-8
                                                      Date: Mon, 30 Sep 2024 22:43:20 GMT
                                                      Server: Playlog
                                                      Cache-Control: private
                                                      X-XSS-Protection: 0
                                                      X-Frame-Options: SAMEORIGIN
                                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                      Accept-Ranges: none
                                                      Vary: Accept-Encoding
                                                      Connection: close
                                                      Transfer-Encoding: chunked
                                                      2024-09-30 22:43:21 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                      Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                      2024-09-30 22:43:21 UTC5INData Raw: 30 0d 0a 0d 0a
                                                      Data Ascii: 0


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      18192.168.2.849763172.217.16.2064437796C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-09-30 22:43:49 UTC1325OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                      Host: play.google.com
                                                      Connection: keep-alive
                                                      Content-Length: 1379
                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                      sec-ch-ua-mobile: ?0
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                      sec-ch-ua-arch: "x86"
                                                      Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                      sec-ch-ua-full-version: "117.0.5938.132"
                                                      sec-ch-ua-platform-version: "10.0.0"
                                                      X-Goog-AuthUser: 0
                                                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                      sec-ch-ua-bitness: "64"
                                                      sec-ch-ua-model: ""
                                                      sec-ch-ua-wow64: ?0
                                                      sec-ch-ua-platform: "Windows"
                                                      Accept: */*
                                                      Origin: https://accounts.google.com
                                                      X-Client-Data: CIW2yQEIorbJAQipncoBCOj/ygEIkqHLAQiFoM0BCNy9zQEIucrNAQiK080BCMfUzQEIodbNAQio2M0BCPnA1BUYwcvMARi60s0BGMXYzQEY642lFw==
                                                      Sec-Fetch-Site: same-site
                                                      Sec-Fetch-Mode: cors
                                                      Sec-Fetch-Dest: empty
                                                      Referer: https://accounts.google.com/
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US,en;q=0.9
                                                      Cookie: NID=518=vJ8Msc4l_xcECxQFUzLdPxI95LPDF-Xzqi7dvgRZ3B2t_Vgz3r-HUv6MhtVVGh9waD_rs74w5796SQsHIVzXSJJq3n6jFTMk0r6giO7cPYh--O2SvJ40_QvybxadwtXSYiZPLhNqr732AfTzaVVTqSrcl5UBCcbYlMxU_tMz1EJJ6XKCJtgE6rQYeQ
                                                      2024-09-30 22:43:49 UTC1379OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 37 33 36 32 32 38 31 37 39 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                      Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727736228179",null,null,null
                                                      2024-09-30 22:43:49 UTC523INHTTP/1.1 200 OK
                                                      Access-Control-Allow-Origin: https://accounts.google.com
                                                      Cross-Origin-Resource-Policy: cross-origin
                                                      Access-Control-Allow-Credentials: true
                                                      Access-Control-Allow-Headers: X-Playlog-Web
                                                      Content-Type: text/plain; charset=UTF-8
                                                      Date: Mon, 30 Sep 2024 22:43:49 GMT
                                                      Server: Playlog
                                                      Cache-Control: private
                                                      X-XSS-Protection: 0
                                                      X-Frame-Options: SAMEORIGIN
                                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                      Accept-Ranges: none
                                                      Vary: Accept-Encoding
                                                      Connection: close
                                                      Transfer-Encoding: chunked
                                                      2024-09-30 22:43:49 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                      Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                      2024-09-30 22:43:49 UTC5INData Raw: 30 0d 0a 0d 0a
                                                      Data Ascii: 0


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      19192.168.2.849764172.217.16.2064437796C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-09-30 22:43:53 UTC1325OUTPOST /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                                                      Host: play.google.com
                                                      Connection: keep-alive
                                                      Content-Length: 1453
                                                      sec-ch-ua: "Google Chrome";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                                                      sec-ch-ua-mobile: ?0
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                      sec-ch-ua-arch: "x86"
                                                      Content-Type: application/x-www-form-urlencoded;charset=UTF-8
                                                      sec-ch-ua-full-version: "117.0.5938.132"
                                                      sec-ch-ua-platform-version: "10.0.0"
                                                      X-Goog-AuthUser: 0
                                                      sec-ch-ua-full-version-list: "Google Chrome";v="117.0.5938.132", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                                                      sec-ch-ua-bitness: "64"
                                                      sec-ch-ua-model: ""
                                                      sec-ch-ua-wow64: ?0
                                                      sec-ch-ua-platform: "Windows"
                                                      Accept: */*
                                                      Origin: https://accounts.google.com
                                                      X-Client-Data: CIW2yQEIorbJAQipncoBCOj/ygEIkqHLAQiFoM0BCNy9zQEIucrNAQiK080BCMfUzQEIodbNAQio2M0BCPnA1BUYwcvMARi60s0BGMXYzQEY642lFw==
                                                      Sec-Fetch-Site: same-site
                                                      Sec-Fetch-Mode: cors
                                                      Sec-Fetch-Dest: empty
                                                      Referer: https://accounts.google.com/
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US,en;q=0.9
                                                      Cookie: NID=518=vJ8Msc4l_xcECxQFUzLdPxI95LPDF-Xzqi7dvgRZ3B2t_Vgz3r-HUv6MhtVVGh9waD_rs74w5796SQsHIVzXSJJq3n6jFTMk0r6giO7cPYh--O2SvJ40_QvybxadwtXSYiZPLhNqr732AfTzaVVTqSrcl5UBCcbYlMxU_tMz1EJJ6XKCJtgE6rQYeQ
                                                      2024-09-30 22:43:53 UTC1453OUTData Raw: 5b 5b 31 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 5b 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 22 65 6e 22 2c 6e 75 6c 6c 2c 22 33 30 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 47 6f 6f 67 6c 65 20 43 68 72 6f 6d 65 22 2c 22 31 31 37 22 5d 2c 5b 22 4e 6f 74 3b 41 3d 42 72 61 6e 64 22 2c 22 38 22 5d 2c 5b 22 43 68 72 6f 6d 69 75 6d 22 2c 22 31 31 37 22 5d 5d 2c 30 2c 22 57 69 6e 64 6f 77 73 22 2c 22 31 30 2e 30 2e 30 22 2c 22 78 38 36 22 2c 22 22 2c 22 31 31 37 2e 30 2e 35 39 33 38 2e 31 33 32 22 5d 2c 5b 31 2c 30 2c 30 2c 30 2c 30 5d 5d 5d 2c 31 38 32 38 2c 5b 5b 22 31 37 32 37 37 33 36 32 33 32 30 30 35 22 2c 6e 75 6c 6c 2c 6e 75 6c 6c 2c 6e 75 6c 6c
                                                      Data Ascii: [[1,null,null,null,null,null,null,null,null,null,[null,null,null,null,"en",null,"30",null,[[["Google Chrome","117"],["Not;A=Brand","8"],["Chromium","117"]],0,"Windows","10.0.0","x86","","117.0.5938.132"],[1,0,0,0,0]]],1828,[["1727736232005",null,null,null
                                                      2024-09-30 22:43:53 UTC523INHTTP/1.1 200 OK
                                                      Access-Control-Allow-Origin: https://accounts.google.com
                                                      Cross-Origin-Resource-Policy: cross-origin
                                                      Access-Control-Allow-Credentials: true
                                                      Access-Control-Allow-Headers: X-Playlog-Web
                                                      Content-Type: text/plain; charset=UTF-8
                                                      Date: Mon, 30 Sep 2024 22:43:53 GMT
                                                      Server: Playlog
                                                      Cache-Control: private
                                                      X-XSS-Protection: 0
                                                      X-Frame-Options: SAMEORIGIN
                                                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                      Accept-Ranges: none
                                                      Vary: Accept-Encoding
                                                      Connection: close
                                                      Transfer-Encoding: chunked
                                                      2024-09-30 22:43:53 UTC137INData Raw: 38 33 0d 0a 5b 22 2d 31 22 2c 6e 75 6c 6c 2c 5b 5b 5b 22 41 4e 44 52 4f 49 44 5f 42 41 43 4b 55 50 22 2c 30 5d 2c 5b 22 42 41 54 54 45 52 59 5f 53 54 41 54 53 22 2c 30 5d 2c 5b 22 53 4d 41 52 54 5f 53 45 54 55 50 22 2c 30 5d 2c 5b 22 54 52 4f 4e 22 2c 30 5d 5d 2c 2d 33 33 33 34 37 33 37 35 39 34 30 32 34 39 37 31 32 32 35 5d 2c 5b 5d 2c 7b 22 31 37 35 32 33 37 33 37 35 22 3a 5b 31 30 30 30 30 5d 7d 5d 0d 0a
                                                      Data Ascii: 83["-1",null,[[["ANDROID_BACKUP",0],["BATTERY_STATS",0],["SMART_SETUP",0],["TRON",0]],-3334737594024971225],[],{"175237375":[10000]}]
                                                      2024-09-30 22:43:53 UTC5INData Raw: 30 0d 0a 0d 0a
                                                      Data Ascii: 0


                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:18:41:58
                                                      Start date:30/09/2024
                                                      Path:C:\Users\user\Desktop\file.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\file.exe"
                                                      Imagebase:0xdd0000
                                                      File size:917'504 bytes
                                                      MD5 hash:93847E39E6BEB5FEF14983E436A58DBD
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:1
                                                      Start time:18:41:59
                                                      Start date:30/09/2024
                                                      Path:C:\Windows\SysWOW64\taskkill.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:taskkill /F /IM chrome.exe /T
                                                      Imagebase:0x610000
                                                      File size:74'240 bytes
                                                      MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:moderate
                                                      Has exited:true

                                                      Target ID:2
                                                      Start time:18:41:59
                                                      Start date:30/09/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6ee680000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:4
                                                      Start time:18:42:05
                                                      Start date:30/09/2024
                                                      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --app="https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --start-fullscreen --no-first-run --disable-session-crashed-bubble --disable-features=CrashRecovery
                                                      Imagebase:0x7ff678760000
                                                      File size:3'242'272 bytes
                                                      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:false

                                                      Target ID:6
                                                      Start time:18:42:05
                                                      Start date:30/09/2024
                                                      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2080 --field-trial-handle=1960,i,3461561876009071434,16395330310159126953,262144 --disable-features=CrashRecovery /prefetch:8
                                                      Imagebase:0x7ff678760000
                                                      File size:3'242'272 bytes
                                                      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:false

                                                      Target ID:9
                                                      Start time:18:42:17
                                                      Start date:30/09/2024
                                                      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5540 --field-trial-handle=1960,i,3461561876009071434,16395330310159126953,262144 --disable-features=CrashRecovery /prefetch:8
                                                      Imagebase:0x7ff678760000
                                                      File size:3'242'272 bytes
                                                      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:false

                                                      Target ID:10
                                                      Start time:18:42:17
                                                      Start date:30/09/2024
                                                      Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 --field-trial-handle=1960,i,3461561876009071434,16395330310159126953,262144 --disable-features=CrashRecovery /prefetch:8
                                                      Imagebase:0x7ff678760000
                                                      File size:3'242'272 bytes
                                                      MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:1.9%
                                                        Dynamic/Decrypted Code Coverage:0%
                                                        Signature Coverage:6.7%
                                                        Total number of Nodes:1455
                                                        Total number of Limit Nodes:33
                                                        execution_graph 94663 ddf7bf 94664 ddfcb6 94663->94664 94665 ddf7d3 94663->94665 94764 ddaceb 23 API calls messages 94664->94764 94667 ddfcc2 94665->94667 94698 defddb 94665->94698 94765 ddaceb 23 API calls messages 94667->94765 94670 ddf7e5 94670->94667 94671 ddf83e 94670->94671 94672 ddfd3d 94670->94672 94689 dded9d messages 94671->94689 94708 de1310 94671->94708 94766 e41155 22 API calls 94672->94766 94675 defddb 22 API calls 94696 ddec76 messages 94675->94696 94676 ddfef7 94676->94689 94768 dda8c7 22 API calls __fread_nolock 94676->94768 94679 e24600 94679->94689 94767 dda8c7 22 API calls __fread_nolock 94679->94767 94680 e24b0b 94770 e4359c 82 API calls __wsopen_s 94680->94770 94686 dda8c7 22 API calls 94686->94696 94687 df0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 94687->94696 94688 ddfbe3 94688->94689 94691 e24bdc 94688->94691 94697 ddf3ae messages 94688->94697 94690 dda961 22 API calls 94690->94696 94771 e4359c 82 API calls __wsopen_s 94691->94771 94693 e24beb 94772 e4359c 82 API calls __wsopen_s 94693->94772 94694 df01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 94694->94696 94695 df00a3 29 API calls pre_c_initialization 94695->94696 94696->94675 94696->94676 94696->94679 94696->94680 94696->94686 94696->94687 94696->94688 94696->94689 94696->94690 94696->94693 94696->94694 94696->94695 94696->94697 94762 de01e0 343 API calls 2 library calls 94696->94762 94763 de06a0 41 API calls messages 94696->94763 94697->94689 94769 e4359c 82 API calls __wsopen_s 94697->94769 94701 defde0 94698->94701 94700 defdfa 94700->94670 94701->94700 94704 defdfc 94701->94704 94773 dfea0c 94701->94773 94780 df4ead 7 API calls 2 library calls 94701->94780 94703 df066d 94782 df32a4 RaiseException 94703->94782 94704->94703 94781 df32a4 RaiseException 94704->94781 94706 df068a 94706->94670 94709 de1376 94708->94709 94710 de17b0 94708->94710 94712 e26331 94709->94712 94713 de1390 94709->94713 94845 df0242 5 API calls __Init_thread_wait 94710->94845 94856 e5709c 343 API calls 94712->94856 94785 de1940 94713->94785 94715 de17ba 94718 de17fb 94715->94718 94846 dd9cb3 94715->94846 94717 e2633d 94717->94696 94724 e26346 94718->94724 94725 de182c 94718->94725 94721 de1940 9 API calls 94722 de13b6 94721->94722 94722->94718 94723 de13ec 94722->94723 94723->94724 94748 de1408 __fread_nolock 94723->94748 94857 e4359c 82 API calls __wsopen_s 94724->94857 94853 ddaceb 23 API calls messages 94725->94853 94728 de1839 94854 ded217 343 API calls 94728->94854 94729 de17d4 94852 df01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 94729->94852 94732 e2636e 94858 e4359c 82 API calls __wsopen_s 94732->94858 94733 de152f 94735 de153c 94733->94735 94736 e263d1 94733->94736 94738 de1940 9 API calls 94735->94738 94860 e55745 54 API calls _wcslen 94736->94860 94740 de1549 94738->94740 94739 defddb 22 API calls 94739->94748 94743 e264fa 94740->94743 94744 de1940 9 API calls 94740->94744 94741 de1872 94855 defaeb 23 API calls 94741->94855 94752 e26369 94743->94752 94862 e4359c 82 API calls __wsopen_s 94743->94862 94750 de1563 94744->94750 94748->94728 94748->94732 94748->94733 94748->94739 94749 e263b2 94748->94749 94748->94752 94810 defe0b 94748->94810 94820 ddec40 94748->94820 94859 e4359c 82 API calls __wsopen_s 94749->94859 94750->94743 94755 de15c7 messages 94750->94755 94861 dda8c7 22 API calls __fread_nolock 94750->94861 94752->94696 94754 de1940 9 API calls 94754->94755 94755->94741 94755->94743 94755->94752 94755->94754 94758 de167b messages 94755->94758 94795 e5ab67 94755->94795 94798 e45c5a 94755->94798 94803 def645 94755->94803 94756 de171d 94756->94696 94758->94756 94844 dece17 22 API calls messages 94758->94844 94762->94696 94763->94696 94764->94667 94765->94672 94766->94689 94767->94689 94768->94689 94769->94689 94770->94689 94771->94693 94772->94689 94777 e03820 __dosmaperr 94773->94777 94774 e0385e 94784 dff2d9 20 API calls __dosmaperr 94774->94784 94775 e03849 RtlAllocateHeap 94775->94777 94778 e0385c 94775->94778 94777->94774 94777->94775 94783 df4ead 7 API calls 2 library calls 94777->94783 94778->94701 94780->94701 94781->94703 94782->94706 94783->94777 94784->94778 94786 de195d 94785->94786 94787 de1981 94785->94787 94794 de13a0 94786->94794 94865 df0242 5 API calls __Init_thread_wait 94786->94865 94863 df0242 5 API calls __Init_thread_wait 94787->94863 94790 de198b 94790->94786 94864 df01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 94790->94864 94791 de8727 94791->94794 94866 df01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 94791->94866 94794->94721 94867 e5aff9 94795->94867 94799 dd7510 53 API calls 94798->94799 94800 e45c6d 94799->94800 95007 e3dbbe lstrlenW 94800->95007 94802 e45c77 94802->94755 94804 ddb567 39 API calls 94803->94804 94805 def659 94804->94805 94806 e2f2dc Sleep 94805->94806 94807 def661 timeGetTime 94805->94807 94808 ddb567 39 API calls 94807->94808 94809 def677 94808->94809 94809->94755 94813 defddb 94810->94813 94811 dfea0c ___std_exception_copy 21 API calls 94811->94813 94812 defdfa 94812->94748 94813->94811 94813->94812 94816 defdfc 94813->94816 95012 df4ead 7 API calls 2 library calls 94813->95012 94815 df066d 95014 df32a4 RaiseException 94815->95014 94816->94815 95013 df32a4 RaiseException 94816->95013 94818 df068a 94818->94748 94841 ddec76 messages 94820->94841 94821 df00a3 29 API calls pre_c_initialization 94821->94841 94822 ddfef7 94837 dded9d messages 94822->94837 95018 dda8c7 22 API calls __fread_nolock 94822->95018 94824 defddb 22 API calls 94824->94841 94826 e24600 94826->94837 95017 dda8c7 22 API calls __fread_nolock 94826->95017 94827 e24b0b 95020 e4359c 82 API calls __wsopen_s 94827->95020 94828 dda8c7 22 API calls 94828->94841 94834 df0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 94834->94841 94835 ddfbe3 94835->94837 94838 e24bdc 94835->94838 94843 ddf3ae messages 94835->94843 94836 dda961 22 API calls 94836->94841 94837->94748 95021 e4359c 82 API calls __wsopen_s 94838->95021 94840 e24beb 95022 e4359c 82 API calls __wsopen_s 94840->95022 94841->94821 94841->94822 94841->94824 94841->94826 94841->94827 94841->94828 94841->94834 94841->94835 94841->94836 94841->94837 94841->94840 94842 df01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 94841->94842 94841->94843 95015 de01e0 343 API calls 2 library calls 94841->95015 95016 de06a0 41 API calls messages 94841->95016 94842->94841 94843->94837 95019 e4359c 82 API calls __wsopen_s 94843->95019 94844->94758 94845->94715 94847 dd9cc2 _wcslen 94846->94847 94848 defe0b 22 API calls 94847->94848 94849 dd9cea __fread_nolock 94848->94849 94850 defddb 22 API calls 94849->94850 94851 dd9d00 94850->94851 94851->94729 94852->94718 94853->94728 94854->94741 94855->94741 94856->94717 94857->94752 94858->94752 94859->94752 94860->94750 94861->94755 94862->94752 94863->94790 94864->94786 94865->94791 94866->94794 94868 e5b01d ___scrt_fastfail 94867->94868 94869 e5b094 94868->94869 94870 e5b058 94868->94870 94873 ddb567 39 API calls 94869->94873 94877 e5b08b 94869->94877 94985 ddb567 94870->94985 94872 e5b0ed 94958 dd7510 94872->94958 94876 e5b0a5 94873->94876 94874 e5b063 94874->94877 94881 ddb567 39 API calls 94874->94881 94880 ddb567 39 API calls 94876->94880 94877->94872 94878 ddb567 39 API calls 94877->94878 94878->94872 94880->94877 94882 e5b078 94881->94882 94884 ddb567 39 API calls 94882->94884 94884->94877 94885 e5b115 94886 e5b11f 94885->94886 94887 e5b1d8 94885->94887 94889 dd7510 53 API calls 94886->94889 94888 e5b20a GetCurrentDirectoryW 94887->94888 94890 dd7510 53 API calls 94887->94890 94891 defe0b 22 API calls 94888->94891 94892 e5b130 94889->94892 94893 e5b1ef 94890->94893 94894 e5b22f GetCurrentDirectoryW 94891->94894 94895 dd7620 22 API calls 94892->94895 94896 dd7620 22 API calls 94893->94896 94897 e5b23c 94894->94897 94898 e5b13a 94895->94898 94899 e5b1f9 _wcslen 94896->94899 94901 e5b275 94897->94901 94990 dd9c6e 22 API calls 94897->94990 94900 dd7510 53 API calls 94898->94900 94899->94888 94899->94901 94902 e5b14b 94900->94902 94909 e5b287 94901->94909 94910 e5b28b 94901->94910 94904 dd7620 22 API calls 94902->94904 94906 e5b155 94904->94906 94905 e5b255 94991 dd9c6e 22 API calls 94905->94991 94908 dd7510 53 API calls 94906->94908 94912 e5b166 94908->94912 94914 e5b2f8 94909->94914 94915 e5b39a CreateProcessW 94909->94915 94993 e407c0 10 API calls 94910->94993 94911 e5b265 94992 dd9c6e 22 API calls 94911->94992 94917 dd7620 22 API calls 94912->94917 94996 e311c8 39 API calls 94914->94996 94957 e5b32f _wcslen 94915->94957 94920 e5b170 94917->94920 94918 e5b294 94994 e406e6 10 API calls 94918->94994 94923 e5b1a6 GetSystemDirectoryW 94920->94923 94927 dd7510 53 API calls 94920->94927 94922 e5b2fd 94925 e5b323 94922->94925 94926 e5b32a 94922->94926 94929 defe0b 22 API calls 94923->94929 94924 e5b2aa 94995 e405a7 8 API calls 94924->94995 94997 e31201 128 API calls 2 library calls 94925->94997 94998 e314ce 6 API calls 94926->94998 94932 e5b187 94927->94932 94930 e5b1cb GetSystemDirectoryW 94929->94930 94930->94897 94936 dd7620 22 API calls 94932->94936 94934 e5b2d0 94934->94909 94935 e5b328 94935->94957 94939 e5b191 _wcslen 94936->94939 94937 e5b3d6 GetLastError 94949 e5b41a 94937->94949 94938 e5b42f CloseHandle 94940 e5b43f 94938->94940 94950 e5b49a 94938->94950 94939->94897 94939->94923 94942 e5b446 CloseHandle 94940->94942 94943 e5b451 94940->94943 94942->94943 94944 e5b463 94943->94944 94945 e5b458 CloseHandle 94943->94945 94947 e5b475 94944->94947 94948 e5b46a CloseHandle 94944->94948 94945->94944 94946 e5b4a6 94946->94949 94999 e409d9 34 API calls 94947->94999 94948->94947 95001 e40175 6 API calls 94949->95001 94950->94946 94955 e5b4d2 CloseHandle 94950->94955 94953 e5ab79 94953->94755 94954 e5b486 95000 e5b536 25 API calls 94954->95000 94955->94949 94957->94937 94957->94938 94959 dd7525 94958->94959 94975 dd7522 94958->94975 94960 dd752d 94959->94960 94961 dd755b 94959->94961 95002 df51c6 26 API calls 94960->95002 94965 dd756d 94961->94965 94970 e1500f 94961->94970 94971 e150f6 94961->94971 94963 dd753d 94969 defddb 22 API calls 94963->94969 95003 defb21 51 API calls 94965->95003 94966 e1510e 94966->94966 94972 dd7547 94969->94972 94974 defe0b 22 API calls 94970->94974 94980 e15088 94970->94980 95005 df5183 26 API calls 94971->95005 94973 dd9cb3 22 API calls 94972->94973 94973->94975 94976 e15058 94974->94976 94981 dd7620 94975->94981 94977 defddb 22 API calls 94976->94977 94978 e1507f 94977->94978 94979 dd9cb3 22 API calls 94978->94979 94979->94980 95004 defb21 51 API calls 94980->95004 94982 dd762a _wcslen 94981->94982 94983 defe0b 22 API calls 94982->94983 94984 dd763f 94983->94984 94984->94885 94986 ddb578 94985->94986 94987 ddb57f 94985->94987 94986->94987 95006 df62d1 39 API calls _strftime 94986->95006 94987->94874 94989 ddb5c2 94989->94874 94990->94905 94991->94911 94992->94901 94993->94918 94994->94924 94995->94934 94996->94922 94997->94935 94998->94957 94999->94954 95000->94950 95001->94953 95002->94963 95003->94963 95004->94971 95005->94966 95006->94989 95008 e3dc06 95007->95008 95009 e3dbdc GetFileAttributesW 95007->95009 95008->94802 95009->95008 95010 e3dbe8 FindFirstFileW 95009->95010 95010->95008 95011 e3dbf9 FindClose 95010->95011 95011->95008 95012->94813 95013->94815 95014->94818 95015->94841 95016->94841 95017->94837 95018->94837 95019->94837 95020->94837 95021->94840 95022->94837 95023 e22a00 95039 ddd7b0 messages 95023->95039 95024 dddb11 PeekMessageW 95024->95039 95025 ddd807 GetInputState 95025->95024 95025->95039 95026 e21cbe TranslateAcceleratorW 95026->95039 95028 dddb8f PeekMessageW 95028->95039 95029 ddda04 timeGetTime 95029->95039 95030 dddb73 TranslateMessage DispatchMessageW 95030->95028 95031 dddbaf Sleep 95031->95039 95032 e22b74 Sleep 95045 e22a51 95032->95045 95035 e21dda timeGetTime 95127 dee300 23 API calls 95035->95127 95038 e22c0b GetExitCodeProcess 95040 e22c21 WaitForSingleObject 95038->95040 95041 e22c37 CloseHandle 95038->95041 95039->95024 95039->95025 95039->95026 95039->95028 95039->95029 95039->95030 95039->95031 95039->95032 95039->95035 95043 ddd9d5 95039->95043 95039->95045 95051 ddec40 343 API calls 95039->95051 95052 de1310 343 API calls 95039->95052 95055 dddd50 95039->95055 95062 ddbf40 95039->95062 95120 deedf6 95039->95120 95125 dddfd0 343 API calls 3 library calls 95039->95125 95126 dee551 timeGetTime 95039->95126 95128 e43a2a 23 API calls 95039->95128 95129 e4359c 82 API calls __wsopen_s 95039->95129 95040->95039 95040->95041 95041->95045 95042 e629bf GetForegroundWindow 95042->95045 95045->95038 95045->95039 95045->95042 95045->95043 95046 e22ca9 Sleep 95045->95046 95130 e55658 23 API calls 95045->95130 95131 e3e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 95045->95131 95132 dee551 timeGetTime 95045->95132 95133 e3d4dc 47 API calls 95045->95133 95046->95039 95051->95039 95052->95039 95056 dddd6f 95055->95056 95057 dddd83 95055->95057 95134 ddd260 95056->95134 95166 e4359c 82 API calls __wsopen_s 95057->95166 95059 dddd7a 95059->95039 95061 e22f75 95061->95061 95174 ddadf0 95062->95174 95064 ddbf9d 95065 e204b6 95064->95065 95066 ddbfa9 95064->95066 95193 e4359c 82 API calls __wsopen_s 95065->95193 95068 ddc01e 95066->95068 95069 e204c6 95066->95069 95179 ddac91 95068->95179 95194 e4359c 82 API calls __wsopen_s 95069->95194 95072 ddc7da 95076 defe0b 22 API calls 95072->95076 95086 ddc808 __fread_nolock 95076->95086 95078 e204f5 95082 e2055a 95078->95082 95195 ded217 343 API calls 95078->95195 95081 defddb 22 API calls 95105 ddc039 __fread_nolock messages 95081->95105 95119 ddc603 95082->95119 95196 e4359c 82 API calls __wsopen_s 95082->95196 95083 defe0b 22 API calls 95112 ddc350 __fread_nolock messages 95083->95112 95084 ddaf8a 22 API calls 95084->95105 95085 e37120 22 API calls 95085->95105 95086->95083 95087 e2091a 95206 e43209 23 API calls 95087->95206 95090 ddec40 343 API calls 95090->95105 95091 e208a5 95092 ddec40 343 API calls 95091->95092 95093 e208cf 95092->95093 95093->95119 95204 dda81b 41 API calls 95093->95204 95095 e20591 95197 e4359c 82 API calls __wsopen_s 95095->95197 95096 e208f6 95205 e4359c 82 API calls __wsopen_s 95096->95205 95100 ddbbe0 40 API calls 95100->95105 95102 ddc3ac 95102->95039 95103 ddc237 95106 ddc253 95103->95106 95207 dda8c7 22 API calls __fread_nolock 95103->95207 95105->95072 95105->95078 95105->95081 95105->95082 95105->95084 95105->95085 95105->95086 95105->95087 95105->95090 95105->95091 95105->95095 95105->95096 95105->95100 95105->95103 95110 e209bf 95105->95110 95118 defe0b 22 API calls 95105->95118 95105->95119 95183 ddad81 95105->95183 95198 e37099 22 API calls __fread_nolock 95105->95198 95199 e55745 54 API calls _wcslen 95105->95199 95200 deaa42 22 API calls messages 95105->95200 95201 e3f05c 40 API calls 95105->95201 95202 dda993 41 API calls 95105->95202 95203 ddaceb 23 API calls messages 95105->95203 95108 e20976 95106->95108 95109 ddc297 messages 95106->95109 95208 ddaceb 23 API calls messages 95108->95208 95109->95110 95190 ddaceb 23 API calls messages 95109->95190 95110->95119 95209 e4359c 82 API calls __wsopen_s 95110->95209 95112->95102 95192 dece17 22 API calls messages 95112->95192 95115 ddc335 95115->95110 95116 ddc342 95115->95116 95191 dda704 22 API calls messages 95116->95191 95118->95105 95119->95039 95121 deee09 95120->95121 95122 deee12 95120->95122 95121->95039 95122->95121 95123 deee36 IsDialogMessageW 95122->95123 95124 e2efaf GetClassLongW 95122->95124 95123->95121 95123->95122 95124->95122 95124->95123 95125->95039 95126->95039 95127->95039 95128->95039 95129->95039 95130->95045 95131->95045 95132->95045 95133->95045 95135 ddec40 343 API calls 95134->95135 95155 ddd29d 95135->95155 95136 e21bc4 95173 e4359c 82 API calls __wsopen_s 95136->95173 95138 ddd30b messages 95138->95059 95139 ddd3c3 95141 ddd3ce 95139->95141 95142 ddd6d5 95139->95142 95140 ddd5ff 95144 e21bb5 95140->95144 95145 ddd614 95140->95145 95143 defddb 22 API calls 95141->95143 95142->95138 95150 defe0b 22 API calls 95142->95150 95153 ddd3d5 __fread_nolock 95143->95153 95172 e55705 23 API calls 95144->95172 95148 defddb 22 API calls 95145->95148 95146 ddd4b8 95151 defe0b 22 API calls 95146->95151 95158 ddd46a 95148->95158 95149 defddb 22 API calls 95149->95155 95150->95153 95161 ddd429 __fread_nolock messages 95151->95161 95152 defddb 22 API calls 95154 ddd3f6 95152->95154 95153->95152 95153->95154 95154->95161 95167 ddbec0 343 API calls 95154->95167 95155->95136 95155->95138 95155->95139 95155->95142 95155->95146 95155->95149 95155->95161 95157 e21ba4 95171 e4359c 82 API calls __wsopen_s 95157->95171 95158->95059 95161->95140 95161->95157 95161->95158 95162 e21b7f 95161->95162 95164 e21b5d 95161->95164 95168 dd1f6f 343 API calls 95161->95168 95170 e4359c 82 API calls __wsopen_s 95162->95170 95169 e4359c 82 API calls __wsopen_s 95164->95169 95166->95061 95167->95161 95168->95161 95169->95158 95170->95158 95171->95158 95172->95136 95173->95138 95175 ddae01 95174->95175 95178 ddae1c messages 95174->95178 95210 ddaec9 95175->95210 95177 ddae09 CharUpperBuffW 95177->95178 95178->95064 95180 ddacae 95179->95180 95181 ddacd1 95180->95181 95216 e4359c 82 API calls __wsopen_s 95180->95216 95181->95105 95184 e1fadb 95183->95184 95185 ddad92 95183->95185 95186 defddb 22 API calls 95185->95186 95187 ddad99 95186->95187 95217 ddadcd 95187->95217 95190->95115 95191->95112 95192->95112 95193->95069 95194->95119 95195->95082 95196->95119 95197->95119 95198->95105 95199->95105 95200->95105 95201->95105 95202->95105 95203->95105 95204->95096 95205->95119 95206->95103 95207->95106 95208->95110 95209->95119 95211 ddaedc 95210->95211 95212 ddaed9 __fread_nolock 95210->95212 95213 defddb 22 API calls 95211->95213 95212->95177 95214 ddaee7 95213->95214 95215 defe0b 22 API calls 95214->95215 95215->95212 95216->95181 95221 ddaddd 95217->95221 95218 ddadb6 95218->95105 95219 defddb 22 API calls 95219->95221 95221->95218 95221->95219 95223 ddadcd 22 API calls 95221->95223 95224 dda961 95221->95224 95229 dda8c7 22 API calls __fread_nolock 95221->95229 95223->95221 95225 defe0b 22 API calls 95224->95225 95226 dda976 95225->95226 95227 defddb 22 API calls 95226->95227 95228 dda984 95227->95228 95228->95221 95229->95221 95230 e08402 95235 e081be 95230->95235 95233 e0842a 95240 e081ef try_get_first_available_module 95235->95240 95237 e083ee 95254 e027ec 26 API calls pre_c_initialization 95237->95254 95239 e08343 95239->95233 95247 e10984 95239->95247 95243 e08338 95240->95243 95250 df8e0b 40 API calls 2 library calls 95240->95250 95242 e0838c 95242->95243 95251 df8e0b 40 API calls 2 library calls 95242->95251 95243->95239 95253 dff2d9 20 API calls __dosmaperr 95243->95253 95245 e083ab 95245->95243 95252 df8e0b 40 API calls 2 library calls 95245->95252 95255 e10081 95247->95255 95249 e1099f 95249->95233 95250->95242 95251->95245 95252->95243 95253->95237 95254->95239 95258 e1008d __FrameHandler3::FrameUnwindToState 95255->95258 95256 e1009b 95313 dff2d9 20 API calls __dosmaperr 95256->95313 95258->95256 95260 e100d4 95258->95260 95259 e100a0 95314 e027ec 26 API calls pre_c_initialization 95259->95314 95266 e1065b 95260->95266 95264 e100aa __fread_nolock 95264->95249 95316 e1042f 95266->95316 95269 e106a6 95334 e05221 95269->95334 95270 e1068d 95348 dff2c6 20 API calls __dosmaperr 95270->95348 95273 e106ab 95274 e106b4 95273->95274 95275 e106cb 95273->95275 95350 dff2c6 20 API calls __dosmaperr 95274->95350 95347 e1039a CreateFileW 95275->95347 95279 e106b9 95351 dff2d9 20 API calls __dosmaperr 95279->95351 95280 e10781 GetFileType 95284 e107d3 95280->95284 95285 e1078c GetLastError 95280->95285 95282 e10704 95282->95280 95283 e10756 GetLastError 95282->95283 95352 e1039a CreateFileW 95282->95352 95353 dff2a3 20 API calls __dosmaperr 95283->95353 95356 e0516a 21 API calls 2 library calls 95284->95356 95354 dff2a3 20 API calls __dosmaperr 95285->95354 95286 e10692 95349 dff2d9 20 API calls __dosmaperr 95286->95349 95290 e1079a CloseHandle 95290->95286 95293 e107c3 95290->95293 95292 e10749 95292->95280 95292->95283 95355 dff2d9 20 API calls __dosmaperr 95293->95355 95294 e107f4 95296 e10840 95294->95296 95357 e105ab 72 API calls 3 library calls 95294->95357 95301 e1086d 95296->95301 95358 e1014d 72 API calls 4 library calls 95296->95358 95297 e107c8 95297->95286 95300 e10866 95300->95301 95302 e1087e 95300->95302 95359 e086ae 95301->95359 95304 e100f8 95302->95304 95305 e108fc CloseHandle 95302->95305 95315 e10121 LeaveCriticalSection __wsopen_s 95304->95315 95374 e1039a CreateFileW 95305->95374 95307 e10927 95308 e10931 GetLastError 95307->95308 95309 e1095d 95307->95309 95375 dff2a3 20 API calls __dosmaperr 95308->95375 95309->95304 95311 e1093d 95376 e05333 21 API calls 2 library calls 95311->95376 95313->95259 95314->95264 95315->95264 95317 e10450 95316->95317 95318 e1046a 95316->95318 95317->95318 95384 dff2d9 20 API calls __dosmaperr 95317->95384 95377 e103bf 95318->95377 95321 e1045f 95385 e027ec 26 API calls pre_c_initialization 95321->95385 95323 e104a2 95324 e104d1 95323->95324 95386 dff2d9 20 API calls __dosmaperr 95323->95386 95329 e10524 95324->95329 95388 dfd70d 26 API calls 2 library calls 95324->95388 95327 e1051f 95327->95329 95330 e1059e 95327->95330 95328 e104c6 95387 e027ec 26 API calls pre_c_initialization 95328->95387 95329->95269 95329->95270 95389 e027fc 11 API calls _abort 95330->95389 95333 e105aa 95335 e0522d __FrameHandler3::FrameUnwindToState 95334->95335 95392 e02f5e EnterCriticalSection 95335->95392 95337 e05259 95396 e05000 95337->95396 95338 e05234 95338->95337 95343 e052c7 EnterCriticalSection 95338->95343 95346 e0527b 95338->95346 95341 e052a4 __fread_nolock 95341->95273 95344 e052d4 LeaveCriticalSection 95343->95344 95343->95346 95344->95338 95393 e0532a 95346->95393 95347->95282 95348->95286 95349->95304 95350->95279 95351->95286 95352->95292 95353->95286 95354->95290 95355->95297 95356->95294 95357->95296 95358->95300 95416 e053c4 95359->95416 95361 e086be 95362 e086c4 95361->95362 95363 e086f6 95361->95363 95365 e053c4 __wsopen_s 26 API calls 95361->95365 95429 e05333 21 API calls 2 library calls 95362->95429 95363->95362 95366 e053c4 __wsopen_s 26 API calls 95363->95366 95368 e086ed 95365->95368 95369 e08702 CloseHandle 95366->95369 95367 e0871c 95370 e0873e 95367->95370 95430 dff2a3 20 API calls __dosmaperr 95367->95430 95371 e053c4 __wsopen_s 26 API calls 95368->95371 95369->95362 95372 e0870e GetLastError 95369->95372 95370->95304 95371->95363 95372->95362 95374->95307 95375->95311 95376->95309 95378 e103d7 95377->95378 95379 e103f2 95378->95379 95390 dff2d9 20 API calls __dosmaperr 95378->95390 95379->95323 95381 e10416 95391 e027ec 26 API calls pre_c_initialization 95381->95391 95383 e10421 95383->95323 95384->95321 95385->95318 95386->95328 95387->95324 95388->95327 95389->95333 95390->95381 95391->95383 95392->95338 95404 e02fa6 LeaveCriticalSection 95393->95404 95395 e05331 95395->95341 95405 e04c7d 95396->95405 95398 e05012 95402 e0501f 95398->95402 95412 e03405 11 API calls 2 library calls 95398->95412 95401 e05071 95401->95346 95403 e05147 EnterCriticalSection 95401->95403 95413 e029c8 20 API calls __dosmaperr 95402->95413 95403->95346 95404->95395 95410 e04c8a __dosmaperr 95405->95410 95406 e04cca 95415 dff2d9 20 API calls __dosmaperr 95406->95415 95407 e04cb5 RtlAllocateHeap 95408 e04cc8 95407->95408 95407->95410 95408->95398 95410->95406 95410->95407 95414 df4ead 7 API calls 2 library calls 95410->95414 95412->95398 95413->95401 95414->95410 95415->95408 95417 e053d1 95416->95417 95419 e053e6 95416->95419 95431 dff2c6 20 API calls __dosmaperr 95417->95431 95424 e0540b 95419->95424 95433 dff2c6 20 API calls __dosmaperr 95419->95433 95421 e053d6 95432 dff2d9 20 API calls __dosmaperr 95421->95432 95422 e05416 95434 dff2d9 20 API calls __dosmaperr 95422->95434 95424->95361 95426 e053de 95426->95361 95427 e0541e 95435 e027ec 26 API calls pre_c_initialization 95427->95435 95429->95367 95430->95370 95431->95421 95432->95426 95433->95422 95434->95427 95435->95426 95436 e12402 95439 dd1410 95436->95439 95440 dd144f mciSendStringW 95439->95440 95441 e124b8 DestroyWindow 95439->95441 95442 dd146b 95440->95442 95443 dd16c6 95440->95443 95453 e124c4 95441->95453 95444 dd1479 95442->95444 95442->95453 95443->95442 95445 dd16d5 UnregisterHotKey 95443->95445 95472 dd182e 95444->95472 95445->95443 95447 e124e2 FindClose 95447->95453 95448 e124d8 95448->95453 95478 dd6246 CloseHandle 95448->95478 95450 e12509 95454 e1252d 95450->95454 95455 e1251c FreeLibrary 95450->95455 95452 dd148e 95452->95454 95462 dd149c 95452->95462 95453->95447 95453->95448 95453->95450 95456 e12541 VirtualFree 95454->95456 95463 dd1509 95454->95463 95455->95450 95456->95454 95457 dd14f8 CoUninitialize 95457->95463 95458 e12589 95465 e12598 messages 95458->95465 95479 e432eb 6 API calls messages 95458->95479 95459 dd1514 95460 dd1524 95459->95460 95476 dd1944 VirtualFreeEx CloseHandle 95460->95476 95462->95457 95463->95458 95463->95459 95467 e12627 95465->95467 95480 e364d4 22 API calls messages 95465->95480 95468 dd153a 95468->95465 95469 dd161f 95468->95469 95469->95467 95477 dd1876 CloseHandle InternetCloseHandle InternetCloseHandle WaitForSingleObject 95469->95477 95471 dd16c1 95473 dd183b 95472->95473 95474 dd1480 95473->95474 95481 e3702a 22 API calls 95473->95481 95474->95450 95474->95452 95476->95468 95477->95471 95478->95448 95479->95458 95480->95465 95481->95473 95482 df03fb 95483 df0407 __FrameHandler3::FrameUnwindToState 95482->95483 95511 defeb1 95483->95511 95485 df040e 95486 df0561 95485->95486 95489 df0438 95485->95489 95541 df083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 95486->95541 95488 df0568 95534 df4e52 95488->95534 95500 df0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 95489->95500 95522 e0247d 95489->95522 95496 df0457 95498 df04d8 95530 df0959 95498->95530 95500->95498 95537 df4e1a 38 API calls 3 library calls 95500->95537 95502 df04de 95503 df04f3 95502->95503 95538 df0992 GetModuleHandleW 95503->95538 95505 df04fa 95505->95488 95506 df04fe 95505->95506 95507 df0507 95506->95507 95539 df4df5 28 API calls _abort 95506->95539 95540 df0040 13 API calls 2 library calls 95507->95540 95510 df050f 95510->95496 95512 defeba 95511->95512 95543 df0698 IsProcessorFeaturePresent 95512->95543 95514 defec6 95544 df2c94 10 API calls 3 library calls 95514->95544 95516 defecb 95521 defecf 95516->95521 95545 e02317 95516->95545 95519 defee6 95519->95485 95521->95485 95525 e02494 95522->95525 95523 df0a8c CatchGuardHandler 5 API calls 95524 df0451 95523->95524 95524->95496 95526 e02421 95524->95526 95525->95523 95527 e02450 95526->95527 95528 df0a8c CatchGuardHandler 5 API calls 95527->95528 95529 e02479 95528->95529 95529->95500 95596 df2340 95530->95596 95533 df097f 95533->95502 95598 df4bcf 95534->95598 95537->95498 95538->95505 95539->95507 95540->95510 95541->95488 95543->95514 95544->95516 95549 e0d1f6 95545->95549 95548 df2cbd 8 API calls 3 library calls 95548->95521 95552 e0d213 95549->95552 95553 e0d20f 95549->95553 95551 defed8 95551->95519 95551->95548 95552->95553 95555 e04bfb 95552->95555 95567 df0a8c 95553->95567 95556 e04c07 __FrameHandler3::FrameUnwindToState 95555->95556 95574 e02f5e EnterCriticalSection 95556->95574 95558 e04c0e 95575 e050af 95558->95575 95560 e04c1d 95566 e04c2c 95560->95566 95588 e04a8f 29 API calls 95560->95588 95563 e04c27 95589 e04b45 GetStdHandle GetFileType 95563->95589 95564 e04c3d __fread_nolock 95564->95552 95590 e04c48 LeaveCriticalSection _abort 95566->95590 95568 df0a97 IsProcessorFeaturePresent 95567->95568 95569 df0a95 95567->95569 95571 df0c5d 95568->95571 95569->95551 95595 df0c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 95571->95595 95573 df0d40 95573->95551 95574->95558 95576 e050bb __FrameHandler3::FrameUnwindToState 95575->95576 95577 e050c8 95576->95577 95578 e050df 95576->95578 95592 dff2d9 20 API calls __dosmaperr 95577->95592 95591 e02f5e EnterCriticalSection 95578->95591 95581 e050cd 95593 e027ec 26 API calls pre_c_initialization 95581->95593 95583 e050d7 __fread_nolock 95583->95560 95584 e05117 95594 e0513e LeaveCriticalSection _abort 95584->95594 95586 e050eb 95586->95584 95587 e05000 __wsopen_s 21 API calls 95586->95587 95587->95586 95588->95563 95589->95566 95590->95564 95591->95586 95592->95581 95593->95583 95594->95583 95595->95573 95597 df096c GetStartupInfoW 95596->95597 95597->95533 95599 df4bdb _unexpected 95598->95599 95600 df4bf4 95599->95600 95601 df4be2 95599->95601 95622 e02f5e EnterCriticalSection 95600->95622 95637 df4d29 GetModuleHandleW 95601->95637 95604 df4be7 95604->95600 95638 df4d6d GetModuleHandleExW 95604->95638 95607 df4bfb 95608 df4c70 95607->95608 95621 df4c99 95607->95621 95623 e021a8 95607->95623 95613 df4c88 95608->95613 95617 e02421 _abort 5 API calls 95608->95617 95611 df4cb6 95629 df4ce8 95611->95629 95612 df4ce2 95646 e11d29 5 API calls CatchGuardHandler 95612->95646 95618 e02421 _abort 5 API calls 95613->95618 95617->95613 95618->95621 95626 df4cd9 95621->95626 95622->95607 95647 e01ee1 95623->95647 95667 e02fa6 LeaveCriticalSection 95626->95667 95628 df4cb2 95628->95611 95628->95612 95668 e0360c 95629->95668 95632 df4d16 95635 df4d6d _abort 8 API calls 95632->95635 95633 df4cf6 GetPEB 95633->95632 95634 df4d06 GetCurrentProcess TerminateProcess 95633->95634 95634->95632 95636 df4d1e ExitProcess 95635->95636 95637->95604 95639 df4dba 95638->95639 95640 df4d97 GetProcAddress 95638->95640 95642 df4dc9 95639->95642 95643 df4dc0 FreeLibrary 95639->95643 95641 df4dac 95640->95641 95641->95639 95644 df0a8c CatchGuardHandler 5 API calls 95642->95644 95643->95642 95645 df4bf3 95644->95645 95645->95600 95650 e01e90 95647->95650 95649 e01f05 95649->95608 95651 e01e9c __FrameHandler3::FrameUnwindToState 95650->95651 95658 e02f5e EnterCriticalSection 95651->95658 95653 e01eaa 95659 e01f31 95653->95659 95657 e01ec8 __fread_nolock 95657->95649 95658->95653 95662 e01f59 95659->95662 95663 e01f51 95659->95663 95660 df0a8c CatchGuardHandler 5 API calls 95661 e01eb7 95660->95661 95665 e01ed5 LeaveCriticalSection _abort 95661->95665 95662->95663 95666 e029c8 20 API calls __dosmaperr 95662->95666 95663->95660 95665->95657 95666->95663 95667->95628 95669 e03631 95668->95669 95670 e03627 95668->95670 95675 e02fd7 5 API calls 2 library calls 95669->95675 95672 df0a8c CatchGuardHandler 5 API calls 95670->95672 95673 df4cf2 95672->95673 95673->95632 95673->95633 95674 e03648 95674->95670 95675->95674 95676 e12ba5 95677 dd2b25 95676->95677 95678 e12baf 95676->95678 95704 dd2b83 7 API calls 95677->95704 95722 dd3a5a 95678->95722 95682 e12bb8 95683 dd9cb3 22 API calls 95682->95683 95685 e12bc6 95683->95685 95687 e12bf5 95685->95687 95688 e12bce 95685->95688 95686 dd2b2f 95693 dd2b44 95686->95693 95708 dd3837 95686->95708 95691 dd33c6 22 API calls 95687->95691 95729 dd33c6 95688->95729 95702 e12bf1 GetForegroundWindow ShellExecuteW 95691->95702 95698 dd2b5f 95693->95698 95718 dd30f2 95693->95718 95697 e12be7 95700 dd33c6 22 API calls 95697->95700 95701 dd2b66 SetCurrentDirectoryW 95698->95701 95699 e12c26 95699->95698 95700->95702 95703 dd2b7a 95701->95703 95702->95699 95739 dd2cd4 7 API calls 95704->95739 95706 dd2b2a 95707 dd2c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 95706->95707 95707->95686 95709 dd3862 ___scrt_fastfail 95708->95709 95740 dd4212 95709->95740 95712 dd38e8 95714 e13386 Shell_NotifyIconW 95712->95714 95715 dd3906 Shell_NotifyIconW 95712->95715 95744 dd3923 95715->95744 95717 dd391c 95717->95693 95719 dd3154 95718->95719 95720 dd3104 ___scrt_fastfail 95718->95720 95719->95698 95721 dd3123 Shell_NotifyIconW 95720->95721 95721->95719 95792 e11f50 95722->95792 95725 dd9cb3 22 API calls 95726 dd3a8d 95725->95726 95794 dd3aa2 95726->95794 95728 dd3a97 95728->95682 95730 dd33dd 95729->95730 95731 e130bb 95729->95731 95814 dd33ee 95730->95814 95733 defddb 22 API calls 95731->95733 95735 e130c5 _wcslen 95733->95735 95734 dd33e8 95738 dd6350 22 API calls 95734->95738 95736 defe0b 22 API calls 95735->95736 95737 e130fe __fread_nolock 95736->95737 95738->95697 95739->95706 95741 e135a4 95740->95741 95742 dd38b7 95740->95742 95741->95742 95743 e135ad DestroyIcon 95741->95743 95742->95712 95766 e3c874 42 API calls _strftime 95742->95766 95743->95742 95745 dd393f 95744->95745 95764 dd3a13 95744->95764 95767 dd6270 95745->95767 95748 e13393 LoadStringW 95751 e133ad 95748->95751 95749 dd395a 95772 dd6b57 95749->95772 95760 dd3994 ___scrt_fastfail 95751->95760 95785 dda8c7 22 API calls __fread_nolock 95751->95785 95752 dd396f 95753 dd397c 95752->95753 95754 e133c9 95752->95754 95753->95751 95757 dd3986 95753->95757 95786 dd6350 22 API calls 95754->95786 95784 dd6350 22 API calls 95757->95784 95759 e133d7 95759->95760 95761 dd33c6 22 API calls 95759->95761 95762 dd39f9 Shell_NotifyIconW 95760->95762 95763 e133f9 95761->95763 95762->95764 95765 dd33c6 22 API calls 95763->95765 95764->95717 95765->95760 95766->95712 95768 defe0b 22 API calls 95767->95768 95769 dd6295 95768->95769 95770 defddb 22 API calls 95769->95770 95771 dd394d 95770->95771 95771->95748 95771->95749 95773 e14ba1 95772->95773 95774 dd6b67 _wcslen 95772->95774 95788 dd93b2 95773->95788 95777 dd6b7d 95774->95777 95778 dd6ba2 95774->95778 95776 e14baa 95776->95776 95787 dd6f34 22 API calls 95777->95787 95779 defddb 22 API calls 95778->95779 95781 dd6bae 95779->95781 95783 defe0b 22 API calls 95781->95783 95782 dd6b85 __fread_nolock 95782->95752 95783->95782 95784->95760 95785->95760 95786->95759 95787->95782 95789 dd93c0 95788->95789 95791 dd93c9 __fread_nolock 95788->95791 95790 ddaec9 22 API calls 95789->95790 95789->95791 95790->95791 95791->95776 95793 dd3a67 GetModuleFileNameW 95792->95793 95793->95725 95795 e11f50 __wsopen_s 95794->95795 95796 dd3aaf GetFullPathNameW 95795->95796 95797 dd3ace 95796->95797 95798 dd3ae9 95796->95798 95799 dd6b57 22 API calls 95797->95799 95808 dda6c3 95798->95808 95801 dd3ada 95799->95801 95804 dd37a0 95801->95804 95805 dd37ae 95804->95805 95806 dd93b2 22 API calls 95805->95806 95807 dd37c2 95806->95807 95807->95728 95809 dda6dd 95808->95809 95813 dda6d0 95808->95813 95810 defddb 22 API calls 95809->95810 95811 dda6e7 95810->95811 95812 defe0b 22 API calls 95811->95812 95812->95813 95813->95801 95815 dd33fe _wcslen 95814->95815 95816 e1311d 95815->95816 95817 dd3411 95815->95817 95818 defddb 22 API calls 95816->95818 95824 dda587 95817->95824 95820 e13127 95818->95820 95822 defe0b 22 API calls 95820->95822 95821 dd341e __fread_nolock 95821->95734 95823 e13157 __fread_nolock 95822->95823 95825 dda598 __fread_nolock 95824->95825 95826 dda59d 95824->95826 95825->95821 95827 e1f80f 95826->95827 95828 defe0b 22 API calls 95826->95828 95828->95825 95829 dd1098 95834 dd42de 95829->95834 95833 dd10a7 95835 dda961 22 API calls 95834->95835 95836 dd42f5 GetVersionExW 95835->95836 95837 dd6b57 22 API calls 95836->95837 95838 dd4342 95837->95838 95839 dd93b2 22 API calls 95838->95839 95841 dd4378 95838->95841 95840 dd436c 95839->95840 95843 dd37a0 22 API calls 95840->95843 95842 dd441b GetCurrentProcess IsWow64Process 95841->95842 95849 e137df 95841->95849 95844 dd4437 95842->95844 95843->95841 95845 dd444f LoadLibraryA 95844->95845 95846 e13824 GetSystemInfo 95844->95846 95847 dd449c GetSystemInfo 95845->95847 95848 dd4460 GetProcAddress 95845->95848 95851 dd4476 95847->95851 95848->95847 95850 dd4470 GetNativeSystemInfo 95848->95850 95850->95851 95852 dd447a FreeLibrary 95851->95852 95853 dd109d 95851->95853 95852->95853 95854 df00a3 29 API calls __onexit 95853->95854 95854->95833 95855 dd105b 95860 dd344d 95855->95860 95857 dd106a 95891 df00a3 29 API calls __onexit 95857->95891 95859 dd1074 95861 dd345d __wsopen_s 95860->95861 95862 dda961 22 API calls 95861->95862 95863 dd3513 95862->95863 95864 dd3a5a 24 API calls 95863->95864 95865 dd351c 95864->95865 95892 dd3357 95865->95892 95868 dd33c6 22 API calls 95869 dd3535 95868->95869 95898 dd515f 95869->95898 95872 dda961 22 API calls 95873 dd354d 95872->95873 95874 dda6c3 22 API calls 95873->95874 95875 dd3556 RegOpenKeyExW 95874->95875 95876 e13176 RegQueryValueExW 95875->95876 95881 dd3578 95875->95881 95877 e13193 95876->95877 95878 e1320c RegCloseKey 95876->95878 95879 defe0b 22 API calls 95877->95879 95878->95881 95890 e1321e _wcslen 95878->95890 95880 e131ac 95879->95880 95904 dd5722 95880->95904 95881->95857 95884 e131d4 95885 dd6b57 22 API calls 95884->95885 95887 e131ee messages 95885->95887 95886 dd4c6d 22 API calls 95886->95890 95887->95878 95888 dd9cb3 22 API calls 95888->95890 95889 dd515f 22 API calls 95889->95890 95890->95881 95890->95886 95890->95888 95890->95889 95891->95859 95893 e11f50 __wsopen_s 95892->95893 95894 dd3364 GetFullPathNameW 95893->95894 95895 dd3386 95894->95895 95896 dd6b57 22 API calls 95895->95896 95897 dd33a4 95896->95897 95897->95868 95899 dd516e 95898->95899 95903 dd518f __fread_nolock 95898->95903 95901 defe0b 22 API calls 95899->95901 95900 defddb 22 API calls 95902 dd3544 95900->95902 95901->95903 95902->95872 95903->95900 95905 defddb 22 API calls 95904->95905 95906 dd5734 RegQueryValueExW 95905->95906 95906->95884 95906->95887 95907 dd2e37 95908 dda961 22 API calls 95907->95908 95909 dd2e4d 95908->95909 95986 dd4ae3 95909->95986 95911 dd2e6b 95912 dd3a5a 24 API calls 95911->95912 95913 dd2e7f 95912->95913 95914 dd9cb3 22 API calls 95913->95914 95915 dd2e8c 95914->95915 96000 dd4ecb 95915->96000 95918 dd2ead 96022 dda8c7 22 API calls __fread_nolock 95918->96022 95919 e12cb0 96040 e42cf9 95919->96040 95921 e12cc3 95923 e12ccf 95921->95923 96066 dd4f39 95921->96066 95927 dd4f39 68 API calls 95923->95927 95924 dd2ec3 96023 dd6f88 22 API calls 95924->96023 95929 e12ce5 95927->95929 95928 dd2ecf 95930 dd9cb3 22 API calls 95928->95930 96072 dd3084 22 API calls 95929->96072 95931 dd2edc 95930->95931 96024 dda81b 41 API calls 95931->96024 95934 dd2eec 95936 dd9cb3 22 API calls 95934->95936 95935 e12d02 96073 dd3084 22 API calls 95935->96073 95937 dd2f12 95936->95937 96025 dda81b 41 API calls 95937->96025 95940 e12d1e 95941 dd3a5a 24 API calls 95940->95941 95942 e12d44 95941->95942 96074 dd3084 22 API calls 95942->96074 95943 dd2f21 95946 dda961 22 API calls 95943->95946 95945 e12d50 96075 dda8c7 22 API calls __fread_nolock 95945->96075 95948 dd2f3f 95946->95948 96026 dd3084 22 API calls 95948->96026 95949 e12d5e 96076 dd3084 22 API calls 95949->96076 95952 dd2f4b 96027 df4a28 40 API calls 3 library calls 95952->96027 95953 e12d6d 96077 dda8c7 22 API calls __fread_nolock 95953->96077 95955 dd2f59 95955->95929 95956 dd2f63 95955->95956 96028 df4a28 40 API calls 3 library calls 95956->96028 95959 e12d83 96078 dd3084 22 API calls 95959->96078 95960 dd2f6e 95960->95935 95961 dd2f78 95960->95961 96029 df4a28 40 API calls 3 library calls 95961->96029 95964 e12d90 95965 dd2f83 95965->95940 95966 dd2f8d 95965->95966 96030 df4a28 40 API calls 3 library calls 95966->96030 95968 dd2f98 95969 dd2fdc 95968->95969 96031 dd3084 22 API calls 95968->96031 95969->95953 95970 dd2fe8 95969->95970 95970->95964 96034 dd63eb 22 API calls 95970->96034 95973 dd2fbf 96032 dda8c7 22 API calls __fread_nolock 95973->96032 95974 dd2ff8 96035 dd6a50 22 API calls 95974->96035 95977 dd2fcd 96033 dd3084 22 API calls 95977->96033 95978 dd3006 96036 dd70b0 23 API calls 95978->96036 95983 dd3021 95984 dd3065 95983->95984 96037 dd6f88 22 API calls 95983->96037 96038 dd70b0 23 API calls 95983->96038 96039 dd3084 22 API calls 95983->96039 95987 dd4af0 __wsopen_s 95986->95987 95988 dd6b57 22 API calls 95987->95988 95989 dd4b22 95987->95989 95988->95989 95999 dd4b58 95989->95999 96079 dd4c6d 95989->96079 95991 dd9cb3 22 API calls 95993 dd4c52 95991->95993 95992 dd9cb3 22 API calls 95992->95999 95995 dd515f 22 API calls 95993->95995 95994 dd4c6d 22 API calls 95994->95999 95997 dd4c5e 95995->95997 95996 dd515f 22 API calls 95996->95999 95997->95911 95998 dd4c29 95998->95991 95998->95997 95999->95992 95999->95994 95999->95996 95999->95998 96082 dd4e90 LoadLibraryA 96000->96082 96005 dd4ef6 LoadLibraryExW 96090 dd4e59 LoadLibraryA 96005->96090 96006 e13ccf 96007 dd4f39 68 API calls 96006->96007 96009 e13cd6 96007->96009 96011 dd4e59 3 API calls 96009->96011 96015 e13cde 96011->96015 96013 dd4f20 96014 dd4f2c 96013->96014 96013->96015 96016 dd4f39 68 API calls 96014->96016 96112 dd50f5 40 API calls __fread_nolock 96015->96112 96018 dd2ea5 96016->96018 96018->95918 96018->95919 96019 e13cf5 96113 e428fe 27 API calls 96019->96113 96021 e13d05 96022->95924 96023->95928 96024->95934 96025->95943 96026->95952 96027->95955 96028->95960 96029->95965 96030->95968 96031->95973 96032->95977 96033->95969 96034->95974 96035->95978 96036->95983 96037->95983 96038->95983 96039->95983 96041 e42d15 96040->96041 96178 dd511f 64 API calls 96041->96178 96043 e42d29 96179 e42e66 75 API calls 96043->96179 96045 e42d3b 96063 e42d3f 96045->96063 96180 dd50f5 40 API calls __fread_nolock 96045->96180 96047 e42d56 96181 dd50f5 40 API calls __fread_nolock 96047->96181 96049 e42d66 96182 dd50f5 40 API calls __fread_nolock 96049->96182 96051 e42d81 96183 dd50f5 40 API calls __fread_nolock 96051->96183 96053 e42d9c 96184 dd511f 64 API calls 96053->96184 96055 e42db3 96056 dfea0c ___std_exception_copy 21 API calls 96055->96056 96057 e42dba 96056->96057 96058 dfea0c ___std_exception_copy 21 API calls 96057->96058 96059 e42dc4 96058->96059 96185 dd50f5 40 API calls __fread_nolock 96059->96185 96061 e42dd8 96186 e428fe 27 API calls 96061->96186 96063->95921 96064 e42dee 96064->96063 96187 e422ce 96064->96187 96067 dd4f43 96066->96067 96069 dd4f4a 96066->96069 96068 dfe678 67 API calls 96067->96068 96068->96069 96070 dd4f59 96069->96070 96071 dd4f6a FreeLibrary 96069->96071 96070->95923 96071->96070 96072->95935 96073->95940 96074->95945 96075->95949 96076->95953 96077->95959 96078->95964 96080 ddaec9 22 API calls 96079->96080 96081 dd4c78 96080->96081 96081->95989 96083 dd4ea8 GetProcAddress 96082->96083 96084 dd4ec6 96082->96084 96085 dd4eb8 96083->96085 96087 dfe5eb 96084->96087 96085->96084 96086 dd4ebf FreeLibrary 96085->96086 96086->96084 96114 dfe52a 96087->96114 96089 dd4eea 96089->96005 96089->96006 96091 dd4e8d 96090->96091 96092 dd4e6e GetProcAddress 96090->96092 96095 dd4f80 96091->96095 96093 dd4e7e 96092->96093 96093->96091 96094 dd4e86 FreeLibrary 96093->96094 96094->96091 96096 defe0b 22 API calls 96095->96096 96097 dd4f95 96096->96097 96098 dd5722 22 API calls 96097->96098 96099 dd4fa1 __fread_nolock 96098->96099 96100 dd50a5 96099->96100 96101 e13d1d 96099->96101 96111 dd4fdc 96099->96111 96167 dd42a2 CreateStreamOnHGlobal 96100->96167 96175 e4304d 74 API calls 96101->96175 96104 e13d22 96176 dd511f 64 API calls 96104->96176 96107 e13d45 96177 dd50f5 40 API calls __fread_nolock 96107->96177 96110 dd506e messages 96110->96013 96111->96104 96111->96110 96173 dd50f5 40 API calls __fread_nolock 96111->96173 96174 dd511f 64 API calls 96111->96174 96112->96019 96113->96021 96116 dfe536 __FrameHandler3::FrameUnwindToState 96114->96116 96115 dfe544 96139 dff2d9 20 API calls __dosmaperr 96115->96139 96116->96115 96118 dfe574 96116->96118 96120 dfe579 96118->96120 96121 dfe586 96118->96121 96119 dfe549 96140 e027ec 26 API calls pre_c_initialization 96119->96140 96141 dff2d9 20 API calls __dosmaperr 96120->96141 96131 e08061 96121->96131 96125 dfe58f 96126 dfe595 96125->96126 96127 dfe5a2 96125->96127 96142 dff2d9 20 API calls __dosmaperr 96126->96142 96143 dfe5d4 LeaveCriticalSection __fread_nolock 96127->96143 96128 dfe554 __fread_nolock 96128->96089 96132 e0806d __FrameHandler3::FrameUnwindToState 96131->96132 96144 e02f5e EnterCriticalSection 96132->96144 96134 e0807b 96145 e080fb 96134->96145 96138 e080ac __fread_nolock 96138->96125 96139->96119 96140->96128 96141->96128 96142->96128 96143->96128 96144->96134 96152 e0811e 96145->96152 96146 e08088 96158 e080b7 96146->96158 96147 e08177 96148 e04c7d __dosmaperr 20 API calls 96147->96148 96149 e08180 96148->96149 96163 e029c8 20 API calls __dosmaperr 96149->96163 96152->96146 96152->96147 96161 df918d EnterCriticalSection 96152->96161 96162 df91a1 LeaveCriticalSection 96152->96162 96153 e08189 96153->96146 96164 e03405 11 API calls 2 library calls 96153->96164 96155 e081a8 96165 df918d EnterCriticalSection 96155->96165 96166 e02fa6 LeaveCriticalSection 96158->96166 96160 e080be 96160->96138 96161->96152 96162->96152 96163->96153 96164->96155 96165->96146 96166->96160 96168 dd42bc FindResourceExW 96167->96168 96172 dd42d9 96167->96172 96169 e135ba LoadResource 96168->96169 96168->96172 96170 e135cf SizeofResource 96169->96170 96169->96172 96171 e135e3 LockResource 96170->96171 96170->96172 96171->96172 96172->96111 96173->96111 96174->96111 96175->96104 96176->96107 96177->96110 96178->96043 96179->96045 96180->96047 96181->96049 96182->96051 96183->96053 96184->96055 96185->96061 96186->96064 96188 e422e7 96187->96188 96189 e422d9 96187->96189 96191 e4232c 96188->96191 96192 dfe5eb 29 API calls 96188->96192 96215 e422f0 96188->96215 96190 dfe5eb 29 API calls 96189->96190 96190->96188 96216 e42557 40 API calls __fread_nolock 96191->96216 96193 e42311 96192->96193 96193->96191 96195 e4231a 96193->96195 96195->96215 96224 dfe678 96195->96224 96196 e42370 96197 e42374 96196->96197 96198 e42395 96196->96198 96199 e42381 96197->96199 96202 dfe678 67 API calls 96197->96202 96217 e42171 96198->96217 96204 dfe678 67 API calls 96199->96204 96199->96215 96202->96199 96203 e4239d 96205 e423c3 96203->96205 96206 e423a3 96203->96206 96204->96215 96237 e423f3 74 API calls 96205->96237 96208 e423b0 96206->96208 96209 dfe678 67 API calls 96206->96209 96210 dfe678 67 API calls 96208->96210 96208->96215 96209->96208 96210->96215 96211 e423ca 96212 e423de 96211->96212 96213 dfe678 67 API calls 96211->96213 96214 dfe678 67 API calls 96212->96214 96212->96215 96213->96212 96214->96215 96215->96063 96216->96196 96218 dfea0c ___std_exception_copy 21 API calls 96217->96218 96219 e4217f 96218->96219 96220 dfea0c ___std_exception_copy 21 API calls 96219->96220 96221 e42190 96220->96221 96222 dfea0c ___std_exception_copy 21 API calls 96221->96222 96223 e4219c 96222->96223 96223->96203 96225 dfe684 __FrameHandler3::FrameUnwindToState 96224->96225 96226 dfe6aa 96225->96226 96227 dfe695 96225->96227 96236 dfe6a5 __fread_nolock 96226->96236 96238 df918d EnterCriticalSection 96226->96238 96255 dff2d9 20 API calls __dosmaperr 96227->96255 96229 dfe69a 96256 e027ec 26 API calls pre_c_initialization 96229->96256 96232 dfe6c6 96239 dfe602 96232->96239 96234 dfe6d1 96257 dfe6ee LeaveCriticalSection __fread_nolock 96234->96257 96236->96215 96237->96211 96238->96232 96240 dfe60f 96239->96240 96241 dfe624 96239->96241 96290 dff2d9 20 API calls __dosmaperr 96240->96290 96247 dfe61f 96241->96247 96258 dfdc0b 96241->96258 96243 dfe614 96291 e027ec 26 API calls pre_c_initialization 96243->96291 96247->96234 96251 dfe646 96275 e0862f 96251->96275 96255->96229 96256->96236 96257->96236 96259 dfdc23 96258->96259 96263 dfdc1f 96258->96263 96260 dfd955 __fread_nolock 26 API calls 96259->96260 96259->96263 96261 dfdc43 96260->96261 96293 e059be 62 API calls 5 library calls 96261->96293 96264 e04d7a 96263->96264 96265 e04d90 96264->96265 96266 dfe640 96264->96266 96265->96266 96294 e029c8 20 API calls __dosmaperr 96265->96294 96268 dfd955 96266->96268 96269 dfd976 96268->96269 96270 dfd961 96268->96270 96269->96251 96295 dff2d9 20 API calls __dosmaperr 96270->96295 96272 dfd966 96296 e027ec 26 API calls pre_c_initialization 96272->96296 96274 dfd971 96274->96251 96276 e08653 96275->96276 96277 e0863e 96275->96277 96278 e0868e 96276->96278 96283 e0867a 96276->96283 96300 dff2c6 20 API calls __dosmaperr 96277->96300 96302 dff2c6 20 API calls __dosmaperr 96278->96302 96281 e08643 96301 dff2d9 20 API calls __dosmaperr 96281->96301 96297 e08607 96283->96297 96284 e08693 96303 dff2d9 20 API calls __dosmaperr 96284->96303 96287 dfe64c 96287->96247 96292 e029c8 20 API calls __dosmaperr 96287->96292 96288 e0869b 96304 e027ec 26 API calls pre_c_initialization 96288->96304 96290->96243 96291->96247 96292->96247 96293->96263 96294->96266 96295->96272 96296->96274 96305 e08585 96297->96305 96299 e0862b 96299->96287 96300->96281 96301->96287 96302->96284 96303->96288 96304->96287 96306 e08591 __FrameHandler3::FrameUnwindToState 96305->96306 96316 e05147 EnterCriticalSection 96306->96316 96308 e0859f 96309 e085d1 96308->96309 96310 e085c6 96308->96310 96317 dff2d9 20 API calls __dosmaperr 96309->96317 96312 e086ae __wsopen_s 29 API calls 96310->96312 96313 e085cc 96312->96313 96318 e085fb LeaveCriticalSection __wsopen_s 96313->96318 96315 e085ee __fread_nolock 96315->96299 96316->96308 96317->96313 96318->96315 96319 dd3156 96322 dd3170 96319->96322 96323 dd3187 96322->96323 96324 dd318c 96323->96324 96325 dd31eb 96323->96325 96363 dd31e9 96323->96363 96329 dd3199 96324->96329 96330 dd3265 PostQuitMessage 96324->96330 96327 e12dfb 96325->96327 96328 dd31f1 96325->96328 96326 dd31d0 DefWindowProcW 96355 dd316a 96326->96355 96377 dd18e2 10 API calls 96327->96377 96331 dd321d SetTimer RegisterWindowMessageW 96328->96331 96332 dd31f8 96328->96332 96334 dd31a4 96329->96334 96335 e12e7c 96329->96335 96330->96355 96339 dd3246 CreatePopupMenu 96331->96339 96331->96355 96336 dd3201 KillTimer 96332->96336 96337 e12d9c 96332->96337 96340 dd31ae 96334->96340 96341 e12e68 96334->96341 96380 e3bf30 34 API calls ___scrt_fastfail 96335->96380 96346 dd30f2 Shell_NotifyIconW 96336->96346 96344 e12da1 96337->96344 96345 e12dd7 MoveWindow 96337->96345 96338 e12e1c 96378 dee499 42 API calls 96338->96378 96339->96355 96349 dd31b9 96340->96349 96353 e12e4d 96340->96353 96367 e3c161 96341->96367 96343 e12e8e 96343->96326 96343->96355 96351 e12da7 96344->96351 96352 e12dc6 SetFocus 96344->96352 96345->96355 96354 dd3214 96346->96354 96350 dd3253 96349->96350 96356 dd31c4 96349->96356 96375 dd326f 44 API calls ___scrt_fastfail 96350->96375 96351->96356 96358 e12db0 96351->96358 96352->96355 96353->96326 96379 e30ad7 22 API calls 96353->96379 96374 dd3c50 DeleteObject DestroyWindow 96354->96374 96356->96326 96364 dd30f2 Shell_NotifyIconW 96356->96364 96376 dd18e2 10 API calls 96358->96376 96361 dd3263 96361->96355 96363->96326 96365 e12e41 96364->96365 96366 dd3837 49 API calls 96365->96366 96366->96363 96368 e3c276 96367->96368 96369 e3c179 ___scrt_fastfail 96367->96369 96368->96355 96370 dd3923 24 API calls 96369->96370 96372 e3c1a0 96370->96372 96371 e3c25f KillTimer SetTimer 96371->96368 96372->96371 96373 e3c251 Shell_NotifyIconW 96372->96373 96373->96371 96374->96355 96375->96361 96376->96355 96377->96338 96378->96356 96379->96363 96380->96343 96381 dd1033 96386 dd4c91 96381->96386 96385 dd1042 96387 dda961 22 API calls 96386->96387 96388 dd4cff 96387->96388 96394 dd3af0 96388->96394 96391 dd4d9c 96392 dd1038 96391->96392 96397 dd51f7 22 API calls __fread_nolock 96391->96397 96393 df00a3 29 API calls __onexit 96392->96393 96393->96385 96398 dd3b1c 96394->96398 96397->96391 96399 dd3b0f 96398->96399 96400 dd3b29 96398->96400 96399->96391 96400->96399 96401 dd3b30 RegOpenKeyExW 96400->96401 96401->96399 96402 dd3b4a RegQueryValueExW 96401->96402 96403 dd3b6b 96402->96403 96404 dd3b80 RegCloseKey 96402->96404 96403->96404 96404->96399 96405 dd1cad SystemParametersInfoW 96406 dd1044 96411 dd10f3 96406->96411 96408 dd104a 96447 df00a3 29 API calls __onexit 96408->96447 96410 dd1054 96448 dd1398 96411->96448 96415 dd116a 96416 dda961 22 API calls 96415->96416 96417 dd1174 96416->96417 96418 dda961 22 API calls 96417->96418 96419 dd117e 96418->96419 96420 dda961 22 API calls 96419->96420 96421 dd1188 96420->96421 96422 dda961 22 API calls 96421->96422 96423 dd11c6 96422->96423 96424 dda961 22 API calls 96423->96424 96425 dd1292 96424->96425 96458 dd171c 96425->96458 96429 dd12c4 96430 dda961 22 API calls 96429->96430 96431 dd12ce 96430->96431 96432 de1940 9 API calls 96431->96432 96433 dd12f9 96432->96433 96479 dd1aab 96433->96479 96435 dd1315 96436 dd1325 GetStdHandle 96435->96436 96437 e12485 96436->96437 96438 dd137a 96436->96438 96437->96438 96439 e1248e 96437->96439 96442 dd1387 OleInitialize 96438->96442 96440 defddb 22 API calls 96439->96440 96441 e12495 96440->96441 96486 e4011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 96441->96486 96442->96408 96444 e1249e 96487 e40944 CreateThread 96444->96487 96446 e124aa CloseHandle 96446->96438 96447->96410 96488 dd13f1 96448->96488 96451 dd13f1 22 API calls 96452 dd13d0 96451->96452 96453 dda961 22 API calls 96452->96453 96454 dd13dc 96453->96454 96455 dd6b57 22 API calls 96454->96455 96456 dd1129 96455->96456 96457 dd1bc3 6 API calls 96456->96457 96457->96415 96459 dda961 22 API calls 96458->96459 96460 dd172c 96459->96460 96461 dda961 22 API calls 96460->96461 96462 dd1734 96461->96462 96463 dda961 22 API calls 96462->96463 96464 dd174f 96463->96464 96465 defddb 22 API calls 96464->96465 96466 dd129c 96465->96466 96467 dd1b4a 96466->96467 96468 dd1b58 96467->96468 96469 dda961 22 API calls 96468->96469 96470 dd1b63 96469->96470 96471 dda961 22 API calls 96470->96471 96472 dd1b6e 96471->96472 96473 dda961 22 API calls 96472->96473 96474 dd1b79 96473->96474 96475 dda961 22 API calls 96474->96475 96476 dd1b84 96475->96476 96477 defddb 22 API calls 96476->96477 96478 dd1b96 RegisterWindowMessageW 96477->96478 96478->96429 96480 dd1abb 96479->96480 96481 e1272d 96479->96481 96483 defddb 22 API calls 96480->96483 96495 e43209 23 API calls 96481->96495 96485 dd1ac3 96483->96485 96484 e12738 96485->96435 96486->96444 96487->96446 96496 e4092a 28 API calls 96487->96496 96489 dda961 22 API calls 96488->96489 96490 dd13fc 96489->96490 96491 dda961 22 API calls 96490->96491 96492 dd1404 96491->96492 96493 dda961 22 API calls 96492->96493 96494 dd13c6 96493->96494 96494->96451 96495->96484 96497 dd2de3 96498 dd2df0 __wsopen_s 96497->96498 96499 dd2e09 96498->96499 96500 e12c2b ___scrt_fastfail 96498->96500 96501 dd3aa2 23 API calls 96499->96501 96502 e12c47 GetOpenFileNameW 96500->96502 96503 dd2e12 96501->96503 96504 e12c96 96502->96504 96513 dd2da5 96503->96513 96506 dd6b57 22 API calls 96504->96506 96508 e12cab 96506->96508 96508->96508 96510 dd2e27 96531 dd44a8 96510->96531 96514 e11f50 __wsopen_s 96513->96514 96515 dd2db2 GetLongPathNameW 96514->96515 96516 dd6b57 22 API calls 96515->96516 96517 dd2dda 96516->96517 96518 dd3598 96517->96518 96519 dda961 22 API calls 96518->96519 96520 dd35aa 96519->96520 96521 dd3aa2 23 API calls 96520->96521 96522 dd35b5 96521->96522 96523 e132eb 96522->96523 96524 dd35c0 96522->96524 96529 e1330d 96523->96529 96566 dece60 41 API calls 96523->96566 96526 dd515f 22 API calls 96524->96526 96527 dd35cc 96526->96527 96560 dd35f3 96527->96560 96530 dd35df 96530->96510 96532 dd4ecb 94 API calls 96531->96532 96533 dd44cd 96532->96533 96534 e13833 96533->96534 96535 dd4ecb 94 API calls 96533->96535 96536 e42cf9 80 API calls 96534->96536 96537 dd44e1 96535->96537 96538 e13848 96536->96538 96537->96534 96539 dd44e9 96537->96539 96540 e13869 96538->96540 96541 e1384c 96538->96541 96544 e13854 96539->96544 96545 dd44f5 96539->96545 96543 defe0b 22 API calls 96540->96543 96542 dd4f39 68 API calls 96541->96542 96542->96544 96559 e138ae 96543->96559 96568 e3da5a 82 API calls 96544->96568 96567 dd940c 136 API calls 2 library calls 96545->96567 96548 e13862 96548->96540 96549 dd2e31 96550 dd4f39 68 API calls 96553 e13a5f 96550->96553 96553->96550 96574 e3989b 82 API calls __wsopen_s 96553->96574 96556 dd9cb3 22 API calls 96556->96559 96559->96553 96559->96556 96569 e3967e 22 API calls __fread_nolock 96559->96569 96570 e395ad 42 API calls _wcslen 96559->96570 96571 e40b5a 22 API calls 96559->96571 96572 dda4a1 22 API calls __fread_nolock 96559->96572 96573 dd3ff7 22 API calls 96559->96573 96561 dd3605 96560->96561 96565 dd3624 __fread_nolock 96560->96565 96564 defe0b 22 API calls 96561->96564 96562 defddb 22 API calls 96563 dd363b 96562->96563 96563->96530 96564->96565 96565->96562 96566->96523 96567->96549 96568->96548 96569->96559 96570->96559 96571->96559 96572->96559 96573->96559 96574->96553

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 393 dd42de-dd434d call dda961 GetVersionExW call dd6b57 398 e13617-e1362a 393->398 399 dd4353 393->399 401 e1362b-e1362f 398->401 400 dd4355-dd4357 399->400 402 dd435d-dd43bc call dd93b2 call dd37a0 400->402 403 e13656 400->403 404 e13631 401->404 405 e13632-e1363e 401->405 422 e137df-e137e6 402->422 423 dd43c2-dd43c4 402->423 408 e1365d-e13660 403->408 404->405 405->401 407 e13640-e13642 405->407 407->400 410 e13648-e1364f 407->410 412 dd441b-dd4435 GetCurrentProcess IsWow64Process 408->412 413 e13666-e136a8 408->413 410->398 411 e13651 410->411 411->403 415 dd4494-dd449a 412->415 416 dd4437 412->416 413->412 417 e136ae-e136b1 413->417 419 dd443d-dd4449 415->419 416->419 420 e136b3-e136bd 417->420 421 e136db-e136e5 417->421 424 dd444f-dd445e LoadLibraryA 419->424 425 e13824-e13828 GetSystemInfo 419->425 426 e136ca-e136d6 420->426 427 e136bf-e136c5 420->427 429 e136e7-e136f3 421->429 430 e136f8-e13702 421->430 431 e13806-e13809 422->431 432 e137e8 422->432 423->408 428 dd43ca-dd43dd 423->428 435 dd449c-dd44a6 GetSystemInfo 424->435 436 dd4460-dd446e GetProcAddress 424->436 426->412 427->412 437 e13726-e1372f 428->437 438 dd43e3-dd43e5 428->438 429->412 440 e13715-e13721 430->440 441 e13704-e13710 430->441 433 e137f4-e137fc 431->433 434 e1380b-e1381a 431->434 439 e137ee 432->439 433->431 434->439 444 e1381c-e13822 434->444 446 dd4476-dd4478 435->446 436->435 445 dd4470-dd4474 GetNativeSystemInfo 436->445 442 e13731-e13737 437->442 443 e1373c-e13748 437->443 447 dd43eb-dd43ee 438->447 448 e1374d-e13762 438->448 439->433 440->412 441->412 442->412 443->412 444->433 445->446 451 dd447a-dd447b FreeLibrary 446->451 452 dd4481-dd4493 446->452 453 e13791-e13794 447->453 454 dd43f4-dd440f 447->454 449 e13764-e1376a 448->449 450 e1376f-e1377b 448->450 449->412 450->412 451->452 453->412 455 e1379a-e137c1 453->455 456 e13780-e1378c 454->456 457 dd4415 454->457 458 e137c3-e137c9 455->458 459 e137ce-e137da 455->459 456->412 457->412 458->412 459->412
                                                        APIs
                                                        • GetVersionExW.KERNEL32(?), ref: 00DD430D
                                                          • Part of subcall function 00DD6B57: _wcslen.LIBCMT ref: 00DD6B6A
                                                        • GetCurrentProcess.KERNEL32(?,00E6CB64,00000000,?,?), ref: 00DD4422
                                                        • IsWow64Process.KERNEL32(00000000,?,?), ref: 00DD4429
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00DD4454
                                                        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00DD4466
                                                        • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00DD4474
                                                        • FreeLibrary.KERNEL32(00000000,?,?), ref: 00DD447B
                                                        • GetSystemInfo.KERNEL32(?,?,?), ref: 00DD44A0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                        • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                        • API String ID: 3290436268-3101561225
                                                        • Opcode ID: 98ef3a7d42e7a791a9c1b598c76d215a631e7640e52e39d6505fc021257c2ea8
                                                        • Instruction ID: 3c9bcc35fa69f5e8d912ae9b2ca0a60378115c53fc1f5cd60e63197c6d5988bd
                                                        • Opcode Fuzzy Hash: 98ef3a7d42e7a791a9c1b598c76d215a631e7640e52e39d6505fc021257c2ea8
                                                        • Instruction Fuzzy Hash: DBA14E7590A2C0DFCF11CF7B7C411A57EA46B2B344F1A58EAD081B7B62D670698CCB21

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 797 dd42a2-dd42ba CreateStreamOnHGlobal 798 dd42bc-dd42d3 FindResourceExW 797->798 799 dd42da-dd42dd 797->799 800 dd42d9 798->800 801 e135ba-e135c9 LoadResource 798->801 800->799 801->800 802 e135cf-e135dd SizeofResource 801->802 802->800 803 e135e3-e135ee LockResource 802->803 803->800 804 e135f4-e13612 803->804 804->800
                                                        APIs
                                                        • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00DD50AA,?,?,00000000,00000000), ref: 00DD42B2
                                                        • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00DD50AA,?,?,00000000,00000000), ref: 00DD42C9
                                                        • LoadResource.KERNEL32(?,00000000,?,?,00DD50AA,?,?,00000000,00000000,?,?,?,?,?,?,00DD4F20), ref: 00E135BE
                                                        • SizeofResource.KERNEL32(?,00000000,?,?,00DD50AA,?,?,00000000,00000000,?,?,?,?,?,?,00DD4F20), ref: 00E135D3
                                                        • LockResource.KERNEL32(00DD50AA,?,?,00DD50AA,?,?,00000000,00000000,?,?,?,?,?,?,00DD4F20,?), ref: 00E135E6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                        • String ID: SCRIPT
                                                        • API String ID: 3051347437-3967369404
                                                        • Opcode ID: 30472ca5dadb7003ff306f1949a472253daeb98c0aceea59bc4c517f4417353a
                                                        • Instruction ID: a301e9fbacc7939b7e8022bd16bfe7465fecb9f6486aed79e1961c41a9732593
                                                        • Opcode Fuzzy Hash: 30472ca5dadb7003ff306f1949a472253daeb98c0aceea59bc4c517f4417353a
                                                        • Instruction Fuzzy Hash: 34118E70201701BFE7218B66EC48F677FBAEBC5B91F24416AF846E6260DBB1DC048670

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 922 e3dbbe-e3dbda lstrlenW 923 e3dc06 922->923 924 e3dbdc-e3dbe6 GetFileAttributesW 922->924 925 e3dc09-e3dc0d 923->925 924->925 926 e3dbe8-e3dbf7 FindFirstFileW 924->926 926->923 927 e3dbf9-e3dc04 FindClose 926->927 927->925
                                                        APIs
                                                        • lstrlenW.KERNEL32(?,"R), ref: 00E3DBCE
                                                        • GetFileAttributesW.KERNELBASE(?), ref: 00E3DBDD
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00E3DBEE
                                                        • FindClose.KERNEL32(00000000), ref: 00E3DBFA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: FileFind$AttributesCloseFirstlstrlen
                                                        • String ID: "R
                                                        • API String ID: 2695905019-1746183819
                                                        • Opcode ID: 00a5cba0b9facd935f4c6c0d34fff0ae797f34a00d935f609beca6da257f3e69
                                                        • Instruction ID: 27224b8761bf0168294d3008b29e2c90a2481d5546a0406e0036aca5b1ecb630
                                                        • Opcode Fuzzy Hash: 00a5cba0b9facd935f4c6c0d34fff0ae797f34a00d935f609beca6da257f3e69
                                                        • Instruction Fuzzy Hash: 74F0A7704249145B82206B78BC0D4BBBB6C9F01374F205742F875E20F0EBF09958C595

                                                        Control-flow Graph

                                                        APIs
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00DD2B6B
                                                          • Part of subcall function 00DD3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00EA1418,?,00DD2E7F,?,?,?,00000000), ref: 00DD3A78
                                                          • Part of subcall function 00DD9CB3: _wcslen.LIBCMT ref: 00DD9CBD
                                                        • GetForegroundWindow.USER32(runas,?,?,?,?,?,00E92224), ref: 00E12C10
                                                        • ShellExecuteW.SHELL32(00000000,?,?,00E92224), ref: 00E12C17
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                        • String ID: runas
                                                        • API String ID: 448630720-4000483414
                                                        • Opcode ID: 996510f5c21b95db9c61b40601fa30b8d36a4e517e3ac105cf6be130fa6d6244
                                                        • Instruction ID: 2d7789ba1f940867f896f9ea03f89340b9804bb545bbf8c29bfe4d42daae648b
                                                        • Opcode Fuzzy Hash: 996510f5c21b95db9c61b40601fa30b8d36a4e517e3ac105cf6be130fa6d6244
                                                        • Instruction Fuzzy Hash: 0C11B4312083416ACB04FF64EC529BEBBA4DBE9740F04242FF192662A2CF619949D733

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1249 df4ce8-df4cf4 call e0360c 1252 df4d16-df4d22 call df4d6d ExitProcess 1249->1252 1253 df4cf6-df4d04 GetPEB 1249->1253 1253->1252 1254 df4d06-df4d10 GetCurrentProcess TerminateProcess 1253->1254 1254->1252
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(00E028E9,(,00DF4CBE,00000000,00E988B8,0000000C,00DF4E15,(,00000002,00000000,?,00E028E9,00000003,00E02DF7,?,?), ref: 00DF4D09
                                                        • TerminateProcess.KERNEL32(00000000,?,00E028E9,00000003,00E02DF7,?,?,?,00DFE6D1,?,00E98A48,00000010,00DD4F4A,?,?,00000000), ref: 00DF4D10
                                                        • ExitProcess.KERNEL32 ref: 00DF4D22
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Process$CurrentExitTerminate
                                                        • String ID: (
                                                        • API String ID: 1703294689-2063206799
                                                        • Opcode ID: 737810e764ce698b84f22b025fe5752b24d9ea5dea54b27356a41651abfd1d26
                                                        • Instruction ID: 6c45ae6a58493754a4872498f4bc7ac7bb0c830a89d20b2f0bc16cc5311288b8
                                                        • Opcode Fuzzy Hash: 737810e764ce698b84f22b025fe5752b24d9ea5dea54b27356a41651abfd1d26
                                                        • Instruction Fuzzy Hash: 6CE04631000148BFCF11AF61ED09A6A3F69EB81781B258014FD54AA222CB75DD42CAA0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: BuffCharUpper
                                                        • String ID: p#
                                                        • API String ID: 3964851224-4182048217
                                                        • Opcode ID: 44cfc82897aed8eac4c99aec3bda0b8b01592b8494d562b4e01af89fdf406db2
                                                        • Instruction ID: 5de9e962b9d6c61994f0c14339a409e70bcbc85e20060e7c0e5bd18ec8a1f130
                                                        • Opcode Fuzzy Hash: 44cfc82897aed8eac4c99aec3bda0b8b01592b8494d562b4e01af89fdf406db2
                                                        • Instruction Fuzzy Hash: 4EA25C706183519FC724DF18C480B2ABBE1FF89304F14996EE99A9B352D771EC45CBA2

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 0 e5aff9-e5b056 call df2340 3 e5b094-e5b098 0->3 4 e5b058-e5b06b call ddb567 0->4 5 e5b0dd-e5b0e0 3->5 6 e5b09a-e5b0bb call ddb567 * 2 3->6 15 e5b06d-e5b092 call ddb567 * 2 4->15 16 e5b0c8 4->16 8 e5b0f5-e5b119 call dd7510 call dd7620 5->8 9 e5b0e2-e5b0e5 5->9 30 e5b0bf-e5b0c4 6->30 32 e5b11f-e5b178 call dd7510 call dd7620 call dd7510 call dd7620 call dd7510 call dd7620 8->32 33 e5b1d8-e5b1e0 8->33 12 e5b0e8-e5b0ed call ddb567 9->12 12->8 15->30 20 e5b0cb-e5b0cf 16->20 26 e5b0d1-e5b0d7 20->26 27 e5b0d9-e5b0db 20->27 26->12 27->5 27->8 30->5 34 e5b0c6 30->34 80 e5b1a6-e5b1d6 GetSystemDirectoryW call defe0b GetSystemDirectoryW 32->80 81 e5b17a-e5b195 call dd7510 call dd7620 32->81 35 e5b1e2-e5b1fd call dd7510 call dd7620 33->35 36 e5b20a-e5b238 GetCurrentDirectoryW call defe0b GetCurrentDirectoryW 33->36 34->20 35->36 50 e5b1ff-e5b208 call df4963 35->50 45 e5b23c 36->45 48 e5b240-e5b244 45->48 51 e5b275-e5b285 call e400d9 48->51 52 e5b246-e5b270 call dd9c6e * 3 48->52 50->36 50->51 64 e5b287-e5b289 51->64 65 e5b28b-e5b2e1 call e407c0 call e406e6 call e405a7 51->65 52->51 68 e5b2ee-e5b2f2 64->68 65->68 96 e5b2e3 65->96 70 e5b2f8-e5b321 call e311c8 68->70 71 e5b39a-e5b3be CreateProcessW 68->71 85 e5b323-e5b328 call e31201 70->85 86 e5b32a call e314ce 70->86 78 e5b3c1-e5b3d4 call defe14 * 2 71->78 101 e5b3d6-e5b3e8 78->101 102 e5b42f-e5b43d CloseHandle 78->102 80->45 81->80 107 e5b197-e5b1a0 call df4963 81->107 100 e5b32f-e5b33c call df4963 85->100 86->100 96->68 115 e5b347-e5b357 call df4963 100->115 116 e5b33e-e5b345 100->116 105 e5b3ed-e5b3fc 101->105 106 e5b3ea 101->106 109 e5b49c 102->109 110 e5b43f-e5b444 102->110 111 e5b401-e5b42a GetLastError call dd630c call ddcfa0 105->111 112 e5b3fe 105->112 106->105 107->48 107->80 113 e5b4a0-e5b4a4 109->113 117 e5b446-e5b44c CloseHandle 110->117 118 e5b451-e5b456 110->118 130 e5b4e5-e5b4f6 call e40175 111->130 112->111 122 e5b4a6-e5b4b0 113->122 123 e5b4b2-e5b4bc 113->123 133 e5b362-e5b372 call df4963 115->133 134 e5b359-e5b360 115->134 116->115 116->116 117->118 119 e5b463-e5b468 118->119 120 e5b458-e5b45e CloseHandle 118->120 127 e5b475-e5b49a call e409d9 call e5b536 119->127 128 e5b46a-e5b470 CloseHandle 119->128 120->119 122->130 131 e5b4c4-e5b4e3 call ddcfa0 CloseHandle 123->131 132 e5b4be 123->132 127->113 128->127 131->130 132->131 146 e5b374-e5b37b 133->146 147 e5b37d-e5b398 call defe14 * 3 133->147 134->133 134->134 146->146 146->147 147->78
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 00E5B198
                                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00E5B1B0
                                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00E5B1D4
                                                        • _wcslen.LIBCMT ref: 00E5B200
                                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00E5B214
                                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00E5B236
                                                        • _wcslen.LIBCMT ref: 00E5B332
                                                          • Part of subcall function 00E405A7: GetStdHandle.KERNEL32(000000F6), ref: 00E405C6
                                                        • _wcslen.LIBCMT ref: 00E5B34B
                                                        • _wcslen.LIBCMT ref: 00E5B366
                                                        • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00E5B3B6
                                                        • GetLastError.KERNEL32(00000000), ref: 00E5B407
                                                        • CloseHandle.KERNEL32(?), ref: 00E5B439
                                                        • CloseHandle.KERNEL32(00000000), ref: 00E5B44A
                                                        • CloseHandle.KERNEL32(00000000), ref: 00E5B45C
                                                        • CloseHandle.KERNEL32(00000000), ref: 00E5B46E
                                                        • CloseHandle.KERNEL32(?), ref: 00E5B4E3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 2178637699-0
                                                        • Opcode ID: 13b1e5eff262df6edc6ff0c8a32434a1a7edfebc70ddd60bd2467eacbc8b0727
                                                        • Instruction ID: a734e09c1a46f1f0967e70b4a06689294388eaf54ef13152b8aae055768cfe17
                                                        • Opcode Fuzzy Hash: 13b1e5eff262df6edc6ff0c8a32434a1a7edfebc70ddd60bd2467eacbc8b0727
                                                        • Instruction Fuzzy Hash: C7F18D315043409FC724EF24D891B6ABBE1EF85714F14995EF895AB2A2DB71EC04CB62
                                                        APIs
                                                        • GetInputState.USER32 ref: 00DDD807
                                                        • timeGetTime.WINMM ref: 00DDDA07
                                                        • Sleep.KERNELBASE(0000000A), ref: 00DDDBB1
                                                        • Sleep.KERNEL32(0000000A), ref: 00E22B76
                                                        • GetExitCodeProcess.KERNEL32(?,?), ref: 00E22C11
                                                        • WaitForSingleObject.KERNEL32(?,00000000), ref: 00E22C29
                                                        • CloseHandle.KERNEL32(?), ref: 00E22C3D
                                                        • Sleep.KERNEL32(?,CCCCCCCC,00000000), ref: 00E22CA9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Sleep$CloseCodeExitHandleInputObjectProcessSingleStateTimeWaittime
                                                        • String ID:
                                                        • API String ID: 388478766-0
                                                        • Opcode ID: 92758154ccc8dc6146633308467707783f19bb06bce7f180f36ae2479086f9c8
                                                        • Instruction ID: 819e141a305dc64511c0c4f23b0dfc7725e8bde3ab2a3d35adbb29678ec04c04
                                                        • Opcode Fuzzy Hash: 92758154ccc8dc6146633308467707783f19bb06bce7f180f36ae2479086f9c8
                                                        • Instruction Fuzzy Hash: 88420370604341EFDB28CF24D854B6AB7E2FF46304F18955EE596A7391C771E848CBA2

                                                        Control-flow Graph

                                                        APIs
                                                        • GetSysColorBrush.USER32(0000000F), ref: 00DD2D07
                                                        • RegisterClassExW.USER32(00000030), ref: 00DD2D31
                                                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00DD2D42
                                                        • InitCommonControlsEx.COMCTL32(?), ref: 00DD2D5F
                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00DD2D6F
                                                        • LoadIconW.USER32(000000A9), ref: 00DD2D85
                                                        • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00DD2D94
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                        • API String ID: 2914291525-1005189915
                                                        • Opcode ID: d92d19f0e496f1e429ce1ac760c8d56d141939c193aafea30109c08fa7b702e5
                                                        • Instruction ID: 6d866f642432dbffb9062034611c72e9a4f06ddb25602c751060dd812a5215bb
                                                        • Opcode Fuzzy Hash: d92d19f0e496f1e429ce1ac760c8d56d141939c193aafea30109c08fa7b702e5
                                                        • Instruction Fuzzy Hash: 592124B0901318AFDB00DFA6EC49BEEBBB4FB48740F10415AF551B62A0D7B12548CF90

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 461 e1065b-e1068b call e1042f 464 e106a6-e106b2 call e05221 461->464 465 e1068d-e10698 call dff2c6 461->465 471 e106b4-e106c9 call dff2c6 call dff2d9 464->471 472 e106cb-e10714 call e1039a 464->472 470 e1069a-e106a1 call dff2d9 465->470 481 e1097d-e10983 470->481 471->470 479 e10781-e1078a GetFileType 472->479 480 e10716-e1071f 472->480 485 e107d3-e107d6 479->485 486 e1078c-e107bd GetLastError call dff2a3 CloseHandle 479->486 483 e10721-e10725 480->483 484 e10756-e1077c GetLastError call dff2a3 480->484 483->484 490 e10727-e10754 call e1039a 483->490 484->470 488 e107d8-e107dd 485->488 489 e107df-e107e5 485->489 486->470 500 e107c3-e107ce call dff2d9 486->500 493 e107e9-e10837 call e0516a 488->493 489->493 494 e107e7 489->494 490->479 490->484 503 e10847-e1086b call e1014d 493->503 504 e10839-e10845 call e105ab 493->504 494->493 500->470 511 e1086d 503->511 512 e1087e-e108c1 503->512 504->503 510 e1086f-e10879 call e086ae 504->510 510->481 511->510 513 e108c3-e108c7 512->513 514 e108e2-e108f0 512->514 513->514 516 e108c9-e108dd 513->516 517 e108f6-e108fa 514->517 518 e1097b 514->518 516->514 517->518 520 e108fc-e1092f CloseHandle call e1039a 517->520 518->481 523 e10931-e1095d GetLastError call dff2a3 call e05333 520->523 524 e10963-e10977 520->524 523->524 524->518
                                                        APIs
                                                          • Part of subcall function 00E1039A: CreateFileW.KERNELBASE(00000000,00000000,?,00E10704,?,?,00000000,?,00E10704,00000000,0000000C), ref: 00E103B7
                                                        • GetLastError.KERNEL32 ref: 00E1076F
                                                        • __dosmaperr.LIBCMT ref: 00E10776
                                                        • GetFileType.KERNELBASE(00000000), ref: 00E10782
                                                        • GetLastError.KERNEL32 ref: 00E1078C
                                                        • __dosmaperr.LIBCMT ref: 00E10795
                                                        • CloseHandle.KERNEL32(00000000), ref: 00E107B5
                                                        • CloseHandle.KERNEL32(?), ref: 00E108FF
                                                        • GetLastError.KERNEL32 ref: 00E10931
                                                        • __dosmaperr.LIBCMT ref: 00E10938
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                        • String ID: H
                                                        • API String ID: 4237864984-2852464175
                                                        • Opcode ID: 89cc51d784ae14120f85945472b87ac3f44d5c74aab76caf0d20630932e97993
                                                        • Instruction ID: bde267797e6b160a8ae78703b58ed96ed6d89caf0122bca8e5e39d7530bd6c08
                                                        • Opcode Fuzzy Hash: 89cc51d784ae14120f85945472b87ac3f44d5c74aab76caf0d20630932e97993
                                                        • Instruction Fuzzy Hash: 38A12532A041088FDF19AF68D851BEE7BA0EB4A324F14515AF815FB3D1C7719C96CBA1

                                                        Control-flow Graph

                                                        APIs
                                                          • Part of subcall function 00DD3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00EA1418,?,00DD2E7F,?,?,?,00000000), ref: 00DD3A78
                                                          • Part of subcall function 00DD3357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00DD3379
                                                        • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00DD356A
                                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00E1318D
                                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00E131CE
                                                        • RegCloseKey.ADVAPI32(?), ref: 00E13210
                                                        • _wcslen.LIBCMT ref: 00E13277
                                                        • _wcslen.LIBCMT ref: 00E13286
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                        • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                        • API String ID: 98802146-2727554177
                                                        • Opcode ID: 66504904f4c1a981c7fd9fae49edb25076f4afadf9f69c12060980fc8c209833
                                                        • Instruction ID: 1615bdad14db6053b4c66b323d6751619dc0461b3386ffb0aef67c50a4c44f01
                                                        • Opcode Fuzzy Hash: 66504904f4c1a981c7fd9fae49edb25076f4afadf9f69c12060980fc8c209833
                                                        • Instruction Fuzzy Hash: 797191715043019EC714EF6AEC518ABBBE8FF9A740B40542EF645B3260EB71A94CCB71

                                                        Control-flow Graph

                                                        APIs
                                                        • GetSysColorBrush.USER32(0000000F), ref: 00DD2B8E
                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 00DD2B9D
                                                        • LoadIconW.USER32(00000063), ref: 00DD2BB3
                                                        • LoadIconW.USER32(000000A4), ref: 00DD2BC5
                                                        • LoadIconW.USER32(000000A2), ref: 00DD2BD7
                                                        • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00DD2BEF
                                                        • RegisterClassExW.USER32(?), ref: 00DD2C40
                                                          • Part of subcall function 00DD2CD4: GetSysColorBrush.USER32(0000000F), ref: 00DD2D07
                                                          • Part of subcall function 00DD2CD4: RegisterClassExW.USER32(00000030), ref: 00DD2D31
                                                          • Part of subcall function 00DD2CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00DD2D42
                                                          • Part of subcall function 00DD2CD4: InitCommonControlsEx.COMCTL32(?), ref: 00DD2D5F
                                                          • Part of subcall function 00DD2CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00DD2D6F
                                                          • Part of subcall function 00DD2CD4: LoadIconW.USER32(000000A9), ref: 00DD2D85
                                                          • Part of subcall function 00DD2CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00DD2D94
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                        • String ID: #$0$AutoIt v3
                                                        • API String ID: 423443420-4155596026
                                                        • Opcode ID: 28539540433664fc8920b5ea966b556cda848ac313e3bcb03244e12fb5be14d1
                                                        • Instruction ID: d75bb48863f9b8daf4449e533c7293906e19058ad8a4580f037b970086f266a5
                                                        • Opcode Fuzzy Hash: 28539540433664fc8920b5ea966b556cda848ac313e3bcb03244e12fb5be14d1
                                                        • Instruction Fuzzy Hash: 5C212574A00328AFDB109FA6EC45BAA7FB4FB5DB90F11009AE504B66A0D3B1255C8F90

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 602 dd3170-dd3185 603 dd31e5-dd31e7 602->603 604 dd3187-dd318a 602->604 603->604 605 dd31e9 603->605 606 dd318c-dd3193 604->606 607 dd31eb 604->607 608 dd31d0-dd31d8 DefWindowProcW 605->608 611 dd3199-dd319e 606->611 612 dd3265-dd326d PostQuitMessage 606->612 609 e12dfb-e12e23 call dd18e2 call dee499 607->609 610 dd31f1-dd31f6 607->610 613 dd31de-dd31e4 608->613 645 e12e28-e12e2f 609->645 615 dd321d-dd3244 SetTimer RegisterWindowMessageW 610->615 616 dd31f8-dd31fb 610->616 618 dd31a4-dd31a8 611->618 619 e12e7c-e12e90 call e3bf30 611->619 614 dd3219-dd321b 612->614 614->613 615->614 623 dd3246-dd3251 CreatePopupMenu 615->623 620 dd3201-dd320f KillTimer call dd30f2 616->620 621 e12d9c-e12d9f 616->621 624 dd31ae-dd31b3 618->624 625 e12e68-e12e72 call e3c161 618->625 619->614 637 e12e96 619->637 641 dd3214 call dd3c50 620->641 628 e12da1-e12da5 621->628 629 e12dd7-e12df6 MoveWindow 621->629 623->614 633 dd31b9-dd31be 624->633 634 e12e4d-e12e54 624->634 642 e12e77 625->642 638 e12da7-e12daa 628->638 639 e12dc6-e12dd2 SetFocus 628->639 629->614 635 dd31c4-dd31ca 633->635 636 dd3253-dd3263 call dd326f 633->636 634->608 640 e12e5a-e12e63 call e30ad7 634->640 635->608 635->645 636->614 637->608 638->635 646 e12db0-e12dc1 call dd18e2 638->646 639->614 640->608 641->614 642->614 645->608 650 e12e35-e12e48 call dd30f2 call dd3837 645->650 646->614 650->608
                                                        APIs
                                                        • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00DD316A,?,?), ref: 00DD31D8
                                                        • KillTimer.USER32(?,00000001,?,?,?,?,?,00DD316A,?,?), ref: 00DD3204
                                                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00DD3227
                                                        • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00DD316A,?,?), ref: 00DD3232
                                                        • CreatePopupMenu.USER32 ref: 00DD3246
                                                        • PostQuitMessage.USER32(00000000), ref: 00DD3267
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                        • String ID: TaskbarCreated
                                                        • API String ID: 129472671-2362178303
                                                        • Opcode ID: 00da0d15e37c8e25e57ca7c03a7a691820fe19e1051e0c08ad0f323254b0754d
                                                        • Instruction ID: aef54a302a374f4fe0a6c51019cc767fed2664381b5a38376128eeb5b0ba3b74
                                                        • Opcode Fuzzy Hash: 00da0d15e37c8e25e57ca7c03a7a691820fe19e1051e0c08ad0f323254b0754d
                                                        • Instruction Fuzzy Hash: 9E412A35A00201AFDF141F78AC0E7BA3A59E74A344F18115BF552B53A1C7A1EA48D777

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 658 dd1410-dd1449 659 dd144f-dd1465 mciSendStringW 658->659 660 e124b8-e124b9 DestroyWindow 658->660 661 dd146b-dd1473 659->661 662 dd16c6-dd16d3 659->662 663 e124c4-e124d1 660->663 661->663 664 dd1479-dd1488 call dd182e 661->664 665 dd16f8-dd16ff 662->665 666 dd16d5-dd16f0 UnregisterHotKey 662->666 667 e12500-e12507 663->667 668 e124d3-e124d6 663->668 679 dd148e-dd1496 664->679 680 e1250e-e1251a 664->680 665->661 671 dd1705 665->671 666->665 670 dd16f2-dd16f3 call dd10d0 666->670 667->663 676 e12509 667->676 672 e124e2-e124e5 FindClose 668->672 673 e124d8-e124e0 call dd6246 668->673 670->665 671->662 678 e124eb-e124f8 672->678 673->678 676->680 678->667 682 e124fa-e124fb call e432b1 678->682 683 dd149c-dd14c1 call ddcfa0 679->683 684 e12532-e1253f 679->684 685 e12524-e1252b 680->685 686 e1251c-e1251e FreeLibrary 680->686 682->667 696 dd14f8-dd1503 CoUninitialize 683->696 697 dd14c3 683->697 687 e12541-e1255e VirtualFree 684->687 688 e12566-e1256d 684->688 685->680 691 e1252d 685->691 686->685 687->688 692 e12560-e12561 call e43317 687->692 688->684 693 e1256f 688->693 691->684 692->688 699 e12574-e12578 693->699 698 dd1509-dd150e 696->698 696->699 700 dd14c6-dd14f6 call dd1a05 call dd19ae 697->700 701 e12589-e12596 call e432eb 698->701 702 dd1514-dd151e 698->702 699->698 703 e1257e-e12584 699->703 700->696 716 e12598 701->716 705 dd1524-dd15a5 call dd988f call dd1944 call dd17d5 call defe14 call dd177c call dd988f call ddcfa0 call dd17fe call defe14 702->705 706 dd1707-dd1714 call def80e 702->706 703->698 720 e1259d-e125bf call defdcd 705->720 748 dd15ab-dd15cf call defe14 705->748 706->705 719 dd171a 706->719 716->720 719->706 726 e125c1 720->726 729 e125c6-e125e8 call defdcd 726->729 735 e125ea 729->735 739 e125ef-e12611 call defdcd 735->739 745 e12613 739->745 747 e12618-e12625 call e364d4 745->747 753 e12627 747->753 748->729 754 dd15d5-dd15f9 call defe14 748->754 756 e1262c-e12639 call deac64 753->756 754->739 759 dd15ff-dd1619 call defe14 754->759 762 e1263b 756->762 759->747 764 dd161f-dd1643 call dd17d5 call defe14 759->764 766 e12640-e1264d call e43245 762->766 764->756 773 dd1649-dd1651 764->773 772 e1264f 766->772 775 e12654-e12661 call e432cc 772->775 773->766 774 dd1657-dd1675 call dd988f call dd190a 773->774 774->775 784 dd167b-dd1689 774->784 780 e12663 775->780 783 e12668-e12675 call e432cc 780->783 789 e12677 783->789 784->783 786 dd168f-dd16c5 call dd988f * 3 call dd1876 784->786 789->789
                                                        APIs
                                                        • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00DD1459
                                                        • CoUninitialize.COMBASE ref: 00DD14F8
                                                        • UnregisterHotKey.USER32(?), ref: 00DD16DD
                                                        • DestroyWindow.USER32(?), ref: 00E124B9
                                                        • FreeLibrary.KERNEL32(?), ref: 00E1251E
                                                        • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00E1254B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                        • String ID: close all
                                                        • API String ID: 469580280-3243417748
                                                        • Opcode ID: 69e1e7f5ec3d1fe86e92ef9be87c1e3ce8d557ebc36233c0fa0300001daaaf3b
                                                        • Instruction ID: 49c926ee88a6d049212f45e4ad8e1c8c5e9a7add3e2122ecd0b4b20da0839453
                                                        • Opcode Fuzzy Hash: 69e1e7f5ec3d1fe86e92ef9be87c1e3ce8d557ebc36233c0fa0300001daaaf3b
                                                        • Instruction Fuzzy Hash: 63D167347012129FCB29EF15D895A69F7A1FF45700F2452AEE54A7B261CB30EC62CF61

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 807 dd2c63-dd2cd3 CreateWindowExW * 2 ShowWindow * 2
                                                        APIs
                                                        • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00DD2C91
                                                        • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00DD2CB2
                                                        • ShowWindow.USER32(00000000,?,?,?,?,?,?,00DD1CAD,?), ref: 00DD2CC6
                                                        • ShowWindow.USER32(00000000,?,?,?,?,?,?,00DD1CAD,?), ref: 00DD2CCF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Window$CreateShow
                                                        • String ID: AutoIt v3$edit
                                                        • API String ID: 1584632944-3779509399
                                                        • Opcode ID: f8ebe9d47153645679eab4dc395437805f03f6c8ffd671be419156bbd79f8b6f
                                                        • Instruction ID: 67542444045d4b4a331476e446290831de55a0487f079337e77542463c25e6c2
                                                        • Opcode Fuzzy Hash: f8ebe9d47153645679eab4dc395437805f03f6c8ffd671be419156bbd79f8b6f
                                                        • Instruction Fuzzy Hash: 71F0D0755402907EEB311B277C09E7B2E7DD7CBFA0F11109AF900B2560C6A5285CDA70

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1238 dd3b1c-dd3b27 1239 dd3b99-dd3b9b 1238->1239 1240 dd3b29-dd3b2e 1238->1240 1241 dd3b8c-dd3b8f 1239->1241 1240->1239 1242 dd3b30-dd3b48 RegOpenKeyExW 1240->1242 1242->1239 1243 dd3b4a-dd3b69 RegQueryValueExW 1242->1243 1244 dd3b6b-dd3b76 1243->1244 1245 dd3b80-dd3b8b RegCloseKey 1243->1245 1246 dd3b78-dd3b7a 1244->1246 1247 dd3b90-dd3b97 1244->1247 1245->1241 1248 dd3b7e 1246->1248 1247->1248 1248->1245
                                                        APIs
                                                        • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00DD3B0F,SwapMouseButtons,00000004,?), ref: 00DD3B40
                                                        • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00DD3B0F,SwapMouseButtons,00000004,?), ref: 00DD3B61
                                                        • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00DD3B0F,SwapMouseButtons,00000004,?), ref: 00DD3B83
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: CloseOpenQueryValue
                                                        • String ID: Control Panel\Mouse
                                                        • API String ID: 3677997916-824357125
                                                        • Opcode ID: b07fab630a51955b91e22ad2dc1ec7efb744c41ece4c8006646cd6f738e73be1
                                                        • Instruction ID: 33912fad17b6e0ed7752a57a42704e6056ef38edbf018155d473654f4923dc66
                                                        • Opcode Fuzzy Hash: b07fab630a51955b91e22ad2dc1ec7efb744c41ece4c8006646cd6f738e73be1
                                                        • Instruction Fuzzy Hash: 81112AB5510208FFDB208FA5DC44AAFB7B8EF04784B15446BE845E7210D2719E449771
                                                        APIs
                                                        • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00E133A2
                                                          • Part of subcall function 00DD6B57: _wcslen.LIBCMT ref: 00DD6B6A
                                                        • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00DD3A04
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: IconLoadNotifyShell_String_wcslen
                                                        • String ID: Line:
                                                        • API String ID: 2289894680-1585850449
                                                        • Opcode ID: c71d05dc284e3296b69e44f4172519858b172e918c97020b9b673d68ce53d791
                                                        • Instruction ID: a6614c15424957c1abebb7389da7edee22b93a4dab07f91d04cba3d6fab498eb
                                                        • Opcode Fuzzy Hash: c71d05dc284e3296b69e44f4172519858b172e918c97020b9b673d68ce53d791
                                                        • Instruction Fuzzy Hash: 8F31E071508304AEC720EB24DC45BEBB7D8EB45710F04556BF5A9A2291EB70AA48CBF3
                                                        APIs
                                                        • GetOpenFileNameW.COMDLG32(?), ref: 00E12C8C
                                                          • Part of subcall function 00DD3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00DD3A97,?,?,00DD2E7F,?,?,?,00000000), ref: 00DD3AC2
                                                          • Part of subcall function 00DD2DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00DD2DC4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Name$Path$FileFullLongOpen
                                                        • String ID: X$`e
                                                        • API String ID: 779396738-4036142377
                                                        • Opcode ID: e020d88e85e5d007705fafd5f88c5552d60bbfd48447612e2f69178c40ad144d
                                                        • Instruction ID: a15fdbaf7d0854a4a3f233520e3b3b929d104a0be3909228d3d591623d99bec6
                                                        • Opcode Fuzzy Hash: e020d88e85e5d007705fafd5f88c5552d60bbfd48447612e2f69178c40ad144d
                                                        • Instruction Fuzzy Hash: FD219371A002589FCF41EF94C845BEE7BF8EF89304F00805AE545B7341DBB49A898BB1
                                                        APIs
                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 00DF0668
                                                          • Part of subcall function 00DF32A4: RaiseException.KERNEL32(?,?,?,00DF068A,?,00EA1444,?,?,?,?,?,?,00DF068A,00DD1129,00E98738,00DD1129), ref: 00DF3304
                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 00DF0685
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throw$ExceptionRaise
                                                        • String ID: Unknown exception
                                                        • API String ID: 3476068407-410509341
                                                        • Opcode ID: 5907193ae6491566d7149d58b6cb25c458de8a6f92bd24a09e2d92a295d4f4c7
                                                        • Instruction ID: 9ca51be359543ab02ae14f9a4ee44f2ba02a589160785ab704ba09fe7bad8f2f
                                                        • Opcode Fuzzy Hash: 5907193ae6491566d7149d58b6cb25c458de8a6f92bd24a09e2d92a295d4f4c7
                                                        • Instruction Fuzzy Hash: 4AF0AF2490024D778F00BAA5EC46DBE7F6C9E40350B65C131BA14DA5A2EF71EA2586B0
                                                        APIs
                                                          • Part of subcall function 00DD1BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00DD1BF4
                                                          • Part of subcall function 00DD1BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00DD1BFC
                                                          • Part of subcall function 00DD1BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00DD1C07
                                                          • Part of subcall function 00DD1BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00DD1C12
                                                          • Part of subcall function 00DD1BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00DD1C1A
                                                          • Part of subcall function 00DD1BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00DD1C22
                                                          • Part of subcall function 00DD1B4A: RegisterWindowMessageW.USER32(00000004,?,00DD12C4), ref: 00DD1BA2
                                                        • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00DD136A
                                                        • OleInitialize.OLE32 ref: 00DD1388
                                                        • CloseHandle.KERNEL32(00000000,00000000), ref: 00E124AB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                        • String ID:
                                                        • API String ID: 1986988660-0
                                                        • Opcode ID: 36582232b6b7c795bf68eec6ff6766a1e6a4e905bf274b6dd24d5da538dbce75
                                                        • Instruction ID: 92a93c9b372a1904b7aa59de339c9326a2fc80522e168fc77a8aa14222effc7e
                                                        • Opcode Fuzzy Hash: 36582232b6b7c795bf68eec6ff6766a1e6a4e905bf274b6dd24d5da538dbce75
                                                        • Instruction Fuzzy Hash: 85719CB8D052508EC388EF7BA8466653AE0FBCF384F5491AAD05AF7361E7346449CF61
                                                        APIs
                                                          • Part of subcall function 00DD3923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00DD3A04
                                                        • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00E3C259
                                                        • KillTimer.USER32(?,00000001,?,?), ref: 00E3C261
                                                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00E3C270
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: IconNotifyShell_Timer$Kill
                                                        • String ID:
                                                        • API String ID: 3500052701-0
                                                        • Opcode ID: 67d7f187be33e2674f3c2f90287819f27d5ef95cdc8ac107e665ad061b320db9
                                                        • Instruction ID: babf2b02903e8176d61ad7218657eaefeb4788b266b5c52d1bb9a63d2026d070
                                                        • Opcode Fuzzy Hash: 67d7f187be33e2674f3c2f90287819f27d5ef95cdc8ac107e665ad061b320db9
                                                        • Instruction Fuzzy Hash: 8C31B170904744AFEB229F749859BE7BFFC9B06308F10149AD2DAB7251C774AA88CB51
                                                        APIs
                                                        • CloseHandle.KERNELBASE(00000000,00000000,?,?,00E085CC,?,00E98CC8,0000000C), ref: 00E08704
                                                        • GetLastError.KERNEL32(?,00E085CC,?,00E98CC8,0000000C), ref: 00E0870E
                                                        • __dosmaperr.LIBCMT ref: 00E08739
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: CloseErrorHandleLast__dosmaperr
                                                        • String ID:
                                                        • API String ID: 2583163307-0
                                                        • Opcode ID: ab8e8a2d2f554448294c6f80a7a0fb938f3f0ed91c541ee633d685c633b07d4b
                                                        • Instruction ID: c5e399084b77517d12d1fabc3b20b25c60b4332a4dff81ab188f56725f4ce915
                                                        • Opcode Fuzzy Hash: ab8e8a2d2f554448294c6f80a7a0fb938f3f0ed91c541ee633d685c633b07d4b
                                                        • Instruction Fuzzy Hash: C00182336042201AC62063347A4577F2B854B9277CF3A3119F844FB1D7DEA6CCC18650
                                                        APIs
                                                        • TranslateMessage.USER32(?), ref: 00DDDB7B
                                                        • DispatchMessageW.USER32(?), ref: 00DDDB89
                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00DDDB9F
                                                        • Sleep.KERNELBASE(0000000A), ref: 00DDDBB1
                                                        • TranslateAcceleratorW.USER32(?,?,?), ref: 00E21CC9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                                        • String ID:
                                                        • API String ID: 3288985973-0
                                                        • Opcode ID: d30280e754eed2264d34c22a111fdfac480d223c0c743ab48bf92455109c57df
                                                        • Instruction ID: 16648c3daebc9c1f1bb952ac54c0ba344ca2d06b8e681d1015d816f48dcacfd2
                                                        • Opcode Fuzzy Hash: d30280e754eed2264d34c22a111fdfac480d223c0c743ab48bf92455109c57df
                                                        • Instruction Fuzzy Hash: B0F05E306443409BEB34DB71EC49FAA73BDEB89354F20455AE68AE31C0DB74A44CDB25
                                                        APIs
                                                        • __Init_thread_footer.LIBCMT ref: 00DE17F6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Init_thread_footer
                                                        • String ID: CALL
                                                        • API String ID: 1385522511-4196123274
                                                        • Opcode ID: 328807ac656f584486cbebca45e5032eebd180bd4f9773aa3ce92a7256edcd38
                                                        • Instruction ID: 9d758f6317af6c911e21a4af460fefc9eccf9ea0326a6a036e37074308a30eae
                                                        • Opcode Fuzzy Hash: 328807ac656f584486cbebca45e5032eebd180bd4f9773aa3ce92a7256edcd38
                                                        • Instruction Fuzzy Hash: E2228B746083819FC714EF15D880A2ABBF1FF89314F28895DF4969B3A1D771E845CBA2
                                                        APIs
                                                        • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00DD3908
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: IconNotifyShell_
                                                        • String ID:
                                                        • API String ID: 1144537725-0
                                                        • Opcode ID: d63aec2146a93b264685cec1177b83dc321c1a13b43ab98ce952e27a9a34a814
                                                        • Instruction ID: 509b66664703f0af3ef16484d6b201a4efd3a04d7e712ff9eff94f09777a0008
                                                        • Opcode Fuzzy Hash: d63aec2146a93b264685cec1177b83dc321c1a13b43ab98ce952e27a9a34a814
                                                        • Instruction Fuzzy Hash: 0D3193B05043019FD720DF65D885797BBE4FB49748F00096EF5E9A7340E7B1AA48DB62
                                                        APIs
                                                        • timeGetTime.WINMM ref: 00DEF661
                                                          • Part of subcall function 00DDD730: GetInputState.USER32 ref: 00DDD807
                                                        • Sleep.KERNEL32(00000000), ref: 00E2F2DE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: InputSleepStateTimetime
                                                        • String ID:
                                                        • API String ID: 4149333218-0
                                                        • Opcode ID: 18997e215bcb0d38338d9a05a6b14aa43c70a40ee3c57848a5a4867a53119f61
                                                        • Instruction ID: 5e1dba4b0dc74f4c6d216e00d8b079c13d4d8127da43a2dedcbcff94cfb258ac
                                                        • Opcode Fuzzy Hash: 18997e215bcb0d38338d9a05a6b14aa43c70a40ee3c57848a5a4867a53119f61
                                                        • Instruction Fuzzy Hash: DFF082312402059FD310EF75E445B6AB7E4EF46760F00002BE859D7360DB70A800CBB0
                                                        APIs
                                                          • Part of subcall function 00DD4E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00DD4EDD,?,00EA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DD4E9C
                                                          • Part of subcall function 00DD4E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00DD4EAE
                                                          • Part of subcall function 00DD4E90: FreeLibrary.KERNEL32(00000000,?,?,00DD4EDD,?,00EA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DD4EC0
                                                        • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00EA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DD4EFD
                                                          • Part of subcall function 00DD4E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00E13CDE,?,00EA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DD4E62
                                                          • Part of subcall function 00DD4E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00DD4E74
                                                          • Part of subcall function 00DD4E59: FreeLibrary.KERNEL32(00000000,?,?,00E13CDE,?,00EA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DD4E87
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Library$Load$AddressFreeProc
                                                        • String ID:
                                                        • API String ID: 2632591731-0
                                                        • Opcode ID: 9aa98c5fc391dee20c472b28ee433885338f1952172110ddbe5a9f38ac1b0789
                                                        • Instruction ID: ed4982335d82810e3926c5d153c04eb7aba8f0530669e9d39910a4d42fe07eee
                                                        • Opcode Fuzzy Hash: 9aa98c5fc391dee20c472b28ee433885338f1952172110ddbe5a9f38ac1b0789
                                                        • Instruction Fuzzy Hash: DD11C132600205ABCB14AF70E816BAD77A5EF44710F20842FF582B62E1EE709A4597B0
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: __wsopen_s
                                                        • String ID:
                                                        • API String ID: 3347428461-0
                                                        • Opcode ID: abb1c0d04764e4d8e21cd460d05cbe20a0fa3444f686b3da5581242095b0d195
                                                        • Instruction ID: 2af31f0dcabe9f6eed8a0bf9699eb364c2d24ef209baf1b5cb6ea4b443141e74
                                                        • Opcode Fuzzy Hash: abb1c0d04764e4d8e21cd460d05cbe20a0fa3444f686b3da5581242095b0d195
                                                        • Instruction Fuzzy Hash: 2811187590410AAFCB05DF58EA419DE7BF5EF48314F104059F818AB352DA31EA51CBA5
                                                        APIs
                                                          • Part of subcall function 00E04C7D: RtlAllocateHeap.NTDLL(00000008,00DD1129,00000000,?,00E02E29,00000001,00000364,?,?,?,00DFF2DE,00E03863,00EA1444,?,00DEFDF5,?), ref: 00E04CBE
                                                        • _free.LIBCMT ref: 00E0506C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap_free
                                                        • String ID:
                                                        • API String ID: 614378929-0
                                                        • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                        • Instruction ID: 14227c30c58151d3e87e5d0d171811a8ad99b47cb32844130227fc45fbfed90b
                                                        • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                        • Instruction Fuzzy Hash: 11012B732047055BE3218E65988595AFBECFB85370F65091DE194A32C0E6306945CA74
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                        • Instruction ID: 363646340f87ddc071338b998af79db296f4ea8ab97d812d19404f585507afa1
                                                        • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                        • Instruction Fuzzy Hash: A9F04432500A1C96CA323E699C09B7A33D98F62330F168B19FB60E61E2CF70D80186B5
                                                        APIs
                                                        • RtlAllocateHeap.NTDLL(00000008,00DD1129,00000000,?,00E02E29,00000001,00000364,?,?,?,00DFF2DE,00E03863,00EA1444,?,00DEFDF5,?), ref: 00E04CBE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1279760036-0
                                                        • Opcode ID: a1a9f0195b35e51a095e6f43c3c528602d45b379ff2f176c7eed1af16716d350
                                                        • Instruction ID: 4ffc06ea8ff8942cc2a496cf12b2d3eb0e39ca43aec5e82460657a643986e6bf
                                                        • Opcode Fuzzy Hash: a1a9f0195b35e51a095e6f43c3c528602d45b379ff2f176c7eed1af16716d350
                                                        • Instruction Fuzzy Hash: 76F0B4F160322867FB215F629E49F6BB788EF417A4F1A9115FA19BA1C0CA70D88046F0
                                                        APIs
                                                        • RtlAllocateHeap.NTDLL(00000000,?,00EA1444,?,00DEFDF5,?,?,00DDA976,00000010,00EA1440,00DD13FC,?,00DD13C6,?,00DD1129), ref: 00E03852
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1279760036-0
                                                        • Opcode ID: 78f875e6644a8e6a8ee9f4c921a4293d63049452e8ef6287725b449c7589dbb9
                                                        • Instruction ID: 71f07795562c72540d373e0473e824fd002a3528c67e3883e5426050f2ca786b
                                                        • Opcode Fuzzy Hash: 78f875e6644a8e6a8ee9f4c921a4293d63049452e8ef6287725b449c7589dbb9
                                                        • Instruction Fuzzy Hash: 46E0E5311022285AD7252A779C00BAB364CEF427B4F1691A0FD05B64C0CB11DE8181F0
                                                        APIs
                                                        • FreeLibrary.KERNEL32(?,?,00EA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DD4F6D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: FreeLibrary
                                                        • String ID:
                                                        • API String ID: 3664257935-0
                                                        • Opcode ID: 2e7631762d8c0c14f01c5254ab9afe492cc9ff917026fd67975d7b3978b77cfa
                                                        • Instruction ID: ff4994ab6ee3fb1e13cd3e102db91a5bf45ca96b8f0e83f4e52e30faecae9547
                                                        • Opcode Fuzzy Hash: 2e7631762d8c0c14f01c5254ab9afe492cc9ff917026fd67975d7b3978b77cfa
                                                        • Instruction Fuzzy Hash: 06F01571109752CFDB349F74E490822BBF4AF14329324896FE2EA82621CB319848DB20
                                                        APIs
                                                        • Shell_NotifyIconW.SHELL32(00000002,?), ref: 00DD314E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: IconNotifyShell_
                                                        • String ID:
                                                        • API String ID: 1144537725-0
                                                        • Opcode ID: d5540450ab3ce10b9341be317a065a8cf487e71a4068b896f9294537146c897d
                                                        • Instruction ID: dcc5f42844253a5f5d69a3f55961d1f930177a9038fbf2f784240363eac229f5
                                                        • Opcode Fuzzy Hash: d5540450ab3ce10b9341be317a065a8cf487e71a4068b896f9294537146c897d
                                                        • Instruction Fuzzy Hash: EAF0A7709003189FEB52DF24DC457EA7BFCA70570CF0000E9A288A6281DBB0578CCF51
                                                        APIs
                                                        • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00DD2DC4
                                                          • Part of subcall function 00DD6B57: _wcslen.LIBCMT ref: 00DD6B6A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: LongNamePath_wcslen
                                                        • String ID:
                                                        • API String ID: 541455249-0
                                                        • Opcode ID: bae72a205715b498ed9232f6261922110862e0519de61de51b0b66d25ad322eb
                                                        • Instruction ID: d5ac6e0c93a95d7bc9129e35c5290e1718d56460ea2ca48ad98e8c5da69b8ce3
                                                        • Opcode Fuzzy Hash: bae72a205715b498ed9232f6261922110862e0519de61de51b0b66d25ad322eb
                                                        • Instruction Fuzzy Hash: 75E0CD727041245BC710A2589C05FEA77DDDFC87D0F0500B2FD09E7258D960ED8485A0
                                                        APIs
                                                          • Part of subcall function 00DD3837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00DD3908
                                                          • Part of subcall function 00DDD730: GetInputState.USER32 ref: 00DDD807
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00DD2B6B
                                                          • Part of subcall function 00DD30F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 00DD314E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                        • String ID:
                                                        • API String ID: 3667716007-0
                                                        • Opcode ID: 63016c69ba1cd40ceb358285d1a3680eac51fa6094a4cdeb5b03ee859927b9af
                                                        • Instruction ID: 411ccb319b914330fd901b39fb41b204c74913c48d7959c7d09f98ec8b607a2a
                                                        • Opcode Fuzzy Hash: 63016c69ba1cd40ceb358285d1a3680eac51fa6094a4cdeb5b03ee859927b9af
                                                        • Instruction Fuzzy Hash: DAE0262130020406CA08BB35A81247DB74ACBEA351F00147FF05293362CE6449494232
                                                        APIs
                                                        • CreateFileW.KERNELBASE(00000000,00000000,?,00E10704,?,?,00000000,?,00E10704,00000000,0000000C), ref: 00E103B7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: CreateFile
                                                        • String ID:
                                                        • API String ID: 823142352-0
                                                        • Opcode ID: df561effbbb877b5d4ba9c5f3153c6fcac1b86837748fe158451cc14445af807
                                                        • Instruction ID: 136a67e7742efdf1adbb09c32a3f781ac2672f0e127cd78c2e6e5f081d7335a0
                                                        • Opcode Fuzzy Hash: df561effbbb877b5d4ba9c5f3153c6fcac1b86837748fe158451cc14445af807
                                                        • Instruction Fuzzy Hash: 3AD06C3204010DBFDF028F85ED06EDA3BAAFB48754F114000FE5866020C772E821AB90
                                                        APIs
                                                        • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00DD1CBC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: InfoParametersSystem
                                                        • String ID:
                                                        • API String ID: 3098949447-0
                                                        • Opcode ID: b4f5d56c440e42ed40a5a9a80e383642a9a008b8a0616e1cbdc36bb873046629
                                                        • Instruction ID: da9b43daf0189b287bd269792ac753e90197bac0863582c1a92503a5bc2549e4
                                                        • Opcode Fuzzy Hash: b4f5d56c440e42ed40a5a9a80e383642a9a008b8a0616e1cbdc36bb873046629
                                                        • Instruction Fuzzy Hash: 70C09236280304AFF6148B86BC4AF217764B34DB50F148002FB4AB95E3C3E23828EA91
                                                        APIs
                                                          • Part of subcall function 00DE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DE9BB2
                                                        • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00E6961A
                                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00E6965B
                                                        • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00E6969F
                                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00E696C9
                                                        • SendMessageW.USER32 ref: 00E696F2
                                                        • GetKeyState.USER32(00000011), ref: 00E6978B
                                                        • GetKeyState.USER32(00000009), ref: 00E69798
                                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00E697AE
                                                        • GetKeyState.USER32(00000010), ref: 00E697B8
                                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00E697E9
                                                        • SendMessageW.USER32 ref: 00E69810
                                                        • SendMessageW.USER32(?,00001030,?,00E67E95), ref: 00E69918
                                                        • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00E6992E
                                                        • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00E69941
                                                        • SetCapture.USER32(?), ref: 00E6994A
                                                        • ClientToScreen.USER32(?,?), ref: 00E699AF
                                                        • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00E699BC
                                                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00E699D6
                                                        • ReleaseCapture.USER32 ref: 00E699E1
                                                        • GetCursorPos.USER32(?), ref: 00E69A19
                                                        • ScreenToClient.USER32(?,?), ref: 00E69A26
                                                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00E69A80
                                                        • SendMessageW.USER32 ref: 00E69AAE
                                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00E69AEB
                                                        • SendMessageW.USER32 ref: 00E69B1A
                                                        • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00E69B3B
                                                        • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00E69B4A
                                                        • GetCursorPos.USER32(?), ref: 00E69B68
                                                        • ScreenToClient.USER32(?,?), ref: 00E69B75
                                                        • GetParent.USER32(?), ref: 00E69B93
                                                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00E69BFA
                                                        • SendMessageW.USER32 ref: 00E69C2B
                                                        • ClientToScreen.USER32(?,?), ref: 00E69C84
                                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00E69CB4
                                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00E69CDE
                                                        • SendMessageW.USER32 ref: 00E69D01
                                                        • ClientToScreen.USER32(?,?), ref: 00E69D4E
                                                        • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00E69D82
                                                          • Part of subcall function 00DE9944: GetWindowLongW.USER32(?,000000EB), ref: 00DE9952
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00E69E05
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                        • String ID: @GUI_DRAGID$F$p#
                                                        • API String ID: 3429851547-638943876
                                                        • Opcode ID: 049f1dd5977e92c6b2e7cb94b2d9c7c656a9b85e3c3803891a6e636984af799e
                                                        • Instruction ID: 79fbe23a55348102804bd9a232031e11ca32f88a5af5cd6f9df1447364ef44e8
                                                        • Opcode Fuzzy Hash: 049f1dd5977e92c6b2e7cb94b2d9c7c656a9b85e3c3803891a6e636984af799e
                                                        • Instruction Fuzzy Hash: 8042C030244301AFD724CF28EC48AAABBE9FF89794F10151EF595A72A2D771E854CF52
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 00E648F3
                                                        • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00E64908
                                                        • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00E64927
                                                        • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 00E6494B
                                                        • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 00E6495C
                                                        • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 00E6497B
                                                        • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 00E649AE
                                                        • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 00E649D4
                                                        • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00E64A0F
                                                        • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00E64A56
                                                        • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00E64A7E
                                                        • IsMenu.USER32(?), ref: 00E64A97
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00E64AF2
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00E64B20
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00E64B94
                                                        • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00E64BE3
                                                        • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00E64C82
                                                        • wsprintfW.USER32 ref: 00E64CAE
                                                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00E64CC9
                                                        • GetWindowTextW.USER32(?,00000000,00000001), ref: 00E64CF1
                                                        • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00E64D13
                                                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00E64D33
                                                        • GetWindowTextW.USER32(?,00000000,00000001), ref: 00E64D5A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                        • String ID: %d/%02d/%02d
                                                        • API String ID: 4054740463-328681919
                                                        • Opcode ID: 340ef3268cf248ee7ee1474cfa41fee0abc5fbf5ffbcafc544f2c48659fed11b
                                                        • Instruction ID: 116031b3544c9e2308cc4d170bef391e66c30abda9fb46e2852e126592566fa6
                                                        • Opcode Fuzzy Hash: 340ef3268cf248ee7ee1474cfa41fee0abc5fbf5ffbcafc544f2c48659fed11b
                                                        • Instruction Fuzzy Hash: 92120FB1640204AFEB249F25EC49FBF7BA8EF45784F105119F516EB2E1DBB49A40CB60
                                                        APIs
                                                        • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 00DEF998
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00E2F474
                                                        • IsIconic.USER32(00000000), ref: 00E2F47D
                                                        • ShowWindow.USER32(00000000,00000009), ref: 00E2F48A
                                                        • SetForegroundWindow.USER32(00000000), ref: 00E2F494
                                                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00E2F4AA
                                                        • GetCurrentThreadId.KERNEL32 ref: 00E2F4B1
                                                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00E2F4BD
                                                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 00E2F4CE
                                                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 00E2F4D6
                                                        • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 00E2F4DE
                                                        • SetForegroundWindow.USER32(00000000), ref: 00E2F4E1
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00E2F4F6
                                                        • keybd_event.USER32(00000012,00000000), ref: 00E2F501
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00E2F50B
                                                        • keybd_event.USER32(00000012,00000000), ref: 00E2F510
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00E2F519
                                                        • keybd_event.USER32(00000012,00000000), ref: 00E2F51E
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00E2F528
                                                        • keybd_event.USER32(00000012,00000000), ref: 00E2F52D
                                                        • SetForegroundWindow.USER32(00000000), ref: 00E2F530
                                                        • AttachThreadInput.USER32(?,000000FF,00000000), ref: 00E2F557
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 4125248594-2988720461
                                                        • Opcode ID: 1bb41e5dc2ed5763008ef2f05579389c39db719440720b21cbec3a29e55ed401
                                                        • Instruction ID: 85d287217821f763b8b1460726a8244a99706889bb1ae4344b4e72e6d3b4b266
                                                        • Opcode Fuzzy Hash: 1bb41e5dc2ed5763008ef2f05579389c39db719440720b21cbec3a29e55ed401
                                                        • Instruction Fuzzy Hash: 53311371A802187FEB216BB66C49FBF7E7CEB44B90F201066F641F61D1C6F19D00AA61
                                                        APIs
                                                          • Part of subcall function 00E316C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00E3170D
                                                          • Part of subcall function 00E316C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00E3173A
                                                          • Part of subcall function 00E316C3: GetLastError.KERNEL32 ref: 00E3174A
                                                        • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00E31286
                                                        • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 00E312A8
                                                        • CloseHandle.KERNEL32(?), ref: 00E312B9
                                                        • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00E312D1
                                                        • GetProcessWindowStation.USER32 ref: 00E312EA
                                                        • SetProcessWindowStation.USER32(00000000), ref: 00E312F4
                                                        • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00E31310
                                                          • Part of subcall function 00E310BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00E311FC), ref: 00E310D4
                                                          • Part of subcall function 00E310BF: CloseHandle.KERNEL32(?,?,00E311FC), ref: 00E310E9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                        • String ID: $default$winsta0$Z
                                                        • API String ID: 22674027-1808616255
                                                        • Opcode ID: af1d7a40ecf78b8a8fcdacad316f8f271249ba24f762387094a0adaae6b6b632
                                                        • Instruction ID: da14a34fddd580f38867323e1f20bbbce3da754f19e8324ec3d2afa717780d9c
                                                        • Opcode Fuzzy Hash: af1d7a40ecf78b8a8fcdacad316f8f271249ba24f762387094a0adaae6b6b632
                                                        • Instruction Fuzzy Hash: B7816771900208AFDF219FA5DC49BFE7FBAAF04748F1491A9F920B61A0CB759944CB20
                                                        APIs
                                                          • Part of subcall function 00E310F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00E31114
                                                          • Part of subcall function 00E310F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00E30B9B,?,?,?), ref: 00E31120
                                                          • Part of subcall function 00E310F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00E30B9B,?,?,?), ref: 00E3112F
                                                          • Part of subcall function 00E310F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00E30B9B,?,?,?), ref: 00E31136
                                                          • Part of subcall function 00E310F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00E3114D
                                                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00E30BCC
                                                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00E30C00
                                                        • GetLengthSid.ADVAPI32(?), ref: 00E30C17
                                                        • GetAce.ADVAPI32(?,00000000,?), ref: 00E30C51
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00E30C6D
                                                        • GetLengthSid.ADVAPI32(?), ref: 00E30C84
                                                        • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00E30C8C
                                                        • HeapAlloc.KERNEL32(00000000), ref: 00E30C93
                                                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00E30CB4
                                                        • CopySid.ADVAPI32(00000000), ref: 00E30CBB
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00E30CEA
                                                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00E30D0C
                                                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00E30D1E
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E30D45
                                                        • HeapFree.KERNEL32(00000000), ref: 00E30D4C
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E30D55
                                                        • HeapFree.KERNEL32(00000000), ref: 00E30D5C
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E30D65
                                                        • HeapFree.KERNEL32(00000000), ref: 00E30D6C
                                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00E30D78
                                                        • HeapFree.KERNEL32(00000000), ref: 00E30D7F
                                                          • Part of subcall function 00E31193: GetProcessHeap.KERNEL32(00000008,00E30BB1,?,00000000,?,00E30BB1,?), ref: 00E311A1
                                                          • Part of subcall function 00E31193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00E30BB1,?), ref: 00E311A8
                                                          • Part of subcall function 00E31193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00E30BB1,?), ref: 00E311B7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                        • String ID:
                                                        • API String ID: 4175595110-0
                                                        • Opcode ID: 47341e162149a44427fc786f04cbf5a905add684bcebc7a3c7d1f3e62e406f32
                                                        • Instruction ID: b0a4e3212fd7d22ec20a0d9ed45ace76a4c5f92e951fc6db082682aec54f25e7
                                                        • Opcode Fuzzy Hash: 47341e162149a44427fc786f04cbf5a905add684bcebc7a3c7d1f3e62e406f32
                                                        • Instruction Fuzzy Hash: D071897290020AAFDF10DFA5EC48BEFBFB8BF04344F145155E954B6291D7B1AA49CBA0
                                                        APIs
                                                        • OpenClipboard.USER32(00E6CC08), ref: 00E4EB29
                                                        • IsClipboardFormatAvailable.USER32(0000000D), ref: 00E4EB37
                                                        • GetClipboardData.USER32(0000000D), ref: 00E4EB43
                                                        • CloseClipboard.USER32 ref: 00E4EB4F
                                                        • GlobalLock.KERNEL32(00000000), ref: 00E4EB87
                                                        • CloseClipboard.USER32 ref: 00E4EB91
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00E4EBBC
                                                        • IsClipboardFormatAvailable.USER32(00000001), ref: 00E4EBC9
                                                        • GetClipboardData.USER32(00000001), ref: 00E4EBD1
                                                        • GlobalLock.KERNEL32(00000000), ref: 00E4EBE2
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00E4EC22
                                                        • IsClipboardFormatAvailable.USER32(0000000F), ref: 00E4EC38
                                                        • GetClipboardData.USER32(0000000F), ref: 00E4EC44
                                                        • GlobalLock.KERNEL32(00000000), ref: 00E4EC55
                                                        • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 00E4EC77
                                                        • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00E4EC94
                                                        • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00E4ECD2
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00E4ECF3
                                                        • CountClipboardFormats.USER32 ref: 00E4ED14
                                                        • CloseClipboard.USER32 ref: 00E4ED59
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                        • String ID:
                                                        • API String ID: 420908878-0
                                                        • Opcode ID: 801181e09b52cafa34039a39c1a37a674543f90e3965f501b4cf5c3ea28efe78
                                                        • Instruction ID: 87afa333b080b09cac9895c3efc1d23fbc010af765c3061778e98942a9c16208
                                                        • Opcode Fuzzy Hash: 801181e09b52cafa34039a39c1a37a674543f90e3965f501b4cf5c3ea28efe78
                                                        • Instruction Fuzzy Hash: 2861AD342042019FD310EF25E895F7AB7A4FF84748F14555AF896A73A2CB71ED09CBA2
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00E469BE
                                                        • FindClose.KERNEL32(00000000), ref: 00E46A12
                                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00E46A4E
                                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00E46A75
                                                          • Part of subcall function 00DD9CB3: _wcslen.LIBCMT ref: 00DD9CBD
                                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00E46AB2
                                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00E46ADF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                        • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                        • API String ID: 3830820486-3289030164
                                                        • Opcode ID: 5d06f4758fe7ae569f17db65c7cdc6c253d7d8e6fe8b1c36c4751f7d39e744cb
                                                        • Instruction ID: cb012af671d6094fb407225f6d3dc3012316a85ca91694d53db081df5378f879
                                                        • Opcode Fuzzy Hash: 5d06f4758fe7ae569f17db65c7cdc6c253d7d8e6fe8b1c36c4751f7d39e744cb
                                                        • Instruction Fuzzy Hash: D6D151B1508340AEC710EBA4D891EABB7ECEF88704F44491EF585D7291EB75DA48CB72
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?,75568FB0,?,00000000), ref: 00E49663
                                                        • GetFileAttributesW.KERNEL32(?), ref: 00E496A1
                                                        • SetFileAttributesW.KERNEL32(?,?), ref: 00E496BB
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00E496D3
                                                        • FindClose.KERNEL32(00000000), ref: 00E496DE
                                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00E496FA
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00E4974A
                                                        • SetCurrentDirectoryW.KERNEL32(00E96B7C), ref: 00E49768
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00E49772
                                                        • FindClose.KERNEL32(00000000), ref: 00E4977F
                                                        • FindClose.KERNEL32(00000000), ref: 00E4978F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                        • String ID: *.*
                                                        • API String ID: 1409584000-438819550
                                                        • Opcode ID: b10eb2ef0029f27149440c62427e386cb1c2633741f4f98e4784ece28c7044b1
                                                        • Instruction ID: 8c9d020db7c8341f7b6e8b098491cd00b23b6ab44500b404d829febb2ab6a46a
                                                        • Opcode Fuzzy Hash: b10eb2ef0029f27149440c62427e386cb1c2633741f4f98e4784ece28c7044b1
                                                        • Instruction Fuzzy Hash: 3131CF326406096EDB10AFB5FC08AEF77AC9F49364F205196E954F21A1EB70DD848B24
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?,75568FB0,?,00000000), ref: 00E497BE
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00E49819
                                                        • FindClose.KERNEL32(00000000), ref: 00E49824
                                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00E49840
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00E49890
                                                        • SetCurrentDirectoryW.KERNEL32(00E96B7C), ref: 00E498AE
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00E498B8
                                                        • FindClose.KERNEL32(00000000), ref: 00E498C5
                                                        • FindClose.KERNEL32(00000000), ref: 00E498D5
                                                          • Part of subcall function 00E3DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00E3DB00
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                        • String ID: *.*
                                                        • API String ID: 2640511053-438819550
                                                        • Opcode ID: 6e50a93a005206639ac0e8faa9ea060563cc1db2c73e55e1af5ab1c2257733b0
                                                        • Instruction ID: 772dc9abe12962c777e50c79209ceed4321e3f5e089814759d5c64fd08b2980e
                                                        • Opcode Fuzzy Hash: 6e50a93a005206639ac0e8faa9ea060563cc1db2c73e55e1af5ab1c2257733b0
                                                        • Instruction Fuzzy Hash: 9931E5315406196EDF14EFB9FC48AEF77AC9F0A364F209156E950B21A2EB70D984CB24
                                                        APIs
                                                          • Part of subcall function 00E5C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00E5B6AE,?,?), ref: 00E5C9B5
                                                          • Part of subcall function 00E5C998: _wcslen.LIBCMT ref: 00E5C9F1
                                                          • Part of subcall function 00E5C998: _wcslen.LIBCMT ref: 00E5CA68
                                                          • Part of subcall function 00E5C998: _wcslen.LIBCMT ref: 00E5CA9E
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E5BF3E
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 00E5BFA9
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00E5BFCD
                                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00E5C02C
                                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00E5C0E7
                                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00E5C154
                                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00E5C1E9
                                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 00E5C23A
                                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00E5C2E3
                                                        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00E5C382
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00E5C38F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                                        • String ID:
                                                        • API String ID: 3102970594-0
                                                        • Opcode ID: 4ced9361a9e89187b5f8a992b118a27c5bf48d8e797fb26535d86db585c7b819
                                                        • Instruction ID: 3af756046a061716f21be31a059abbcc0763b00f9298b5c8478f58018a7c2ea4
                                                        • Opcode Fuzzy Hash: 4ced9361a9e89187b5f8a992b118a27c5bf48d8e797fb26535d86db585c7b819
                                                        • Instruction Fuzzy Hash: E8023E716043009FD714DF28C895E2ABBE5EF49318F18989DF84ADB2A2D731ED45CB62
                                                        APIs
                                                        • GetLocalTime.KERNEL32(?), ref: 00E48257
                                                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 00E48267
                                                        • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00E48273
                                                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00E48310
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00E48324
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00E48356
                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00E4838C
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00E48395
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectoryTime$File$Local$System
                                                        • String ID: *.*
                                                        • API String ID: 1464919966-438819550
                                                        • Opcode ID: 36aac653d81e35a336fa4fd5256ee645dcbe944f1d748af6fffb0493c787e16d
                                                        • Instruction ID: 8b3244a98fc302f887ca382b7cf676b85dd630d17b12d2a9892c6f15ebbf4d15
                                                        • Opcode Fuzzy Hash: 36aac653d81e35a336fa4fd5256ee645dcbe944f1d748af6fffb0493c787e16d
                                                        • Instruction Fuzzy Hash: 6D6159725043459FCB10EF60E9449AFB3E8FF89314F04891EF999A7251EB31E945CBA2
                                                        APIs
                                                          • Part of subcall function 00DD3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00DD3A97,?,?,00DD2E7F,?,?,?,00000000), ref: 00DD3AC2
                                                          • Part of subcall function 00E3E199: GetFileAttributesW.KERNEL32(?,00E3CF95), ref: 00E3E19A
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00E3D122
                                                        • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 00E3D1DD
                                                        • MoveFileW.KERNEL32(?,?), ref: 00E3D1F0
                                                        • DeleteFileW.KERNEL32(?,?,?,?), ref: 00E3D20D
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00E3D237
                                                          • Part of subcall function 00E3D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00E3D21C,?,?), ref: 00E3D2B2
                                                        • FindClose.KERNEL32(00000000,?,?,?), ref: 00E3D253
                                                        • FindClose.KERNEL32(00000000), ref: 00E3D264
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                        • String ID: \*.*
                                                        • API String ID: 1946585618-1173974218
                                                        • Opcode ID: 3562c8f6ba8a4812c0a06c56f467eb90e5e9cc995dc9b9ab06ffcc3214548ad4
                                                        • Instruction ID: df8826e81d4c1c2fc74687ee9418dfc683374fa5936ca04636da2dca96a11aa9
                                                        • Opcode Fuzzy Hash: 3562c8f6ba8a4812c0a06c56f467eb90e5e9cc995dc9b9ab06ffcc3214548ad4
                                                        • Instruction Fuzzy Hash: AE617B319051099BCF05EBA0EEA69EEBBB5EF15304F244066E401732A1EB31AF09DB71
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                        • String ID:
                                                        • API String ID: 1737998785-0
                                                        • Opcode ID: 2a9c6a7af0ce115ca25aa29695333e031c27a4b9d430a931b803f1fc03c4b820
                                                        • Instruction ID: 533e66dc5744381ef09c676cf5ad48ab4e52f407aa4a60d016f664714331476d
                                                        • Opcode Fuzzy Hash: 2a9c6a7af0ce115ca25aa29695333e031c27a4b9d430a931b803f1fc03c4b820
                                                        • Instruction Fuzzy Hash: EC41CE31604611AFD720CF26E888B6ABBE1FF44358F14D099E465AB762C771EC45CB90
                                                        APIs
                                                          • Part of subcall function 00E316C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00E3170D
                                                          • Part of subcall function 00E316C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00E3173A
                                                          • Part of subcall function 00E316C3: GetLastError.KERNEL32 ref: 00E3174A
                                                        • ExitWindowsEx.USER32(?,00000000), ref: 00E3E932
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                        • String ID: $ $@$SeShutdownPrivilege
                                                        • API String ID: 2234035333-3163812486
                                                        • Opcode ID: 7122f45997eb593500d74880d2bca68535bbde2983a2c858372f08f50814d903
                                                        • Instruction ID: 0b056c02b2d3a6cd7a62b79a8204568feb6b3df248717c999a9c7094d8d872c4
                                                        • Opcode Fuzzy Hash: 7122f45997eb593500d74880d2bca68535bbde2983a2c858372f08f50814d903
                                                        • Instruction Fuzzy Hash: AF01F972610211AFEB5426B5AC8EFFF7AAC9754794F266462FC03F22D1D5A09C44C390
                                                        APIs
                                                        • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00E51276
                                                        • WSAGetLastError.WSOCK32 ref: 00E51283
                                                        • bind.WSOCK32(00000000,?,00000010), ref: 00E512BA
                                                        • WSAGetLastError.WSOCK32 ref: 00E512C5
                                                        • closesocket.WSOCK32(00000000), ref: 00E512F4
                                                        • listen.WSOCK32(00000000,00000005), ref: 00E51303
                                                        • WSAGetLastError.WSOCK32 ref: 00E5130D
                                                        • closesocket.WSOCK32(00000000), ref: 00E5133C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$closesocket$bindlistensocket
                                                        • String ID:
                                                        • API String ID: 540024437-0
                                                        • Opcode ID: 9b4d6b2c45021cbb4114fc54ecc27255a0744b55a0918c1397c08dfb001c777a
                                                        • Instruction ID: 19540259fe4a9e91eb4da0be0180a097e2686fbda98a26ee82d5a974378290df
                                                        • Opcode Fuzzy Hash: 9b4d6b2c45021cbb4114fc54ecc27255a0744b55a0918c1397c08dfb001c777a
                                                        • Instruction Fuzzy Hash: 0141C6346001409FD714DF24D484B2AB7E5EF86319F1885C9D856AF3A2C771EC89CBE1
                                                        APIs
                                                        • _free.LIBCMT ref: 00E0B9D4
                                                        • _free.LIBCMT ref: 00E0B9F8
                                                        • _free.LIBCMT ref: 00E0BB7F
                                                        • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00E73700), ref: 00E0BB91
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00EA121C,000000FF,00000000,0000003F,00000000,?,?), ref: 00E0BC09
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00EA1270,000000FF,?,0000003F,00000000,?), ref: 00E0BC36
                                                        • _free.LIBCMT ref: 00E0BD4B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                        • String ID:
                                                        • API String ID: 314583886-0
                                                        • Opcode ID: 1595e38634e6ed6c51a925e4851b230d3103905e514032400cdd35ffefb06ddc
                                                        • Instruction ID: e56b16efbe56ed12ae7b5f73e77589dd5ec9390df40029ce848f2b6e2b2d1fc7
                                                        • Opcode Fuzzy Hash: 1595e38634e6ed6c51a925e4851b230d3103905e514032400cdd35ffefb06ddc
                                                        • Instruction Fuzzy Hash: 15C12971A042059FDB209F699C41BAABBF8FF46314F24619AE594F72D1E7309EC1CB60
                                                        APIs
                                                          • Part of subcall function 00DD3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00DD3A97,?,?,00DD2E7F,?,?,?,00000000), ref: 00DD3AC2
                                                          • Part of subcall function 00E3E199: GetFileAttributesW.KERNEL32(?,00E3CF95), ref: 00E3E19A
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00E3D420
                                                        • DeleteFileW.KERNEL32(?,?,?,?), ref: 00E3D470
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00E3D481
                                                        • FindClose.KERNEL32(00000000), ref: 00E3D498
                                                        • FindClose.KERNEL32(00000000), ref: 00E3D4A1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                        • String ID: \*.*
                                                        • API String ID: 2649000838-1173974218
                                                        • Opcode ID: 7e468d6c1e0dea0cc2b1732b85056ace608403455c2d1a6ad76798d3d679567a
                                                        • Instruction ID: b0e288c863dbe6d80203da21ccbde9b3ff2da2e67169948e203cc60180c88e3e
                                                        • Opcode Fuzzy Hash: 7e468d6c1e0dea0cc2b1732b85056ace608403455c2d1a6ad76798d3d679567a
                                                        • Instruction Fuzzy Hash: CF31723100C3459FC305EF64EC558AFBBA8EE91354F44591EF4E162291EB30AA09DB73
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: __floor_pentium4
                                                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                        • API String ID: 4168288129-2761157908
                                                        • Opcode ID: 9988d6a1cbea422ab077195317ce734d4b4c065bcf555e64e9eed64958c52959
                                                        • Instruction ID: 7ad8b24ef315254107ecb7f5a4506ce4ec05bbdd62c3a35a9dec5ba0da79d421
                                                        • Opcode Fuzzy Hash: 9988d6a1cbea422ab077195317ce734d4b4c065bcf555e64e9eed64958c52959
                                                        • Instruction Fuzzy Hash: 17C24971E086288FDB35CE289D407EAB7B5EB88304F1555EAD84DF7280E774AE918F40
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 00E464DC
                                                        • CoInitialize.OLE32(00000000), ref: 00E46639
                                                        • CoCreateInstance.OLE32(00E6FCF8,00000000,00000001,00E6FB68,?), ref: 00E46650
                                                        • CoUninitialize.OLE32 ref: 00E468D4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                        • String ID: .lnk
                                                        • API String ID: 886957087-24824748
                                                        • Opcode ID: ca472092f426989057b1831d46fa3eebc0a9ee446a7839cd642b067ad33c6894
                                                        • Instruction ID: 39fbaa3deac0b48cab638b97a0e2a43831ca427f69b540f3289751da82ca438d
                                                        • Opcode Fuzzy Hash: ca472092f426989057b1831d46fa3eebc0a9ee446a7839cd642b067ad33c6894
                                                        • Instruction Fuzzy Hash: A9D15971508301AFC314EF24D89196BB7E8FF99708F00496EF5959B2A1EB71ED05CBA2
                                                        APIs
                                                        • GetForegroundWindow.USER32(?,?,00000000), ref: 00E522E8
                                                          • Part of subcall function 00E4E4EC: GetWindowRect.USER32(?,?), ref: 00E4E504
                                                        • GetDesktopWindow.USER32 ref: 00E52312
                                                        • GetWindowRect.USER32(00000000), ref: 00E52319
                                                        • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00E52355
                                                        • GetCursorPos.USER32(?), ref: 00E52381
                                                        • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00E523DF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                        • String ID:
                                                        • API String ID: 2387181109-0
                                                        • Opcode ID: f6234aebf1cd42fb29b8dd331ba32bc665b3130d56a08293c98aee8071862948
                                                        • Instruction ID: c6af00bf59a61eec8ea315b007ebe537712917c32004739a436d6fe12d8f7be8
                                                        • Opcode Fuzzy Hash: f6234aebf1cd42fb29b8dd331ba32bc665b3130d56a08293c98aee8071862948
                                                        • Instruction Fuzzy Hash: 3531F072104306AFCB20DF55D848B6BBBE9FF85314F10191DF985A7281DB74EA08CB92
                                                        APIs
                                                          • Part of subcall function 00DD9CB3: _wcslen.LIBCMT ref: 00DD9CBD
                                                        • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00E49B78
                                                        • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00E49C8B
                                                          • Part of subcall function 00E43874: GetInputState.USER32 ref: 00E438CB
                                                          • Part of subcall function 00E43874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00E43966
                                                        • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00E49BA8
                                                        • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00E49C75
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                        • String ID: *.*
                                                        • API String ID: 1972594611-438819550
                                                        • Opcode ID: 01328da9e5f2f1da6e8349b36c135f0d9828c58de9267bf58fc54aeea9842f0a
                                                        • Instruction ID: 061e321c1d4676d0fdde7691254a7532116c0d547721e4646140e7df2f864ed4
                                                        • Opcode Fuzzy Hash: 01328da9e5f2f1da6e8349b36c135f0d9828c58de9267bf58fc54aeea9842f0a
                                                        • Instruction Fuzzy Hash: 2941907194020A9FCF14DF64ED85AEFBBB8EF45304F205156E805B2292EB309E84CF60
                                                        APIs
                                                          • Part of subcall function 00DE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DE9BB2
                                                        • DefDlgProcW.USER32(?,?,?,?,?), ref: 00DE9A4E
                                                        • GetSysColor.USER32(0000000F), ref: 00DE9B23
                                                        • SetBkColor.GDI32(?,00000000), ref: 00DE9B36
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Color$LongProcWindow
                                                        • String ID:
                                                        • API String ID: 3131106179-0
                                                        • Opcode ID: 1847b4a4f0403cb397fff1858b7fffe564869942665fca7b34bc1a782adada12
                                                        • Instruction ID: a24e6aea6992eedc5d00bcada857bd406a35ecb040b2bfcb747f594169efc484
                                                        • Opcode Fuzzy Hash: 1847b4a4f0403cb397fff1858b7fffe564869942665fca7b34bc1a782adada12
                                                        • Instruction Fuzzy Hash: 05A16F7010A5A0BEE728BA3FACB8D7F769DDF46354F141129F482F6692CA25DD01C272
                                                        APIs
                                                          • Part of subcall function 00E5304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00E5307A
                                                          • Part of subcall function 00E5304E: _wcslen.LIBCMT ref: 00E5309B
                                                        • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00E5185D
                                                        • WSAGetLastError.WSOCK32 ref: 00E51884
                                                        • bind.WSOCK32(00000000,?,00000010), ref: 00E518DB
                                                        • WSAGetLastError.WSOCK32 ref: 00E518E6
                                                        • closesocket.WSOCK32(00000000), ref: 00E51915
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                        • String ID:
                                                        • API String ID: 1601658205-0
                                                        • Opcode ID: a0d65bd405adad9ab93f537073dc9d89241ab79a4ebcfb347f3916e717a08646
                                                        • Instruction ID: 2f00823f493c8c540590292a257f8b7791a0cbdc29e577114d7b33ec9daa1a6b
                                                        • Opcode Fuzzy Hash: a0d65bd405adad9ab93f537073dc9d89241ab79a4ebcfb347f3916e717a08646
                                                        • Instruction Fuzzy Hash: F851A171A00200AFD724AF24D886F6A77E5EB88718F188499F945AF3C3D671AD45CBF1
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                        • String ID:
                                                        • API String ID: 292994002-0
                                                        • Opcode ID: ab3b5421bc3042c292ebd5fd58a1ad176de401b838532ffeeb0779f84fd12064
                                                        • Instruction ID: c4a3e6e600f35955e5628fa053567a717f063d6d738ff858d7ac76c96b481eeb
                                                        • Opcode Fuzzy Hash: ab3b5421bc3042c292ebd5fd58a1ad176de401b838532ffeeb0779f84fd12064
                                                        • Instruction Fuzzy Hash: 3021F6317802005FD3258F2AE844B6ABBE4EF94395F1DA09DE846EB351C771DC42CB90
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                        • API String ID: 0-1546025612
                                                        • Opcode ID: 17120079a39ef19d7191cd06c265e004398570e7b1dd8366b6841e39cedf4d2f
                                                        • Instruction ID: ed8e7c22b1e94aac51ae81773c5c89a2a9f71f2accf37249e0ed1a323a4c6837
                                                        • Opcode Fuzzy Hash: 17120079a39ef19d7191cd06c265e004398570e7b1dd8366b6841e39cedf4d2f
                                                        • Instruction Fuzzy Hash: 6AA25C71A0061ACBDF25CF58C8407EEB7B2BB94314F2485AAE855A7385DB70DDC1DBA0
                                                        APIs
                                                        • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00E382AA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: lstrlen
                                                        • String ID: ($tb$|
                                                        • API String ID: 1659193697-1968160224
                                                        • Opcode ID: 5249df5cebb37acf2f337c2f3a5f8cd596d7eb63f7c11d12bb41626d56fe27cf
                                                        • Instruction ID: 62e62f0cdbbcdc09687bbbe10e8604c114894db974e822e8d9474b6512f19c0a
                                                        • Opcode Fuzzy Hash: 5249df5cebb37acf2f337c2f3a5f8cd596d7eb63f7c11d12bb41626d56fe27cf
                                                        • Instruction Fuzzy Hash: 5F323674A007059FCB28CF19C58596ABBF0FF48714F15856EE49AEB3A1EB70E941CB50
                                                        APIs
                                                        • CreateToolhelp32Snapshot.KERNEL32 ref: 00E5A6AC
                                                        • Process32FirstW.KERNEL32(00000000,?), ref: 00E5A6BA
                                                          • Part of subcall function 00DD9CB3: _wcslen.LIBCMT ref: 00DD9CBD
                                                        • Process32NextW.KERNEL32(00000000,?), ref: 00E5A79C
                                                        • CloseHandle.KERNEL32(00000000), ref: 00E5A7AB
                                                          • Part of subcall function 00DECE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00E13303,?), ref: 00DECE8A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                        • String ID:
                                                        • API String ID: 1991900642-0
                                                        • Opcode ID: a2aa0adef6994e83e06a09fb019e9d19a1b2384fb2f608421ab4d3b93daf60f3
                                                        • Instruction ID: 1b0af39d0ff87b70604258653f58246a969f3c90fda023794ccb79bbe93e5095
                                                        • Opcode Fuzzy Hash: a2aa0adef6994e83e06a09fb019e9d19a1b2384fb2f608421ab4d3b93daf60f3
                                                        • Instruction Fuzzy Hash: 0A5170715083009FD310EF25D886A6BBBE8FF89754F04592EF985A7351EB70D904CBA2
                                                        APIs
                                                        • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 00E3AAAC
                                                        • SetKeyboardState.USER32(00000080), ref: 00E3AAC8
                                                        • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 00E3AB36
                                                        • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 00E3AB88
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: KeyboardState$InputMessagePostSend
                                                        • String ID:
                                                        • API String ID: 432972143-0
                                                        • Opcode ID: f98e37045dc643889e08d541d7e3afc390f1a6a9226d133fadd40dc2edb4a9da
                                                        • Instruction ID: d9f4a4858eda27060a246e43cb66493fd54ce4568b7ef44c137982bc1b4b67db
                                                        • Opcode Fuzzy Hash: f98e37045dc643889e08d541d7e3afc390f1a6a9226d133fadd40dc2edb4a9da
                                                        • Instruction Fuzzy Hash: E8310731A40248AEEB35CB65CC0DBFABFA6AB44714F1C622AE1C1761D1D37489C5C763
                                                        APIs
                                                        • InternetReadFile.WININET(?,?,00000400,?), ref: 00E4CE89
                                                        • GetLastError.KERNEL32(?,00000000), ref: 00E4CEEA
                                                        • SetEvent.KERNEL32(?,?,00000000), ref: 00E4CEFE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ErrorEventFileInternetLastRead
                                                        • String ID:
                                                        • API String ID: 234945975-0
                                                        • Opcode ID: bba30947d16520a47bd6f3c47971692af613a66032b1e28ffc512825c3e54c16
                                                        • Instruction ID: e0e0e2d163f52b610ac642feb29270da5c438a1a5e1fcd264e6cd296e4af20d1
                                                        • Opcode Fuzzy Hash: bba30947d16520a47bd6f3c47971692af613a66032b1e28ffc512825c3e54c16
                                                        • Instruction Fuzzy Hash: D621AC716017059FDB60DFA6E948BB777F8EB00358F20842AE646A3151E774EE088B60
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00E45CC1
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00E45D17
                                                        • FindClose.KERNEL32(?), ref: 00E45D5F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Find$File$CloseFirstNext
                                                        • String ID:
                                                        • API String ID: 3541575487-0
                                                        • Opcode ID: 40d7b7c58910794bfd048448e94389a3154224de97b8d369ca74ae2daf9196e3
                                                        • Instruction ID: 285af0c7f27bfe0fb676dc04fbefa284bfb1db86e3c72993102dfa68942e951d
                                                        • Opcode Fuzzy Hash: 40d7b7c58910794bfd048448e94389a3154224de97b8d369ca74ae2daf9196e3
                                                        • Instruction Fuzzy Hash: EC51AA35A04A019FC714DF28E494A9AB7E4FF49314F14855EE99A9B3A2DB30ED04CFA1
                                                        APIs
                                                        • IsDebuggerPresent.KERNEL32 ref: 00E0271A
                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00E02724
                                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 00E02731
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                        • String ID:
                                                        • API String ID: 3906539128-0
                                                        • Opcode ID: c1095838e867e636fc2a8494bba42b8f241582c17690fb037f609a4b50c4943b
                                                        • Instruction ID: 4d612bbbd537533f9b2e1c4370fa323090f2305d70ebc639a79472667a27e05c
                                                        • Opcode Fuzzy Hash: c1095838e867e636fc2a8494bba42b8f241582c17690fb037f609a4b50c4943b
                                                        • Instruction Fuzzy Hash: 1931C47495121C9BCB21DF64DC88799BBB8FF08310F5081EAE90CA7261E7709F858F54
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 00E451DA
                                                        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00E45238
                                                        • SetErrorMode.KERNEL32(00000000), ref: 00E452A1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$DiskFreeSpace
                                                        • String ID:
                                                        • API String ID: 1682464887-0
                                                        • Opcode ID: 951bb5bcdc64e8b4f15e8ed7941782559857c2d9a71e21cfa2743aaef4a6b118
                                                        • Instruction ID: 41b9773fae649d9dde3ecfb6b3a8c48fee8143f1ba1a6906cc15fd70fb7a6ab4
                                                        • Opcode Fuzzy Hash: 951bb5bcdc64e8b4f15e8ed7941782559857c2d9a71e21cfa2743aaef4a6b118
                                                        • Instruction Fuzzy Hash: 03315075A00518DFDB00DF55E884EADBBB4FF49318F14809AE845AB362DB71E855CB60
                                                        APIs
                                                          • Part of subcall function 00DEFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00DF0668
                                                          • Part of subcall function 00DEFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00DF0685
                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00E3170D
                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00E3173A
                                                        • GetLastError.KERNEL32 ref: 00E3174A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                        • String ID:
                                                        • API String ID: 577356006-0
                                                        • Opcode ID: b227617dc895f7ab135e3b795d79df0cb38e6fd56058a2397d12596ea5ac4a5c
                                                        • Instruction ID: 5066e23c21612ef73daf17247eef760680be269d3da29bf6a5e4a50d11eeb619
                                                        • Opcode Fuzzy Hash: b227617dc895f7ab135e3b795d79df0cb38e6fd56058a2397d12596ea5ac4a5c
                                                        • Instruction Fuzzy Hash: E911C1B2404305AFD718AF54EC8AD6BBBBDEB04754F24856EE05663241EBB0BC42CA30
                                                        APIs
                                                        • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00E3D608
                                                        • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00E3D645
                                                        • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00E3D650
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: CloseControlCreateDeviceFileHandle
                                                        • String ID:
                                                        • API String ID: 33631002-0
                                                        • Opcode ID: b56cc6a120bb03bbe3cff337a86c92c045e9faa1257415cd1e85efccdb09010f
                                                        • Instruction ID: 3e520c33aaeaa7c2fdb5cfb4b4b2cb270fcd246a74fc3a0acef51244119e8fde
                                                        • Opcode Fuzzy Hash: b56cc6a120bb03bbe3cff337a86c92c045e9faa1257415cd1e85efccdb09010f
                                                        • Instruction Fuzzy Hash: D6115AB1E05228BFDB108B95AC49BAFBFBCEB45B50F108111F914F7290C2B04A058BA1
                                                        APIs
                                                        • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00E3168C
                                                        • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00E316A1
                                                        • FreeSid.ADVAPI32(?), ref: 00E316B1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: AllocateCheckFreeInitializeMembershipToken
                                                        • String ID:
                                                        • API String ID: 3429775523-0
                                                        • Opcode ID: 53c44656c3195ce17e00007b4731af0114c66c07c5ff3a8b68b8bb2d02f84814
                                                        • Instruction ID: 43dd047a69008ec48e54e335cd82f2109977668a1b60a01fbe329b9494d0797e
                                                        • Opcode Fuzzy Hash: 53c44656c3195ce17e00007b4731af0114c66c07c5ff3a8b68b8bb2d02f84814
                                                        • Instruction Fuzzy Hash: 3CF0F471950309FFDB00DFE59D89AAEBBBCEB08644F5045A5E501E2181E774AA489A50
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: /
                                                        • API String ID: 0-2043925204
                                                        • Opcode ID: daaa9f9a13a2d2c6b37121e2b0f0fd9b0834abb46b59647cc7fb535696895a76
                                                        • Instruction ID: ca377a75db14c837b1718a2354caf346cf0ab7cba675d1c214352c0cafc9eb8a
                                                        • Opcode Fuzzy Hash: daaa9f9a13a2d2c6b37121e2b0f0fd9b0834abb46b59647cc7fb535696895a76
                                                        • Instruction Fuzzy Hash: 00412972500619AFCB209FB9DC49EBB77B8EB84358F2042A9F915E71D0E6709DC18B50
                                                        APIs
                                                        • GetUserNameW.ADVAPI32(?,?), ref: 00E2D28C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: NameUser
                                                        • String ID: X64
                                                        • API String ID: 2645101109-893830106
                                                        • Opcode ID: 2577d0981110b65171bf54c4fa239ff4c28fcca0f8e2486298bbf944430d9119
                                                        • Instruction ID: e82be22b332773ad1c7916f6c455a380aa22a0441721a53a72df751d9e9b5700
                                                        • Opcode Fuzzy Hash: 2577d0981110b65171bf54c4fa239ff4c28fcca0f8e2486298bbf944430d9119
                                                        • Instruction Fuzzy Hash: 1DD0C9B580512DEECB90DB90EC88DDAB77CBB04345F100151F146B2000DB7095488F20
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                        • Instruction ID: a1830511c1069d4d44d649955b5379a07497f76401ae7fd44f489e0e632a8104
                                                        • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                        • Instruction Fuzzy Hash: D6023D71E1121D9BDF14CFA9C9806ADFBF1EF88314F298169E919E7380D731AA51CB90
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Variable is not of type 'Object'.$p#
                                                        • API String ID: 0-1086706999
                                                        • Opcode ID: 3a548deddc60c312ab6d9905ad482abdf5377304717433ce120b4922e2f49ad7
                                                        • Instruction ID: 13436f02a4924df30f61bec14e612d843426ff0557c9ce21934be2d835214514
                                                        • Opcode Fuzzy Hash: 3a548deddc60c312ab6d9905ad482abdf5377304717433ce120b4922e2f49ad7
                                                        • Instruction Fuzzy Hash: 18326A70920219DBCF14DF94D881AEDB7B5FF05308F24A05AE846AB392DB75AE45CB70
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00E46918
                                                        • FindClose.KERNEL32(00000000), ref: 00E46961
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Find$CloseFileFirst
                                                        • String ID:
                                                        • API String ID: 2295610775-0
                                                        • Opcode ID: 834289d17981c31f07d330cbdad5ca2ff1179c48e4dd6622f09287657a69a406
                                                        • Instruction ID: 31e37da77c50b6433bac94c7a4697a01263d8009c4f2f7b9a01bd142abc2f634
                                                        • Opcode Fuzzy Hash: 834289d17981c31f07d330cbdad5ca2ff1179c48e4dd6622f09287657a69a406
                                                        • Instruction Fuzzy Hash: 171193316146019FC710DF29D484A16BBE5FF85328F14C699E9699F3A2C770EC05CBA1
                                                        APIs
                                                        • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00E54891,?,?,00000035,?), ref: 00E437E4
                                                        • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00E54891,?,?,00000035,?), ref: 00E437F4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ErrorFormatLastMessage
                                                        • String ID:
                                                        • API String ID: 3479602957-0
                                                        • Opcode ID: 70473ff689790c70b749e83efadafb8b0e00af22513322d192d75ba1725ae5b5
                                                        • Instruction ID: 2965ccea90ed6e93e1b60ffca796b5d2c58a2c4ebfae1beb919cd5be47205034
                                                        • Opcode Fuzzy Hash: 70473ff689790c70b749e83efadafb8b0e00af22513322d192d75ba1725ae5b5
                                                        • Instruction Fuzzy Hash: B5F0ECB07052142AD71017765C4DFEB769DEFC4765F000166F509F2291D5605944C6B0
                                                        APIs
                                                        • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00E3B25D
                                                        • keybd_event.USER32(?,76C1C0D0,?,00000000), ref: 00E3B270
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: InputSendkeybd_event
                                                        • String ID:
                                                        • API String ID: 3536248340-0
                                                        • Opcode ID: 0e661cb99e717334dae2c526ec0d4e353d1d6f47461e1639d75a5d4438890236
                                                        • Instruction ID: 6220554c39c1614e4e2306596cc8d58ff8cd90d81665ff41d27a99dfa474ec69
                                                        • Opcode Fuzzy Hash: 0e661cb99e717334dae2c526ec0d4e353d1d6f47461e1639d75a5d4438890236
                                                        • Instruction Fuzzy Hash: 2CF0F97180428DAFDB059FA1D806BBF7FB4EF08309F10900AE966A51A2C7B99615DF94
                                                        APIs
                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00E311FC), ref: 00E310D4
                                                        • CloseHandle.KERNEL32(?,?,00E311FC), ref: 00E310E9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: AdjustCloseHandlePrivilegesToken
                                                        • String ID:
                                                        • API String ID: 81990902-0
                                                        • Opcode ID: e1f5f10cd23d0dd2d1ece17ed32fa8fc6849d07fbc6cf203dbc6962927989526
                                                        • Instruction ID: b2d8cea746337e04ec6f997a8099f04d38a675d7cdcd4727d2eabc149e12fde5
                                                        • Opcode Fuzzy Hash: e1f5f10cd23d0dd2d1ece17ed32fa8fc6849d07fbc6cf203dbc6962927989526
                                                        • Instruction Fuzzy Hash: B6E04F32008640AEE7252B12FC09E777BA9EB04310F20882DF4A5904B1DBA26C90DB20
                                                        APIs
                                                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00E06766,?,?,00000008,?,?,00E0FEFE,00000000), ref: 00E06998
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ExceptionRaise
                                                        • String ID:
                                                        • API String ID: 3997070919-0
                                                        • Opcode ID: 91ea8bb8a6531334911fa0f377fb72cff9f58c27dbd0fb52c4e553aaee67a2cc
                                                        • Instruction ID: ed6260c05704c4f60e730dcf0b59b2f4f26b1e8034f5adf0d9e0b7da2d12ad82
                                                        • Opcode Fuzzy Hash: 91ea8bb8a6531334911fa0f377fb72cff9f58c27dbd0fb52c4e553aaee67a2cc
                                                        • Instruction Fuzzy Hash: 1DB13C316106099FDB19CF28C486BA57BE0FF45368F25D658E899DF2E2C335D9A1CB40
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID: 0-3916222277
                                                        • Opcode ID: bc647176c8e780b1d9816c29bc9bb2dc5b36e9e34586314c5b57b6b5fe0318be
                                                        • Instruction ID: c65d4b40fd7b70ba8818020bb9a12b65c39cb418c5c2660b40a21b0387c8bfed
                                                        • Opcode Fuzzy Hash: bc647176c8e780b1d9816c29bc9bb2dc5b36e9e34586314c5b57b6b5fe0318be
                                                        • Instruction Fuzzy Hash: CC127E719002299FCB24DF59D9816EEB7F5FF48314F1481AAE849EB251DB309E81CFA0
                                                        APIs
                                                        • BlockInput.USER32(00000001), ref: 00E4EABD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: BlockInput
                                                        • String ID:
                                                        • API String ID: 3456056419-0
                                                        • Opcode ID: 318cd73cddf27daa3987bb26f42a95acd70db941959312da333f79f194d0b2c2
                                                        • Instruction ID: c6e5fcfad74385cfbd1e46ed7e672edfe286cbf8b65c90441f990f444ff7261f
                                                        • Opcode Fuzzy Hash: 318cd73cddf27daa3987bb26f42a95acd70db941959312da333f79f194d0b2c2
                                                        • Instruction Fuzzy Hash: 10E01A312102059FC710EF6AE804E9AB7E9FF987A4F008417FD49D7361DAB0A8448BA0
                                                        APIs
                                                        • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,00DF03EE), ref: 00DF09DA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled
                                                        • String ID:
                                                        • API String ID: 3192549508-0
                                                        • Opcode ID: 4b5c50f818db17bc376013691bcb504388d3da68b75250bb0dcab8d3c9b16e2f
                                                        • Instruction ID: d602318e45a48816708a98171abf27183f1b071053ae91a358b69a33122c4a09
                                                        • Opcode Fuzzy Hash: 4b5c50f818db17bc376013691bcb504388d3da68b75250bb0dcab8d3c9b16e2f
                                                        • Instruction Fuzzy Hash:
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 0
                                                        • API String ID: 0-4108050209
                                                        • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                        • Instruction ID: 086237f8a11a3da52c5668aeb9971ed72353d5e3778f31b299f4eb708a396d5d
                                                        • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                        • Instruction Fuzzy Hash: BD51677160C60D5BDB38896888597FE6795DB12380F1FC509DB86C7282C651DE02E772
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 0&
                                                        • API String ID: 0-2523485602
                                                        • Opcode ID: 8fe1c3aaac39fa8224435048ea6742a5dfdb55cfe7f68a2e6f0d55b9896ca161
                                                        • Instruction ID: 37fd747123bb5eeacf5f78fbe23bf50524dcdf31682d739622cd403f3e2fdcab
                                                        • Opcode Fuzzy Hash: 8fe1c3aaac39fa8224435048ea6742a5dfdb55cfe7f68a2e6f0d55b9896ca161
                                                        • Instruction Fuzzy Hash: 3B21D5323216118FDB28CF79C82367A73E5A794314F15862EE5A7E77D0DE35A904CB90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 75a9b737f0149dfec48e914528c09ca76beddd926b486c9d9ef572068f54badc
                                                        • Instruction ID: 2595516849b64dd01608984c4a94e6f2de57785427e615fc25cf9ce43335e721
                                                        • Opcode Fuzzy Hash: 75a9b737f0149dfec48e914528c09ca76beddd926b486c9d9ef572068f54badc
                                                        • Instruction Fuzzy Hash: B9323522D29F014DD7239635DC22335A249EFB73C9F15E73BE86AB59A6EB29D4C34100
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a72687fbed8b3bf4d7b002a690d416f019a0f46ceba1004f702850d0d3e8ec0
                                                        • Instruction ID: ca3fcd513c0966d421205fd7d593e3cf11d1c89287e5be378765f316d8d3160b
                                                        • Opcode Fuzzy Hash: 2a72687fbed8b3bf4d7b002a690d416f019a0f46ceba1004f702850d0d3e8ec0
                                                        • Instruction Fuzzy Hash: D3322A71A001A58FCF28DF29E490ABD77A1EF85304F38A567E45AF7291D230DD82DB51
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7322a5ae5a7c7005012ba43ed0c3edb4e5e45331e1f0ce6a397952cad27ef436
                                                        • Instruction ID: 651a1351ebf32231310096c3e7390c8431539d0d97e28b56443ede03a80b0cce
                                                        • Opcode Fuzzy Hash: 7322a5ae5a7c7005012ba43ed0c3edb4e5e45331e1f0ce6a397952cad27ef436
                                                        • Instruction Fuzzy Hash: 4422CE71A00609DFDF14CF64C881AEEB7B2FF44304F24426AE856A7391EB36AD54CB60
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 017013aa79834dd27d36fa133fe28d7e88d851f39d491eba9fdf86f963502fa4
                                                        • Instruction ID: c63f3632a79227e2b3359a9ffea3228eccbd93fad55f9c300268b6ed50789508
                                                        • Opcode Fuzzy Hash: 017013aa79834dd27d36fa133fe28d7e88d851f39d491eba9fdf86f963502fa4
                                                        • Instruction Fuzzy Hash: 6502A5B0A00209EBDB04DF65D881AEDBBB1FF44304F518165F816AB391E731EE54CBA5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4027b3ac59f0b67ae7484393a5fd2fda781536ee36f40378852bc7065bb9faa6
                                                        • Instruction ID: 7bb7ab5dafa459e83d52387665c8687e195ead4e6da6394f1e0c7e46e2c117dd
                                                        • Opcode Fuzzy Hash: 4027b3ac59f0b67ae7484393a5fd2fda781536ee36f40378852bc7065bb9faa6
                                                        • Instruction Fuzzy Hash: 2FB10220D2AF415DC363963A8831336B64CAFBB6C5F91D31BFC2A74D62EB2286C75141
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                        • Instruction ID: 10254459dfd4b4836da83ba0e32abde5fe5e0ec652ab1a2e25bea936fd0fa8b9
                                                        • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                        • Instruction Fuzzy Hash: BF9187361080E78ADB29463A857407EFFF15A923A131F879DE9F2CA1C5FE10C958D630
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                        • Instruction ID: 7e30f2b9b51c7699ba1387d853dbcdacfa520af935d42b186b9484c31e6b2e4f
                                                        • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                        • Instruction Fuzzy Hash: 8691737A2090E7CADB2D427A857403DFFE15A923A231F879ED5F2CA1C1FD14C5599A30
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f7aaddb4015eb613141649e04d01e9b5d06b38f0e5c0347ac3f54e4b84131196
                                                        • Instruction ID: 4a58dbcb46a20055ce4bfde2eb17e23fe2ba8aea1023f58166917ebaae4bee15
                                                        • Opcode Fuzzy Hash: f7aaddb4015eb613141649e04d01e9b5d06b38f0e5c0347ac3f54e4b84131196
                                                        • Instruction Fuzzy Hash: C461593160870DA6EA345A288C95BFE3394DF42704F1FC91AEB8ADF281D551DE42C336
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9a66832960c8db97efe026c20d2c7e23984a6d4fc9a5659f6c0111a69ad4a013
                                                        • Instruction ID: 3b955723a3665c8d6e86a5b9d6f0cb027ff7e5aed1aea67cd2c6144822b11ba3
                                                        • Opcode Fuzzy Hash: 9a66832960c8db97efe026c20d2c7e23984a6d4fc9a5659f6c0111a69ad4a013
                                                        • Instruction Fuzzy Hash: 78617C3160870EE6DE384A285C55BFE2389EF42704F9EC95AFB82DB281D651DD42D335
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                        • Instruction ID: 3e421616c6524aea60c4a84e79d431e5ef1be9d367c5e114c0d81a1f87b070e6
                                                        • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                        • Instruction Fuzzy Hash: A881863A5080E789DB2D427A853403EFFE15A923A131F879DD5F6CB1C1EE14D558EA70
                                                        APIs
                                                        • DeleteObject.GDI32(00000000), ref: 00E52B30
                                                        • DeleteObject.GDI32(00000000), ref: 00E52B43
                                                        • DestroyWindow.USER32 ref: 00E52B52
                                                        • GetDesktopWindow.USER32 ref: 00E52B6D
                                                        • GetWindowRect.USER32(00000000), ref: 00E52B74
                                                        • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00E52CA3
                                                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00E52CB1
                                                        • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E52CF8
                                                        • GetClientRect.USER32(00000000,?), ref: 00E52D04
                                                        • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00E52D40
                                                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E52D62
                                                        • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E52D75
                                                        • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E52D80
                                                        • GlobalLock.KERNEL32(00000000), ref: 00E52D89
                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E52D98
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00E52DA1
                                                        • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E52DA8
                                                        • GlobalFree.KERNEL32(00000000), ref: 00E52DB3
                                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E52DC5
                                                        • OleLoadPicture.OLEAUT32(?,00000000,00000000,00E6FC38,00000000), ref: 00E52DDB
                                                        • GlobalFree.KERNEL32(00000000), ref: 00E52DEB
                                                        • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00E52E11
                                                        • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00E52E30
                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E52E52
                                                        • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E5303F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                        • String ID: $AutoIt v3$DISPLAY$static
                                                        • API String ID: 2211948467-2373415609
                                                        • Opcode ID: aee5c18ce987602dc3724de71f809c4168f08d294183256cc70c9cf86f570075
                                                        • Instruction ID: db34057969a6b3989db4077a7b55d9a127cac4f8f4b6e3d4426e71d4f18df9ed
                                                        • Opcode Fuzzy Hash: aee5c18ce987602dc3724de71f809c4168f08d294183256cc70c9cf86f570075
                                                        • Instruction Fuzzy Hash: 9002CB71A00204EFDB14CF65DC88EAF7BB9EB49355F108549F915BB2A0CB70AD08CB60
                                                        APIs
                                                        • SetTextColor.GDI32(?,00000000), ref: 00E6712F
                                                        • GetSysColorBrush.USER32(0000000F), ref: 00E67160
                                                        • GetSysColor.USER32(0000000F), ref: 00E6716C
                                                        • SetBkColor.GDI32(?,000000FF), ref: 00E67186
                                                        • SelectObject.GDI32(?,?), ref: 00E67195
                                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 00E671C0
                                                        • GetSysColor.USER32(00000010), ref: 00E671C8
                                                        • CreateSolidBrush.GDI32(00000000), ref: 00E671CF
                                                        • FrameRect.USER32(?,?,00000000), ref: 00E671DE
                                                        • DeleteObject.GDI32(00000000), ref: 00E671E5
                                                        • InflateRect.USER32(?,000000FE,000000FE), ref: 00E67230
                                                        • FillRect.USER32(?,?,?), ref: 00E67262
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00E67284
                                                          • Part of subcall function 00E673E8: GetSysColor.USER32(00000012), ref: 00E67421
                                                          • Part of subcall function 00E673E8: SetTextColor.GDI32(?,?), ref: 00E67425
                                                          • Part of subcall function 00E673E8: GetSysColorBrush.USER32(0000000F), ref: 00E6743B
                                                          • Part of subcall function 00E673E8: GetSysColor.USER32(0000000F), ref: 00E67446
                                                          • Part of subcall function 00E673E8: GetSysColor.USER32(00000011), ref: 00E67463
                                                          • Part of subcall function 00E673E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00E67471
                                                          • Part of subcall function 00E673E8: SelectObject.GDI32(?,00000000), ref: 00E67482
                                                          • Part of subcall function 00E673E8: SetBkColor.GDI32(?,00000000), ref: 00E6748B
                                                          • Part of subcall function 00E673E8: SelectObject.GDI32(?,?), ref: 00E67498
                                                          • Part of subcall function 00E673E8: InflateRect.USER32(?,000000FF,000000FF), ref: 00E674B7
                                                          • Part of subcall function 00E673E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00E674CE
                                                          • Part of subcall function 00E673E8: GetWindowLongW.USER32(00000000,000000F0), ref: 00E674DB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                        • String ID:
                                                        • API String ID: 4124339563-0
                                                        • Opcode ID: 41fba7148c6b440e32cf535799b98927393f9bf46068e3695f90c2e46551501a
                                                        • Instruction ID: 5bb2de55de13267a5b8a7b750fcc2954a2d1d49f6b8589f263530c2faf80f631
                                                        • Opcode Fuzzy Hash: 41fba7148c6b440e32cf535799b98927393f9bf46068e3695f90c2e46551501a
                                                        • Instruction Fuzzy Hash: 56A1A472009301AFD7009F61EC48E6B7BA9FF493A4F201A19F9E2B61E1D775E948CB51
                                                        APIs
                                                        • DestroyWindow.USER32(?,?), ref: 00DE8E14
                                                        • SendMessageW.USER32(?,00001308,?,00000000), ref: 00E26AC5
                                                        • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00E26AFE
                                                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00E26F43
                                                          • Part of subcall function 00DE8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00DE8BE8,?,00000000,?,?,?,?,00DE8BBA,00000000,?), ref: 00DE8FC5
                                                        • SendMessageW.USER32(?,00001053), ref: 00E26F7F
                                                        • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00E26F96
                                                        • ImageList_Destroy.COMCTL32(00000000,?), ref: 00E26FAC
                                                        • ImageList_Destroy.COMCTL32(00000000,?), ref: 00E26FB7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                        • String ID: 0
                                                        • API String ID: 2760611726-4108050209
                                                        • Opcode ID: 86b126e9d920684419f57e601d5928336383449a6d21406b987666ba521e00f3
                                                        • Instruction ID: 3d42e1a8959ba91400db42ce799334141fc665496132ca5048c526e0fbb604d8
                                                        • Opcode Fuzzy Hash: 86b126e9d920684419f57e601d5928336383449a6d21406b987666ba521e00f3
                                                        • Instruction Fuzzy Hash: 6012FF30200261DFDB25EF15E844BBAB7F1FB49704F185269F489AB261CB32EC55DBA1
                                                        APIs
                                                        • DestroyWindow.USER32(00000000), ref: 00E5273E
                                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00E5286A
                                                        • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 00E528A9
                                                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00E528B9
                                                        • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00E52900
                                                        • GetClientRect.USER32(00000000,?), ref: 00E5290C
                                                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00E52955
                                                        • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00E52964
                                                        • GetStockObject.GDI32(00000011), ref: 00E52974
                                                        • SelectObject.GDI32(00000000,00000000), ref: 00E52978
                                                        • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00E52988
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00E52991
                                                        • DeleteDC.GDI32(00000000), ref: 00E5299A
                                                        • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00E529C6
                                                        • SendMessageW.USER32(00000030,00000000,00000001), ref: 00E529DD
                                                        • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00E52A1D
                                                        • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00E52A31
                                                        • SendMessageW.USER32(00000404,00000001,00000000), ref: 00E52A42
                                                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00E52A77
                                                        • GetStockObject.GDI32(00000011), ref: 00E52A82
                                                        • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00E52A8D
                                                        • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00E52A97
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                        • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                        • API String ID: 2910397461-517079104
                                                        • Opcode ID: 37339dfd188b8413b895f295376f3c5bc2f71c2ab3e6736c554285e88d149487
                                                        • Instruction ID: d6d8889e1a3b18d6c51183b8a52b9e438cfa8dd71f0e7d35a20124bbdb5539b0
                                                        • Opcode Fuzzy Hash: 37339dfd188b8413b895f295376f3c5bc2f71c2ab3e6736c554285e88d149487
                                                        • Instruction Fuzzy Hash: CEB18B71A00215AFEB14DFA9DC49EAF7BA9EB09711F108559FA14F7290D7B0AD04CBA0
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 00E44AED
                                                        • GetDriveTypeW.KERNEL32(?,00E6CB68,?,\\.\,00E6CC08), ref: 00E44BCA
                                                        • SetErrorMode.KERNEL32(00000000,00E6CB68,?,\\.\,00E6CC08), ref: 00E44D36
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$DriveType
                                                        • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                        • API String ID: 2907320926-4222207086
                                                        • Opcode ID: 8d51cc6ec55bd94ca7ab6a8860570f3e4cf2a1979bdbb46e1fd505fda1dadf95
                                                        • Instruction ID: ae44aa74996910bc9803926467fbf691110859bef14dd3ba9c321ea005aea759
                                                        • Opcode Fuzzy Hash: 8d51cc6ec55bd94ca7ab6a8860570f3e4cf2a1979bdbb46e1fd505fda1dadf95
                                                        • Instruction Fuzzy Hash: 5C61A0B17052059BDF04EF24EAC2BA9F7A0EB44345B286417F806BB6D1DB32ED41DB61
                                                        APIs
                                                        • GetSysColor.USER32(00000012), ref: 00E67421
                                                        • SetTextColor.GDI32(?,?), ref: 00E67425
                                                        • GetSysColorBrush.USER32(0000000F), ref: 00E6743B
                                                        • GetSysColor.USER32(0000000F), ref: 00E67446
                                                        • CreateSolidBrush.GDI32(?), ref: 00E6744B
                                                        • GetSysColor.USER32(00000011), ref: 00E67463
                                                        • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00E67471
                                                        • SelectObject.GDI32(?,00000000), ref: 00E67482
                                                        • SetBkColor.GDI32(?,00000000), ref: 00E6748B
                                                        • SelectObject.GDI32(?,?), ref: 00E67498
                                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 00E674B7
                                                        • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00E674CE
                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00E674DB
                                                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00E6752A
                                                        • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00E67554
                                                        • InflateRect.USER32(?,000000FD,000000FD), ref: 00E67572
                                                        • DrawFocusRect.USER32(?,?), ref: 00E6757D
                                                        • GetSysColor.USER32(00000011), ref: 00E6758E
                                                        • SetTextColor.GDI32(?,00000000), ref: 00E67596
                                                        • DrawTextW.USER32(?,00E670F5,000000FF,?,00000000), ref: 00E675A8
                                                        • SelectObject.GDI32(?,?), ref: 00E675BF
                                                        • DeleteObject.GDI32(?), ref: 00E675CA
                                                        • SelectObject.GDI32(?,?), ref: 00E675D0
                                                        • DeleteObject.GDI32(?), ref: 00E675D5
                                                        • SetTextColor.GDI32(?,?), ref: 00E675DB
                                                        • SetBkColor.GDI32(?,?), ref: 00E675E5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                        • String ID:
                                                        • API String ID: 1996641542-0
                                                        • Opcode ID: 0e6477da814b4303a0bd979edfe50fd4af3c800fe8c716819e93de37cdd4c1b0
                                                        • Instruction ID: 6c664435870cc1a3957cd7e4ecfd2d513c654735d04321fddbb2eacf984ca87d
                                                        • Opcode Fuzzy Hash: 0e6477da814b4303a0bd979edfe50fd4af3c800fe8c716819e93de37cdd4c1b0
                                                        • Instruction Fuzzy Hash: F3617E72900218AFDF009FA5EC48AEE7FB9EB093A4F204111F955BB2A1D7B49940CB90
                                                        APIs
                                                        • GetCursorPos.USER32(?), ref: 00E61128
                                                        • GetDesktopWindow.USER32 ref: 00E6113D
                                                        • GetWindowRect.USER32(00000000), ref: 00E61144
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00E61199
                                                        • DestroyWindow.USER32(?), ref: 00E611B9
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00E611ED
                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00E6120B
                                                        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00E6121D
                                                        • SendMessageW.USER32(00000000,00000421,?,?), ref: 00E61232
                                                        • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00E61245
                                                        • IsWindowVisible.USER32(00000000), ref: 00E612A1
                                                        • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 00E612BC
                                                        • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 00E612D0
                                                        • GetWindowRect.USER32(00000000,?), ref: 00E612E8
                                                        • MonitorFromPoint.USER32(?,?,00000002), ref: 00E6130E
                                                        • GetMonitorInfoW.USER32(00000000,?), ref: 00E61328
                                                        • CopyRect.USER32(?,?), ref: 00E6133F
                                                        • SendMessageW.USER32(00000000,00000412,00000000), ref: 00E613AA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                        • String ID: ($0$tooltips_class32
                                                        • API String ID: 698492251-4156429822
                                                        • Opcode ID: fcc6ec75d7ea2fb60851b56bb53a40129f5aa904ad05b35dce5e39d23c13f723
                                                        • Instruction ID: 04da482587b44fcd15b3d2853e4b763d24fdbbccd251a8df19195d4a19dc63fe
                                                        • Opcode Fuzzy Hash: fcc6ec75d7ea2fb60851b56bb53a40129f5aa904ad05b35dce5e39d23c13f723
                                                        • Instruction Fuzzy Hash: 03B1AE71604341AFD700DF65E884B6FBBE4FF84394F048959F99AAB261C771E844CBA2
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?), ref: 00E602E5
                                                        • _wcslen.LIBCMT ref: 00E6031F
                                                        • _wcslen.LIBCMT ref: 00E60389
                                                        • _wcslen.LIBCMT ref: 00E603F1
                                                        • _wcslen.LIBCMT ref: 00E60475
                                                        • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00E604C5
                                                        • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00E60504
                                                          • Part of subcall function 00DEF9F2: _wcslen.LIBCMT ref: 00DEF9FD
                                                          • Part of subcall function 00E3223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00E32258
                                                          • Part of subcall function 00E3223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00E3228A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$MessageSend$BuffCharUpper
                                                        • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                        • API String ID: 1103490817-719923060
                                                        • Opcode ID: 2024c09555a9b228bc8fa4b56dfff750add1dc0277281055e55e94bebc18b5a1
                                                        • Instruction ID: 1a289185165339e35f955de25de1432c8f63b334630bd15ec5c0ddbeaa7bbd5c
                                                        • Opcode Fuzzy Hash: 2024c09555a9b228bc8fa4b56dfff750add1dc0277281055e55e94bebc18b5a1
                                                        • Instruction Fuzzy Hash: 66E1BC312582118FCB24DF24D85186FB7E2FF88398B14595DF896AB3A2DB30ED45CB61
                                                        APIs
                                                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00DE8968
                                                        • GetSystemMetrics.USER32(00000007), ref: 00DE8970
                                                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00DE899B
                                                        • GetSystemMetrics.USER32(00000008), ref: 00DE89A3
                                                        • GetSystemMetrics.USER32(00000004), ref: 00DE89C8
                                                        • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00DE89E5
                                                        • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00DE89F5
                                                        • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00DE8A28
                                                        • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00DE8A3C
                                                        • GetClientRect.USER32(00000000,000000FF), ref: 00DE8A5A
                                                        • GetStockObject.GDI32(00000011), ref: 00DE8A76
                                                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 00DE8A81
                                                          • Part of subcall function 00DE912D: GetCursorPos.USER32(?), ref: 00DE9141
                                                          • Part of subcall function 00DE912D: ScreenToClient.USER32(00000000,?), ref: 00DE915E
                                                          • Part of subcall function 00DE912D: GetAsyncKeyState.USER32(00000001), ref: 00DE9183
                                                          • Part of subcall function 00DE912D: GetAsyncKeyState.USER32(00000002), ref: 00DE919D
                                                        • SetTimer.USER32(00000000,00000000,00000028,00DE90FC), ref: 00DE8AA8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                        • String ID: AutoIt v3 GUI
                                                        • API String ID: 1458621304-248962490
                                                        • Opcode ID: 088fcf1c0918e366baad5fadec16f3c0492e4624b0fdad1ccbc78251d9f032c9
                                                        • Instruction ID: 153435baf4bbbb33bbedaefe5ec7d26bede1630f3d4ec121b2d3b1e4a2cd1a2d
                                                        • Opcode Fuzzy Hash: 088fcf1c0918e366baad5fadec16f3c0492e4624b0fdad1ccbc78251d9f032c9
                                                        • Instruction Fuzzy Hash: 36B18E35A002499FDB14EFA9EC45BAE3BB5FB48354F10422AFA55A7290DB74E844CF60
                                                        APIs
                                                          • Part of subcall function 00E310F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00E31114
                                                          • Part of subcall function 00E310F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00E30B9B,?,?,?), ref: 00E31120
                                                          • Part of subcall function 00E310F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00E30B9B,?,?,?), ref: 00E3112F
                                                          • Part of subcall function 00E310F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00E30B9B,?,?,?), ref: 00E31136
                                                          • Part of subcall function 00E310F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00E3114D
                                                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00E30DF5
                                                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00E30E29
                                                        • GetLengthSid.ADVAPI32(?), ref: 00E30E40
                                                        • GetAce.ADVAPI32(?,00000000,?), ref: 00E30E7A
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00E30E96
                                                        • GetLengthSid.ADVAPI32(?), ref: 00E30EAD
                                                        • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00E30EB5
                                                        • HeapAlloc.KERNEL32(00000000), ref: 00E30EBC
                                                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00E30EDD
                                                        • CopySid.ADVAPI32(00000000), ref: 00E30EE4
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00E30F13
                                                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00E30F35
                                                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00E30F47
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E30F6E
                                                        • HeapFree.KERNEL32(00000000), ref: 00E30F75
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E30F7E
                                                        • HeapFree.KERNEL32(00000000), ref: 00E30F85
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E30F8E
                                                        • HeapFree.KERNEL32(00000000), ref: 00E30F95
                                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00E30FA1
                                                        • HeapFree.KERNEL32(00000000), ref: 00E30FA8
                                                          • Part of subcall function 00E31193: GetProcessHeap.KERNEL32(00000008,00E30BB1,?,00000000,?,00E30BB1,?), ref: 00E311A1
                                                          • Part of subcall function 00E31193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00E30BB1,?), ref: 00E311A8
                                                          • Part of subcall function 00E31193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00E30BB1,?), ref: 00E311B7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                        • String ID:
                                                        • API String ID: 4175595110-0
                                                        • Opcode ID: 0565e7218e5a346b88288ae0275fbf7bd6d2226a3d4b95fd2a2b8ad3aa906f86
                                                        • Instruction ID: ee24079c2c53b9f601d3d50582acbee7c465251b6d2360421999bce89c52afd9
                                                        • Opcode Fuzzy Hash: 0565e7218e5a346b88288ae0275fbf7bd6d2226a3d4b95fd2a2b8ad3aa906f86
                                                        • Instruction Fuzzy Hash: C4715B72A0020AAFDF209FA5EC48BAFBFB8BF05744F148115F959B6191D7719A09CB60
                                                        APIs
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E5C4BD
                                                        • RegCreateKeyExW.ADVAPI32(?,?,00000000,00E6CC08,00000000,?,00000000,?,?), ref: 00E5C544
                                                        • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 00E5C5A4
                                                        • _wcslen.LIBCMT ref: 00E5C5F4
                                                        • _wcslen.LIBCMT ref: 00E5C66F
                                                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 00E5C6B2
                                                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 00E5C7C1
                                                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 00E5C84D
                                                        • RegCloseKey.ADVAPI32(?), ref: 00E5C881
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00E5C88E
                                                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 00E5C960
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                        • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                        • API String ID: 9721498-966354055
                                                        • Opcode ID: 45ee8a27566e9ae489ad9b68c486941e4256b24e56fd251f47e245e4cf14daa5
                                                        • Instruction ID: f50140fa481705dfeb7d3ee91b62bb892845da4d4d7eb79092c3a48ac81405dc
                                                        • Opcode Fuzzy Hash: 45ee8a27566e9ae489ad9b68c486941e4256b24e56fd251f47e245e4cf14daa5
                                                        • Instruction Fuzzy Hash: 99126B356043019FC714DF24D891A2AB7E5EF88715F14889DF88AAB3A2DB31FD45CBA1
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?), ref: 00E609C6
                                                        • _wcslen.LIBCMT ref: 00E60A01
                                                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00E60A54
                                                        • _wcslen.LIBCMT ref: 00E60A8A
                                                        • _wcslen.LIBCMT ref: 00E60B06
                                                        • _wcslen.LIBCMT ref: 00E60B81
                                                          • Part of subcall function 00DEF9F2: _wcslen.LIBCMT ref: 00DEF9FD
                                                          • Part of subcall function 00E32BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00E32BFA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$MessageSend$BuffCharUpper
                                                        • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                        • API String ID: 1103490817-4258414348
                                                        • Opcode ID: 56c03db8477559ee872b84cb28f158181137f81a8c3d23f6cb6221d21753e1db
                                                        • Instruction ID: fcf6415ec71216b22d59a6659b53e6120a4013f34deacc68623436f90b44eb8d
                                                        • Opcode Fuzzy Hash: 56c03db8477559ee872b84cb28f158181137f81a8c3d23f6cb6221d21753e1db
                                                        • Instruction Fuzzy Hash: 0CE1A9312483118FCB14DF24D45096AB7E2FF98398F14995DF896AB3A2D730ED45CBA2
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$BuffCharUpper
                                                        • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                        • API String ID: 1256254125-909552448
                                                        • Opcode ID: 5ca0b980dd4ebeed424f3cc99fc8e9776748fe7e14630821f8083878a9e923e7
                                                        • Instruction ID: dadc3962c3d8d926f895f96184a3acc96d928b0738f72f72ec8f8242cddc8e1f
                                                        • Opcode Fuzzy Hash: 5ca0b980dd4ebeed424f3cc99fc8e9776748fe7e14630821f8083878a9e923e7
                                                        • Instruction Fuzzy Hash: 4871F63261022A8FCF20DE68CD615BF37919BA075AB352D29FC56B7285E631CD4CC7A0
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 00E6835A
                                                        • _wcslen.LIBCMT ref: 00E6836E
                                                        • _wcslen.LIBCMT ref: 00E68391
                                                        • _wcslen.LIBCMT ref: 00E683B4
                                                        • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00E683F2
                                                        • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00E65BF2), ref: 00E6844E
                                                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00E68487
                                                        • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00E684CA
                                                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00E68501
                                                        • FreeLibrary.KERNEL32(?), ref: 00E6850D
                                                        • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00E6851D
                                                        • DestroyIcon.USER32(?,?,?,?,?,00E65BF2), ref: 00E6852C
                                                        • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00E68549
                                                        • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00E68555
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                        • String ID: .dll$.exe$.icl
                                                        • API String ID: 799131459-1154884017
                                                        • Opcode ID: fbce1d81755cdaa2c248180ce1169e0e378531ed3c027abd080a599f69553b93
                                                        • Instruction ID: dfc09f3ff860d90ddac69924ef84eabd7a6e8af8392f0e9bd7c8ed67cb6456c4
                                                        • Opcode Fuzzy Hash: fbce1d81755cdaa2c248180ce1169e0e378531ed3c027abd080a599f69553b93
                                                        • Instruction Fuzzy Hash: 6861E071580209BEEB14DF64ED41BBF77A8FB04760F10560AF956E61D0DFB4AA80CBA0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                        • API String ID: 0-1645009161
                                                        • Opcode ID: f4718ce19975e5d35c21c262af3dff86edf657fb87854a4c84bf438e70ea197f
                                                        • Instruction ID: a17371e636c8d3971de151ace5fa54ac358206d9b2e0501d05e35d2724a5b38c
                                                        • Opcode Fuzzy Hash: f4718ce19975e5d35c21c262af3dff86edf657fb87854a4c84bf438e70ea197f
                                                        • Instruction Fuzzy Hash: 15810272A44605BBDB21AF60DC42FFE77A8EF44300F044466F909BA292EB71D941D6B1
                                                        APIs
                                                        • CharLowerBuffW.USER32(?,?), ref: 00E43EF8
                                                        • _wcslen.LIBCMT ref: 00E43F03
                                                        • _wcslen.LIBCMT ref: 00E43F5A
                                                        • _wcslen.LIBCMT ref: 00E43F98
                                                        • GetDriveTypeW.KERNEL32(?), ref: 00E43FD6
                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00E4401E
                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00E44059
                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00E44087
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: SendString_wcslen$BuffCharDriveLowerType
                                                        • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                        • API String ID: 1839972693-4113822522
                                                        • Opcode ID: 9d5606a3f7808e13a03c4f36da454529bbc24e27d7783d4f290b0af85a08ccf2
                                                        • Instruction ID: eec024dc092c363b198081a684ec308ba04540b6f94814eae1219c935f826d94
                                                        • Opcode Fuzzy Hash: 9d5606a3f7808e13a03c4f36da454529bbc24e27d7783d4f290b0af85a08ccf2
                                                        • Instruction Fuzzy Hash: 9171E0716042019FC710EF34D8819AAB7F4EF94758F10592EF895A7291EB31ED49CBA2
                                                        APIs
                                                        • LoadIconW.USER32(00000063), ref: 00E35A2E
                                                        • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00E35A40
                                                        • SetWindowTextW.USER32(?,?), ref: 00E35A57
                                                        • GetDlgItem.USER32(?,000003EA), ref: 00E35A6C
                                                        • SetWindowTextW.USER32(00000000,?), ref: 00E35A72
                                                        • GetDlgItem.USER32(?,000003E9), ref: 00E35A82
                                                        • SetWindowTextW.USER32(00000000,?), ref: 00E35A88
                                                        • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00E35AA9
                                                        • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00E35AC3
                                                        • GetWindowRect.USER32(?,?), ref: 00E35ACC
                                                        • _wcslen.LIBCMT ref: 00E35B33
                                                        • SetWindowTextW.USER32(?,?), ref: 00E35B6F
                                                        • GetDesktopWindow.USER32 ref: 00E35B75
                                                        • GetWindowRect.USER32(00000000), ref: 00E35B7C
                                                        • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00E35BD3
                                                        • GetClientRect.USER32(?,?), ref: 00E35BE0
                                                        • PostMessageW.USER32(?,00000005,00000000,?), ref: 00E35C05
                                                        • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00E35C2F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                        • String ID:
                                                        • API String ID: 895679908-0
                                                        • Opcode ID: ac9461a61e0484b8df076c4648e93d93e2921dba59486a486fccd39ed26f4af3
                                                        • Instruction ID: f250af73bd1b797ca55d2e11a6aa2e72cbd60503363bfbd40f351423a9b9e7bc
                                                        • Opcode Fuzzy Hash: ac9461a61e0484b8df076c4648e93d93e2921dba59486a486fccd39ed26f4af3
                                                        • Instruction Fuzzy Hash: 7E717F32900B05AFDB20DFA9CD49BAEBBF5FF48704F105519E582B26A0D775E944CB50
                                                        APIs
                                                        • LoadCursorW.USER32(00000000,00007F89), ref: 00E4FE27
                                                        • LoadCursorW.USER32(00000000,00007F8A), ref: 00E4FE32
                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 00E4FE3D
                                                        • LoadCursorW.USER32(00000000,00007F03), ref: 00E4FE48
                                                        • LoadCursorW.USER32(00000000,00007F8B), ref: 00E4FE53
                                                        • LoadCursorW.USER32(00000000,00007F01), ref: 00E4FE5E
                                                        • LoadCursorW.USER32(00000000,00007F81), ref: 00E4FE69
                                                        • LoadCursorW.USER32(00000000,00007F88), ref: 00E4FE74
                                                        • LoadCursorW.USER32(00000000,00007F80), ref: 00E4FE7F
                                                        • LoadCursorW.USER32(00000000,00007F86), ref: 00E4FE8A
                                                        • LoadCursorW.USER32(00000000,00007F83), ref: 00E4FE95
                                                        • LoadCursorW.USER32(00000000,00007F85), ref: 00E4FEA0
                                                        • LoadCursorW.USER32(00000000,00007F82), ref: 00E4FEAB
                                                        • LoadCursorW.USER32(00000000,00007F84), ref: 00E4FEB6
                                                        • LoadCursorW.USER32(00000000,00007F04), ref: 00E4FEC1
                                                        • LoadCursorW.USER32(00000000,00007F02), ref: 00E4FECC
                                                        • GetCursorInfo.USER32(?), ref: 00E4FEDC
                                                        • GetLastError.KERNEL32 ref: 00E4FF1E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Cursor$Load$ErrorInfoLast
                                                        • String ID:
                                                        • API String ID: 3215588206-0
                                                        • Opcode ID: 155fc73a8c43c7a4f1e35f4dc292cb9dd83c91479766050f6c06d4923cfd05cf
                                                        • Instruction ID: a0407167e7da92ecd7e187945a6359548a009c32865e79c4c59439b711d5dcdb
                                                        • Opcode Fuzzy Hash: 155fc73a8c43c7a4f1e35f4dc292cb9dd83c91479766050f6c06d4923cfd05cf
                                                        • Instruction Fuzzy Hash: EF4154B0E043196FDB109FBA9C8585EBFE8FF04754B50452AE11DE7281DB78E905CEA1
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: _wcslen
                                                        • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT$[
                                                        • API String ID: 176396367-1901692981
                                                        • Opcode ID: 66bc996829c6422a0ac2a6bc6a775779bf547e4bba6e0a4febbb07214877ed31
                                                        • Instruction ID: c1493c1f1d82c816354aee2bef500724af5393351f2a20f268cb70f4a418dc6c
                                                        • Opcode Fuzzy Hash: 66bc996829c6422a0ac2a6bc6a775779bf547e4bba6e0a4febbb07214877ed31
                                                        • Instruction Fuzzy Hash: 28E1C432A00516ABCB149F78C859AFEFFB0FF44714F54911AE466B7240DB30AE85CBA0
                                                        APIs
                                                        • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00DF00C6
                                                          • Part of subcall function 00DF00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(00EA070C,00000FA0,F0885E71,?,?,?,?,00E123B3,000000FF), ref: 00DF011C
                                                          • Part of subcall function 00DF00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00E123B3,000000FF), ref: 00DF0127
                                                          • Part of subcall function 00DF00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00E123B3,000000FF), ref: 00DF0138
                                                          • Part of subcall function 00DF00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00DF014E
                                                          • Part of subcall function 00DF00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00DF015C
                                                          • Part of subcall function 00DF00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00DF016A
                                                          • Part of subcall function 00DF00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00DF0195
                                                          • Part of subcall function 00DF00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00DF01A0
                                                        • ___scrt_fastfail.LIBCMT ref: 00DF00E7
                                                          • Part of subcall function 00DF00A3: __onexit.LIBCMT ref: 00DF00A9
                                                        Strings
                                                        • kernel32.dll, xrefs: 00DF0133
                                                        • WakeAllConditionVariable, xrefs: 00DF0162
                                                        • SleepConditionVariableCS, xrefs: 00DF0154
                                                        • InitializeConditionVariable, xrefs: 00DF0148
                                                        • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00DF0122
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                        • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                        • API String ID: 66158676-1714406822
                                                        • Opcode ID: 803f0897bc095ebfa368056f26fc3bdac5d5cb859189daf64ca322acf75d4268
                                                        • Instruction ID: d4c3cc60d236849c5cbbacb41da402d62fbe267d49a72b2ec1095201fe6ce175
                                                        • Opcode Fuzzy Hash: 803f0897bc095ebfa368056f26fc3bdac5d5cb859189daf64ca322acf75d4268
                                                        • Instruction Fuzzy Hash: DC21FC32A457156FD7107BA5BC05B7B3BA4DB0AFD1F154126FA41F7292DFB0A8048AB0
                                                        APIs
                                                        • CharLowerBuffW.USER32(00000000,00000000,00E6CC08), ref: 00E44527
                                                        • _wcslen.LIBCMT ref: 00E4453B
                                                        • _wcslen.LIBCMT ref: 00E44599
                                                        • _wcslen.LIBCMT ref: 00E445F4
                                                        • _wcslen.LIBCMT ref: 00E4463F
                                                        • _wcslen.LIBCMT ref: 00E446A7
                                                          • Part of subcall function 00DEF9F2: _wcslen.LIBCMT ref: 00DEF9FD
                                                        • GetDriveTypeW.KERNEL32(?,00E96BF0,00000061), ref: 00E44743
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$BuffCharDriveLowerType
                                                        • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                        • API String ID: 2055661098-1000479233
                                                        • Opcode ID: 7d5aa00bc2d858d54acee5a376eeda8d0f19a1f4798b99c8ac5cc359cfc9c4b4
                                                        • Instruction ID: 5d8d577c0a1587ac287139f9660f07bbd71ec931c00daf0f75222b458d4aa6df
                                                        • Opcode Fuzzy Hash: 7d5aa00bc2d858d54acee5a376eeda8d0f19a1f4798b99c8ac5cc359cfc9c4b4
                                                        • Instruction Fuzzy Hash: 1CB101B17083029BC710DF28E890A7AB7E4FF95764F50591EF496E72D1E730D845CA62
                                                        APIs
                                                          • Part of subcall function 00DE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DE9BB2
                                                        • DragQueryPoint.SHELL32(?,?), ref: 00E69147
                                                          • Part of subcall function 00E67674: ClientToScreen.USER32(?,?), ref: 00E6769A
                                                          • Part of subcall function 00E67674: GetWindowRect.USER32(?,?), ref: 00E67710
                                                          • Part of subcall function 00E67674: PtInRect.USER32(?,?,00E68B89), ref: 00E67720
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00E691B0
                                                        • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00E691BB
                                                        • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00E691DE
                                                        • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00E69225
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00E6923E
                                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00E69255
                                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00E69277
                                                        • DragFinish.SHELL32(?), ref: 00E6927E
                                                        • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00E69371
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                        • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$p#
                                                        • API String ID: 221274066-136824727
                                                        • Opcode ID: 641fb7c9fb4cd043bbeec02ac1ad3f9cb0bee32b5d42c0e07d4b755e24c33dd2
                                                        • Instruction ID: faba62be7d88a59e697837014d1ecc5d23a34e16d104df9d7074c2c8ca15cd25
                                                        • Opcode Fuzzy Hash: 641fb7c9fb4cd043bbeec02ac1ad3f9cb0bee32b5d42c0e07d4b755e24c33dd2
                                                        • Instruction Fuzzy Hash: 3B619E71108301AFC700DF65EC95DAFBBE8EF89790F10191EF595A22A1DB709A48CB62
                                                        APIs
                                                        • GetMenuItemCount.USER32(00EA1990), ref: 00E12F8D
                                                        • GetMenuItemCount.USER32(00EA1990), ref: 00E1303D
                                                        • GetCursorPos.USER32(?), ref: 00E13081
                                                        • SetForegroundWindow.USER32(00000000), ref: 00E1308A
                                                        • TrackPopupMenuEx.USER32(00EA1990,00000000,?,00000000,00000000,00000000), ref: 00E1309D
                                                        • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00E130A9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                        • String ID: 0
                                                        • API String ID: 36266755-4108050209
                                                        • Opcode ID: 2ce5d5f4ac3a6f88de760e1b801758c52f19de4585906fcb682a32df618f6a62
                                                        • Instruction ID: 22815fc6f45404d20d7e11744842a30c066c1a7f3dd6d0674f4fb1642b7aaeba
                                                        • Opcode Fuzzy Hash: 2ce5d5f4ac3a6f88de760e1b801758c52f19de4585906fcb682a32df618f6a62
                                                        • Instruction Fuzzy Hash: 0E711A70640205BEEB219F25DC49FEABFA4FF05368F204216F6257A2E0C7B1A964CB55
                                                        APIs
                                                        • DestroyWindow.USER32(00000000,?), ref: 00E66DEB
                                                          • Part of subcall function 00DD6B57: _wcslen.LIBCMT ref: 00DD6B6A
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00E66E5F
                                                        • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00E66E81
                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00E66E94
                                                        • DestroyWindow.USER32(?), ref: 00E66EB5
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00DD0000,00000000), ref: 00E66EE4
                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00E66EFD
                                                        • GetDesktopWindow.USER32 ref: 00E66F16
                                                        • GetWindowRect.USER32(00000000), ref: 00E66F1D
                                                        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00E66F35
                                                        • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00E66F4D
                                                          • Part of subcall function 00DE9944: GetWindowLongW.USER32(?,000000EB), ref: 00DE9952
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                        • String ID: 0$tooltips_class32
                                                        • API String ID: 2429346358-3619404913
                                                        • Opcode ID: 580f2ed6e2bb5794b28caa9cf4b08365e75a4dab01cc4dd4fc635af80ee64e6a
                                                        • Instruction ID: 51ece81061b3b60d8d1e7649e336a49f0906803ff27a4a512c34db10e468a772
                                                        • Opcode Fuzzy Hash: 580f2ed6e2bb5794b28caa9cf4b08365e75a4dab01cc4dd4fc635af80ee64e6a
                                                        • Instruction Fuzzy Hash: 30718970244240AFDB20CF19EC44EBBBBE9FB99748F14141EF999A7261C771E909CB12
                                                        APIs
                                                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00E4C4B0
                                                        • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00E4C4C3
                                                        • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00E4C4D7
                                                        • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00E4C4F0
                                                        • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 00E4C533
                                                        • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00E4C549
                                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00E4C554
                                                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00E4C584
                                                        • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00E4C5DC
                                                        • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00E4C5F0
                                                        • InternetCloseHandle.WININET(00000000), ref: 00E4C5FB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                        • String ID:
                                                        • API String ID: 3800310941-3916222277
                                                        • Opcode ID: 999d070ff518326f020507cf5af2fb49ac52dfbc9a65711d6339829e6ed20672
                                                        • Instruction ID: 88e7c1ad70b7eb606c3661b5d00b4387c6e72d396c092120d6c739044ea29640
                                                        • Opcode Fuzzy Hash: 999d070ff518326f020507cf5af2fb49ac52dfbc9a65711d6339829e6ed20672
                                                        • Instruction Fuzzy Hash: DE5161B0501604BFDB619F61E948ABB7BFCFF08798F20941AF945A7210DB74E948DB60
                                                        APIs
                                                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 00E68592
                                                        • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00E685A2
                                                        • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00E685AD
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00E685BA
                                                        • GlobalLock.KERNEL32(00000000), ref: 00E685C8
                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00E685D7
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00E685E0
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00E685E7
                                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00E685F8
                                                        • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,00E6FC38,?), ref: 00E68611
                                                        • GlobalFree.KERNEL32(00000000), ref: 00E68621
                                                        • GetObjectW.GDI32(?,00000018,?), ref: 00E68641
                                                        • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00E68671
                                                        • DeleteObject.GDI32(?), ref: 00E68699
                                                        • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00E686AF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                        • String ID:
                                                        • API String ID: 3840717409-0
                                                        • Opcode ID: 3c574d755ad2dab668d4ad53c44fa9498476fe19913ae823fd1fe126093f2f8c
                                                        • Instruction ID: bd3c645af8deb3646460d215f1931c57a4601013a430deff185a93b709e085a2
                                                        • Opcode Fuzzy Hash: 3c574d755ad2dab668d4ad53c44fa9498476fe19913ae823fd1fe126093f2f8c
                                                        • Instruction Fuzzy Hash: 41415971640204AFDB10DFA6ED48EAF7BB8EF89B95F204159F856E7260DB709905CB20
                                                        APIs
                                                        • VariantInit.OLEAUT32(00000000), ref: 00E41502
                                                        • VariantCopy.OLEAUT32(?,?), ref: 00E4150B
                                                        • VariantClear.OLEAUT32(?), ref: 00E41517
                                                        • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00E415FB
                                                        • VarR8FromDec.OLEAUT32(?,?), ref: 00E41657
                                                        • VariantInit.OLEAUT32(?), ref: 00E41708
                                                        • SysFreeString.OLEAUT32(?), ref: 00E4178C
                                                        • VariantClear.OLEAUT32(?), ref: 00E417D8
                                                        • VariantClear.OLEAUT32(?), ref: 00E417E7
                                                        • VariantInit.OLEAUT32(00000000), ref: 00E41823
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                        • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                        • API String ID: 1234038744-3931177956
                                                        • Opcode ID: 9f30c0516d425ce156e3a8e472512a8239a8444a331dc905402904dd5e29bf40
                                                        • Instruction ID: 0ba5da62504ff330dad120e151e5bab9ce05ef87d9adb7619cf410449519dea7
                                                        • Opcode Fuzzy Hash: 9f30c0516d425ce156e3a8e472512a8239a8444a331dc905402904dd5e29bf40
                                                        • Instruction Fuzzy Hash: 90D1DE71A00209DBDF10AF66E885BB9B7B5FF45700F248096E446BB280DB78EC85DB61
                                                        APIs
                                                          • Part of subcall function 00DD9CB3: _wcslen.LIBCMT ref: 00DD9CBD
                                                          • Part of subcall function 00E5C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00E5B6AE,?,?), ref: 00E5C9B5
                                                          • Part of subcall function 00E5C998: _wcslen.LIBCMT ref: 00E5C9F1
                                                          • Part of subcall function 00E5C998: _wcslen.LIBCMT ref: 00E5CA68
                                                          • Part of subcall function 00E5C998: _wcslen.LIBCMT ref: 00E5CA9E
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E5B6F4
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00E5B772
                                                        • RegDeleteValueW.ADVAPI32(?,?), ref: 00E5B80A
                                                        • RegCloseKey.ADVAPI32(?), ref: 00E5B87E
                                                        • RegCloseKey.ADVAPI32(?), ref: 00E5B89C
                                                        • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00E5B8F2
                                                        • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00E5B904
                                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00E5B922
                                                        • FreeLibrary.KERNEL32(00000000), ref: 00E5B983
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00E5B994
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                        • String ID: RegDeleteKeyExW$advapi32.dll
                                                        • API String ID: 146587525-4033151799
                                                        • Opcode ID: b91c8368d3f39995cf0093fee69577f6a6a12a9edb45268845c17bb177eacd7e
                                                        • Instruction ID: 2f665f922835ad53ed4bacf66e1405e0cc0c16c5c0c1e6ed6cd04948a36567f4
                                                        • Opcode Fuzzy Hash: b91c8368d3f39995cf0093fee69577f6a6a12a9edb45268845c17bb177eacd7e
                                                        • Instruction Fuzzy Hash: 6CC15C30204201AFD714DF14C495B2ABBE5FF84309F14999DE99A9B3A2CB71ED49CBA1
                                                        APIs
                                                        • GetDC.USER32(00000000), ref: 00E525D8
                                                        • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00E525E8
                                                        • CreateCompatibleDC.GDI32(?), ref: 00E525F4
                                                        • SelectObject.GDI32(00000000,?), ref: 00E52601
                                                        • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00E5266D
                                                        • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00E526AC
                                                        • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 00E526D0
                                                        • SelectObject.GDI32(?,?), ref: 00E526D8
                                                        • DeleteObject.GDI32(?), ref: 00E526E1
                                                        • DeleteDC.GDI32(?), ref: 00E526E8
                                                        • ReleaseDC.USER32(00000000,?), ref: 00E526F3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                        • String ID: (
                                                        • API String ID: 2598888154-3887548279
                                                        • Opcode ID: d757bd88942720b675b0a0394a2404b039a482931b1229c7dd29be4f5b6f0048
                                                        • Instruction ID: 57a568b387e8df6f6a39a10fd62917f724321b07723a17949e00f012ba352b64
                                                        • Opcode Fuzzy Hash: d757bd88942720b675b0a0394a2404b039a482931b1229c7dd29be4f5b6f0048
                                                        • Instruction Fuzzy Hash: A861D175D00219EFCB04CFA9D884AAEBBF5FF48710F20852AEA55B7250D774A945CFA0
                                                        APIs
                                                        • ___free_lconv_mon.LIBCMT ref: 00E0DAA1
                                                          • Part of subcall function 00E0D63C: _free.LIBCMT ref: 00E0D659
                                                          • Part of subcall function 00E0D63C: _free.LIBCMT ref: 00E0D66B
                                                          • Part of subcall function 00E0D63C: _free.LIBCMT ref: 00E0D67D
                                                          • Part of subcall function 00E0D63C: _free.LIBCMT ref: 00E0D68F
                                                          • Part of subcall function 00E0D63C: _free.LIBCMT ref: 00E0D6A1
                                                          • Part of subcall function 00E0D63C: _free.LIBCMT ref: 00E0D6B3
                                                          • Part of subcall function 00E0D63C: _free.LIBCMT ref: 00E0D6C5
                                                          • Part of subcall function 00E0D63C: _free.LIBCMT ref: 00E0D6D7
                                                          • Part of subcall function 00E0D63C: _free.LIBCMT ref: 00E0D6E9
                                                          • Part of subcall function 00E0D63C: _free.LIBCMT ref: 00E0D6FB
                                                          • Part of subcall function 00E0D63C: _free.LIBCMT ref: 00E0D70D
                                                          • Part of subcall function 00E0D63C: _free.LIBCMT ref: 00E0D71F
                                                          • Part of subcall function 00E0D63C: _free.LIBCMT ref: 00E0D731
                                                        • _free.LIBCMT ref: 00E0DA96
                                                          • Part of subcall function 00E029C8: HeapFree.KERNEL32(00000000,00000000,?,00E0D7D1,00000000,00000000,00000000,00000000,?,00E0D7F8,00000000,00000007,00000000,?,00E0DBF5,00000000), ref: 00E029DE
                                                          • Part of subcall function 00E029C8: GetLastError.KERNEL32(00000000,?,00E0D7D1,00000000,00000000,00000000,00000000,?,00E0D7F8,00000000,00000007,00000000,?,00E0DBF5,00000000,00000000), ref: 00E029F0
                                                        • _free.LIBCMT ref: 00E0DAB8
                                                        • _free.LIBCMT ref: 00E0DACD
                                                        • _free.LIBCMT ref: 00E0DAD8
                                                        • _free.LIBCMT ref: 00E0DAFA
                                                        • _free.LIBCMT ref: 00E0DB0D
                                                        • _free.LIBCMT ref: 00E0DB1B
                                                        • _free.LIBCMT ref: 00E0DB26
                                                        • _free.LIBCMT ref: 00E0DB5E
                                                        • _free.LIBCMT ref: 00E0DB65
                                                        • _free.LIBCMT ref: 00E0DB82
                                                        • _free.LIBCMT ref: 00E0DB9A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                        • String ID:
                                                        • API String ID: 161543041-0
                                                        • Opcode ID: f20fe8d1becfa7c66009799c153e718c74b9a402ce8bd24f0f7c92b63ee5bc38
                                                        • Instruction ID: b95505e544c1875140af46c6e0b1cb24f37fcdd39195edc604677fb5d7f6fad5
                                                        • Opcode Fuzzy Hash: f20fe8d1becfa7c66009799c153e718c74b9a402ce8bd24f0f7c92b63ee5bc38
                                                        • Instruction Fuzzy Hash: D13159316086059FEB21AAB9EC49B5A77E8FF40314F656419E589F71D1DB35ACC0CB20
                                                        APIs
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00E3369C
                                                        • _wcslen.LIBCMT ref: 00E336A7
                                                        • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00E33797
                                                        • GetClassNameW.USER32(?,?,00000400), ref: 00E3380C
                                                        • GetDlgCtrlID.USER32(?), ref: 00E3385D
                                                        • GetWindowRect.USER32(?,?), ref: 00E33882
                                                        • GetParent.USER32(?), ref: 00E338A0
                                                        • ScreenToClient.USER32(00000000), ref: 00E338A7
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00E33921
                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 00E3395D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                        • String ID: %s%u
                                                        • API String ID: 4010501982-679674701
                                                        • Opcode ID: b54b660293613e882f97373df8f9ee8681ceb48b58492b598c1404872b0bed6f
                                                        • Instruction ID: ef719a93cbba064ec6537c55079d19c494219f0c04a0ba2bfafd659f5e1b2e0e
                                                        • Opcode Fuzzy Hash: b54b660293613e882f97373df8f9ee8681ceb48b58492b598c1404872b0bed6f
                                                        • Instruction Fuzzy Hash: E391B271204606EFD718DF34C889FAAFBA8FF44354F109619F999E2190DB70EA45CBA1
                                                        APIs
                                                        • GetClassNameW.USER32(?,?,00000400), ref: 00E34994
                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 00E349DA
                                                        • _wcslen.LIBCMT ref: 00E349EB
                                                        • CharUpperBuffW.USER32(?,00000000), ref: 00E349F7
                                                        • _wcsstr.LIBVCRUNTIME ref: 00E34A2C
                                                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00E34A64
                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 00E34A9D
                                                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00E34AE6
                                                        • GetClassNameW.USER32(?,?,00000400), ref: 00E34B20
                                                        • GetWindowRect.USER32(?,?), ref: 00E34B8B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                        • String ID: ThumbnailClass
                                                        • API String ID: 1311036022-1241985126
                                                        • Opcode ID: 004509f6d62d63159ed1ee40bb6aced857e107550d500853f689f8a365900ea0
                                                        • Instruction ID: e1e1133f781c8041f077eab081a590c99cc982194faaa7198a9a8f68d1b4dda6
                                                        • Opcode Fuzzy Hash: 004509f6d62d63159ed1ee40bb6aced857e107550d500853f689f8a365900ea0
                                                        • Instruction Fuzzy Hash: DF91C2B11042059FDB04CF14D889BBABBE8FF84758F04946AFD85AA1D5EB30ED45CB61
                                                        APIs
                                                          • Part of subcall function 00DE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DE9BB2
                                                        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00E68D5A
                                                        • GetFocus.USER32 ref: 00E68D6A
                                                        • GetDlgCtrlID.USER32(00000000), ref: 00E68D75
                                                        • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 00E68E1D
                                                        • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00E68ECF
                                                        • GetMenuItemCount.USER32(?), ref: 00E68EEC
                                                        • GetMenuItemID.USER32(?,00000000), ref: 00E68EFC
                                                        • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00E68F2E
                                                        • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00E68F70
                                                        • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00E68FA1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                                        • String ID: 0
                                                        • API String ID: 1026556194-4108050209
                                                        • Opcode ID: 631ef1d6cbf474661f00b84d058a5be265123289f958a95253ad01245f5a7428
                                                        • Instruction ID: 78cdd8f3f47606af9c706bb21cf183e297e7fbd84b1eb39ee3162dc8dd519c5d
                                                        • Opcode Fuzzy Hash: 631ef1d6cbf474661f00b84d058a5be265123289f958a95253ad01245f5a7428
                                                        • Instruction Fuzzy Hash: B981F0716483059FD710CF14ED84AAB7BE9FB88398F101A1EF985B7291DB71E904CB62
                                                        APIs
                                                        • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00E3DC20
                                                        • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00E3DC46
                                                        • _wcslen.LIBCMT ref: 00E3DC50
                                                        • _wcsstr.LIBVCRUNTIME ref: 00E3DCA0
                                                        • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00E3DCBC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                                                        • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                        • API String ID: 1939486746-1459072770
                                                        • Opcode ID: 378a1b872456910a4fafd80fac2c96938bf7f72084c565fa1205c81b0836702f
                                                        • Instruction ID: 54560fe2f19c899fa190af4c6369c216ce2b1df0be54c2eb1a10b07308d384bc
                                                        • Opcode Fuzzy Hash: 378a1b872456910a4fafd80fac2c96938bf7f72084c565fa1205c81b0836702f
                                                        • Instruction Fuzzy Hash: B04104329443047ADB14AB75AC47EFF7BACEF52750F10516AFA00B6182EB75A901C7B4
                                                        APIs
                                                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00E5CC64
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 00E5CC8D
                                                        • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00E5CD48
                                                          • Part of subcall function 00E5CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 00E5CCAA
                                                          • Part of subcall function 00E5CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 00E5CCBD
                                                          • Part of subcall function 00E5CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00E5CCCF
                                                          • Part of subcall function 00E5CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00E5CD05
                                                          • Part of subcall function 00E5CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00E5CD28
                                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00E5CCF3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                        • String ID: RegDeleteKeyExW$advapi32.dll
                                                        • API String ID: 2734957052-4033151799
                                                        • Opcode ID: 7789cea05ba3a37fee74122f58c850740268735a9f015a889b34c9d88fcc972f
                                                        • Instruction ID: 5526d6ab74d69fc1b50bada1684b15c5c3157ae8df9a99bba31585fdb5e7c65a
                                                        • Opcode Fuzzy Hash: 7789cea05ba3a37fee74122f58c850740268735a9f015a889b34c9d88fcc972f
                                                        • Instruction Fuzzy Hash: E131A071901228BFDB209B91DC98EFFBB7CEF05785F200465E945F2100D6B08A4DDBA0
                                                        APIs
                                                        • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00E43D40
                                                        • _wcslen.LIBCMT ref: 00E43D6D
                                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 00E43D9D
                                                        • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00E43DBE
                                                        • RemoveDirectoryW.KERNEL32(?), ref: 00E43DCE
                                                        • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00E43E55
                                                        • CloseHandle.KERNEL32(00000000), ref: 00E43E60
                                                        • CloseHandle.KERNEL32(00000000), ref: 00E43E6B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                        • String ID: :$\$\??\%s
                                                        • API String ID: 1149970189-3457252023
                                                        • Opcode ID: 144c3e3685902f3d452c2ff7d0a4fb5604e8804a467fe1bbce519e35e3039c8e
                                                        • Instruction ID: 415e109f42e1645dd396dbc8e90861c22a79162096373108644ca80c46b67c6b
                                                        • Opcode Fuzzy Hash: 144c3e3685902f3d452c2ff7d0a4fb5604e8804a467fe1bbce519e35e3039c8e
                                                        • Instruction Fuzzy Hash: CE31B471900209ABDB209BA1EC49FEF37BDEF89744F2040B5F645E6160E77497448B24
                                                        APIs
                                                        • timeGetTime.WINMM ref: 00E3E6B4
                                                          • Part of subcall function 00DEE551: timeGetTime.WINMM(?,?,00E3E6D4), ref: 00DEE555
                                                        • Sleep.KERNEL32(0000000A), ref: 00E3E6E1
                                                        • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 00E3E705
                                                        • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00E3E727
                                                        • SetActiveWindow.USER32 ref: 00E3E746
                                                        • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00E3E754
                                                        • SendMessageW.USER32(00000010,00000000,00000000), ref: 00E3E773
                                                        • Sleep.KERNEL32(000000FA), ref: 00E3E77E
                                                        • IsWindow.USER32 ref: 00E3E78A
                                                        • EndDialog.USER32(00000000), ref: 00E3E79B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                        • String ID: BUTTON
                                                        • API String ID: 1194449130-3405671355
                                                        • Opcode ID: 43aeadb9eca8369ecd8fab630f75f9d170f2450cb02b712bb9fbc3c047a69418
                                                        • Instruction ID: 7f26ac2cafbeb844817a9678a648ba1dba193cadce77a67ea986b8b04a86fb63
                                                        • Opcode Fuzzy Hash: 43aeadb9eca8369ecd8fab630f75f9d170f2450cb02b712bb9fbc3c047a69418
                                                        • Instruction Fuzzy Hash: D0219570240201AFEB005F66FC9DA363F69EB5A788F102425F555B27A1DBB1AC08DA25
                                                        APIs
                                                          • Part of subcall function 00DD9CB3: _wcslen.LIBCMT ref: 00DD9CBD
                                                        • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00E3EA5D
                                                        • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00E3EA73
                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00E3EA84
                                                        • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00E3EA96
                                                        • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00E3EAA7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: SendString$_wcslen
                                                        • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                        • API String ID: 2420728520-1007645807
                                                        • Opcode ID: 66ae7830e2cb37c60c7d2db9ac998d9fd4f42fa54f01278dba9a20f0fe1ef031
                                                        • Instruction ID: f6b1f7dcf3a528d01877c8b249490efaf825868d7b46da8b562a6127a933ca6f
                                                        • Opcode Fuzzy Hash: 66ae7830e2cb37c60c7d2db9ac998d9fd4f42fa54f01278dba9a20f0fe1ef031
                                                        • Instruction Fuzzy Hash: BE117331A5036979DB20A7A6DC4AEFF6B7CEBD1B44F00142BB401B22D1EEB05D45C5B0
                                                        APIs
                                                        • GetDlgItem.USER32(?,00000001), ref: 00E35CE2
                                                        • GetWindowRect.USER32(00000000,?), ref: 00E35CFB
                                                        • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00E35D59
                                                        • GetDlgItem.USER32(?,00000002), ref: 00E35D69
                                                        • GetWindowRect.USER32(00000000,?), ref: 00E35D7B
                                                        • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00E35DCF
                                                        • GetDlgItem.USER32(?,000003E9), ref: 00E35DDD
                                                        • GetWindowRect.USER32(00000000,?), ref: 00E35DEF
                                                        • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00E35E31
                                                        • GetDlgItem.USER32(?,000003EA), ref: 00E35E44
                                                        • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00E35E5A
                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00E35E67
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Window$ItemMoveRect$Invalidate
                                                        • String ID:
                                                        • API String ID: 3096461208-0
                                                        • Opcode ID: 1469201f3d6e0e688f3c676bca46a636dc950dd933858daca106110e57b6aaee
                                                        • Instruction ID: 0328ceae2ef516b6ab3e383988e9e613a93b3ecda2c3250de5f0fd9ea012f9f3
                                                        • Opcode Fuzzy Hash: 1469201f3d6e0e688f3c676bca46a636dc950dd933858daca106110e57b6aaee
                                                        • Instruction Fuzzy Hash: 34513FB1B00605AFDB18CF69DD89AAE7BB5FB48740F609129F515F7290D7B0AE04CB50
                                                        APIs
                                                          • Part of subcall function 00DE8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00DE8BE8,?,00000000,?,?,?,?,00DE8BBA,00000000,?), ref: 00DE8FC5
                                                        • DestroyWindow.USER32(?), ref: 00DE8C81
                                                        • KillTimer.USER32(00000000,?,?,?,?,00DE8BBA,00000000,?), ref: 00DE8D1B
                                                        • DestroyAcceleratorTable.USER32(00000000), ref: 00E26973
                                                        • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00DE8BBA,00000000,?), ref: 00E269A1
                                                        • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00DE8BBA,00000000,?), ref: 00E269B8
                                                        • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00DE8BBA,00000000), ref: 00E269D4
                                                        • DeleteObject.GDI32(00000000), ref: 00E269E6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                        • String ID:
                                                        • API String ID: 641708696-0
                                                        • Opcode ID: a66eee43b43de97ebee39376114c3d43cc69e394beed53acef08999ed2a4f0a1
                                                        • Instruction ID: 25050cd595b6e479f4d8f1cead9627b9cef24b140ad6437013d429e6851e32e4
                                                        • Opcode Fuzzy Hash: a66eee43b43de97ebee39376114c3d43cc69e394beed53acef08999ed2a4f0a1
                                                        • Instruction Fuzzy Hash: 6E61C030502750DFCB25AF26E948B2677F1FB86316F24565DE08AA7560CB71BC84EFA0
                                                        APIs
                                                          • Part of subcall function 00DE9944: GetWindowLongW.USER32(?,000000EB), ref: 00DE9952
                                                        • GetSysColor.USER32(0000000F), ref: 00DE9862
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ColorLongWindow
                                                        • String ID:
                                                        • API String ID: 259745315-0
                                                        • Opcode ID: 12e2499d84009edf4ad98c97cd857821f0716fe539014680814440d30cc8ea9c
                                                        • Instruction ID: c41f5d0a0afc94c3d7c4bc5fb4005077eccf854040aa815d5cf42496b3d2ded7
                                                        • Opcode Fuzzy Hash: 12e2499d84009edf4ad98c97cd857821f0716fe539014680814440d30cc8ea9c
                                                        • Instruction Fuzzy Hash: C641D6311026909FDB206F3AAC94BBA7B65EB16370F245615F9E2972F1C7709C42DB21
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,00E1F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00E39717
                                                        • LoadStringW.USER32(00000000,?,00E1F7F8,00000001), ref: 00E39720
                                                          • Part of subcall function 00DD9CB3: _wcslen.LIBCMT ref: 00DD9CBD
                                                        • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,00E1F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00E39742
                                                        • LoadStringW.USER32(00000000,?,00E1F7F8,00000001), ref: 00E39745
                                                        • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00E39866
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: HandleLoadModuleString$Message_wcslen
                                                        • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                        • API String ID: 747408836-2268648507
                                                        • Opcode ID: 01cd2c7fd4a4bbff572c1379e4bd748baa790bc038b4085cc3d87c58d23f95bd
                                                        • Instruction ID: 999cc04a229f84f3c1ac38116af5e50e7b9bef86b81750485c4ebb831c915f43
                                                        • Opcode Fuzzy Hash: 01cd2c7fd4a4bbff572c1379e4bd748baa790bc038b4085cc3d87c58d23f95bd
                                                        • Instruction Fuzzy Hash: 27414772900209AACF04EBE4DE96EEEB778EF55740F200026F20172192EB656F48CA71
                                                        APIs
                                                          • Part of subcall function 00DD6B57: _wcslen.LIBCMT ref: 00DD6B6A
                                                        • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00E307A2
                                                        • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00E307BE
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00E307DA
                                                        • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00E30804
                                                        • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 00E3082C
                                                        • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00E30837
                                                        • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00E3083C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                        • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                        • API String ID: 323675364-22481851
                                                        • Opcode ID: c2c7d972fad29d7c0677ef46adb104916f67c82418a64f4ef64e3c9a2526c419
                                                        • Instruction ID: d42262612ec97f45ea141b79212e14728e1ebc96ea2747c9a311bc8d20178fcc
                                                        • Opcode Fuzzy Hash: c2c7d972fad29d7c0677ef46adb104916f67c82418a64f4ef64e3c9a2526c419
                                                        • Instruction Fuzzy Hash: 68411872C10229AFDF15EBA4DC959EEB778FF44750F15416AE911B32A0EB709E04CBA0
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 00E53C5C
                                                        • CoInitialize.OLE32(00000000), ref: 00E53C8A
                                                        • CoUninitialize.OLE32 ref: 00E53C94
                                                        • _wcslen.LIBCMT ref: 00E53D2D
                                                        • GetRunningObjectTable.OLE32(00000000,?), ref: 00E53DB1
                                                        • SetErrorMode.KERNEL32(00000001,00000029), ref: 00E53ED5
                                                        • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00E53F0E
                                                        • CoGetObject.OLE32(?,00000000,00E6FB98,?), ref: 00E53F2D
                                                        • SetErrorMode.KERNEL32(00000000), ref: 00E53F40
                                                        • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00E53FC4
                                                        • VariantClear.OLEAUT32(?), ref: 00E53FD8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                        • String ID:
                                                        • API String ID: 429561992-0
                                                        • Opcode ID: 298b82569bae6a3f44a3edaa60adf5b0e6e3a48308be882532091430b11fe419
                                                        • Instruction ID: 502e64f0124ea2fd0d70f7f62344d913e1cca492627210a8dfa7295a33acebe9
                                                        • Opcode Fuzzy Hash: 298b82569bae6a3f44a3edaa60adf5b0e6e3a48308be882532091430b11fe419
                                                        • Instruction Fuzzy Hash: B5C125716082019FC700DF68C88496BBBF9FF89789F10591DF989AB210DB31ED49CB62
                                                        APIs
                                                        • CoInitialize.OLE32(00000000), ref: 00E47AF3
                                                        • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00E47B8F
                                                        • SHGetDesktopFolder.SHELL32(?), ref: 00E47BA3
                                                        • CoCreateInstance.OLE32(00E6FD08,00000000,00000001,00E96E6C,?), ref: 00E47BEF
                                                        • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00E47C74
                                                        • CoTaskMemFree.OLE32(?,?), ref: 00E47CCC
                                                        • SHBrowseForFolderW.SHELL32(?), ref: 00E47D57
                                                        • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00E47D7A
                                                        • CoTaskMemFree.OLE32(00000000), ref: 00E47D81
                                                        • CoTaskMemFree.OLE32(00000000), ref: 00E47DD6
                                                        • CoUninitialize.OLE32 ref: 00E47DDC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                        • String ID:
                                                        • API String ID: 2762341140-0
                                                        • Opcode ID: 5dbd2526dca72068c952ab6636bea2753bb23da1dd2d267f18a12b8d7b060ad3
                                                        • Instruction ID: 779c3e088a9b0eb1bbb6488591bd3461a84d1a328ee27431dd19f89c3a871496
                                                        • Opcode Fuzzy Hash: 5dbd2526dca72068c952ab6636bea2753bb23da1dd2d267f18a12b8d7b060ad3
                                                        • Instruction Fuzzy Hash: B2C11C75A04109AFCB14DFA4D884DAEBBF9FF48304B148499E859EB361D731EE45CBA0
                                                        APIs
                                                        • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00E65504
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00E65515
                                                        • CharNextW.USER32(00000158), ref: 00E65544
                                                        • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00E65585
                                                        • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00E6559B
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00E655AC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CharNext
                                                        • String ID:
                                                        • API String ID: 1350042424-0
                                                        • Opcode ID: 397040db6d03b01abb90b6ca23da827e3e0eba45546c78ac559124db4ab65e43
                                                        • Instruction ID: 95f86e9dcd92bfd677a40f56255b3f9d8a570c95e2835a9254340e826d1e54b4
                                                        • Opcode Fuzzy Hash: 397040db6d03b01abb90b6ca23da827e3e0eba45546c78ac559124db4ab65e43
                                                        • Instruction Fuzzy Hash: 8C61C132A40609EFDF208F65EC849FF3BB9EB097A4F105145F576B6290D7748A84CB61
                                                        APIs
                                                        • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00E2FAAF
                                                        • SafeArrayAllocData.OLEAUT32(?), ref: 00E2FB08
                                                        • VariantInit.OLEAUT32(?), ref: 00E2FB1A
                                                        • SafeArrayAccessData.OLEAUT32(?,?), ref: 00E2FB3A
                                                        • VariantCopy.OLEAUT32(?,?), ref: 00E2FB8D
                                                        • SafeArrayUnaccessData.OLEAUT32(?), ref: 00E2FBA1
                                                        • VariantClear.OLEAUT32(?), ref: 00E2FBB6
                                                        • SafeArrayDestroyData.OLEAUT32(?), ref: 00E2FBC3
                                                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00E2FBCC
                                                        • VariantClear.OLEAUT32(?), ref: 00E2FBDE
                                                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00E2FBE9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                        • String ID:
                                                        • API String ID: 2706829360-0
                                                        • Opcode ID: dad5d48ca4bc939eec275ace79f5ea1ee0cc2efa7f94f129f4ac1668e98ee4ae
                                                        • Instruction ID: 4a2a7e387c9e5b079e9eeea2d4bd34aaec87aca7542b1f7931de8ca464924767
                                                        • Opcode Fuzzy Hash: dad5d48ca4bc939eec275ace79f5ea1ee0cc2efa7f94f129f4ac1668e98ee4ae
                                                        • Instruction Fuzzy Hash: 74416E35A002199FCB00DF69E8689AEBBB9FF48354F108079E855B7261CB70A945CFA0
                                                        APIs
                                                        • GetKeyboardState.USER32(?), ref: 00E39CA1
                                                        • GetAsyncKeyState.USER32(000000A0), ref: 00E39D22
                                                        • GetKeyState.USER32(000000A0), ref: 00E39D3D
                                                        • GetAsyncKeyState.USER32(000000A1), ref: 00E39D57
                                                        • GetKeyState.USER32(000000A1), ref: 00E39D6C
                                                        • GetAsyncKeyState.USER32(00000011), ref: 00E39D84
                                                        • GetKeyState.USER32(00000011), ref: 00E39D96
                                                        • GetAsyncKeyState.USER32(00000012), ref: 00E39DAE
                                                        • GetKeyState.USER32(00000012), ref: 00E39DC0
                                                        • GetAsyncKeyState.USER32(0000005B), ref: 00E39DD8
                                                        • GetKeyState.USER32(0000005B), ref: 00E39DEA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: State$Async$Keyboard
                                                        • String ID:
                                                        • API String ID: 541375521-0
                                                        • Opcode ID: 078d73c9b9ec13cd5844ed00a14c32af3791c26673d7734ec02530c0915c5b9d
                                                        • Instruction ID: 8613d9d0377e5a889ae645627f46cc54460cccaefb556544b8ac7802e704cfa6
                                                        • Opcode Fuzzy Hash: 078d73c9b9ec13cd5844ed00a14c32af3791c26673d7734ec02530c0915c5b9d
                                                        • Instruction Fuzzy Hash: 5641C7345047C96DFF309665880D3B6FEE06F11348F48A05AD6C6766C3DBE599C8CB92
                                                        APIs
                                                        • WSAStartup.WSOCK32(00000101,?), ref: 00E505BC
                                                        • inet_addr.WSOCK32(?), ref: 00E5061C
                                                        • gethostbyname.WSOCK32(?), ref: 00E50628
                                                        • IcmpCreateFile.IPHLPAPI ref: 00E50636
                                                        • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00E506C6
                                                        • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00E506E5
                                                        • IcmpCloseHandle.IPHLPAPI(?), ref: 00E507B9
                                                        • WSACleanup.WSOCK32 ref: 00E507BF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                        • String ID: Ping
                                                        • API String ID: 1028309954-2246546115
                                                        • Opcode ID: 9500f9c03dde3e55e2633f22e96586867d3e7f1004bb0315294084b80771065c
                                                        • Instruction ID: cabc03a70ea8d1569190a0f3f35f0ba75a3c50c3c719934dbee850a3e6f06b2a
                                                        • Opcode Fuzzy Hash: 9500f9c03dde3e55e2633f22e96586867d3e7f1004bb0315294084b80771065c
                                                        • Instruction Fuzzy Hash: 78918E756042019FD320DF25D488F16BBE0EF48318F1499AAF869AB7A2D770ED49CF91
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$BuffCharLower
                                                        • String ID: cdecl$none$stdcall$winapi
                                                        • API String ID: 707087890-567219261
                                                        • Opcode ID: 2a306f1402fdf5df521c557a0fae0e423eb721be3634b15e95060f578f8658f8
                                                        • Instruction ID: 731ad9fd6cb05a761a99f7bcd9c0dd17a50b63c552772c0885bcea4f2f6443c2
                                                        • Opcode Fuzzy Hash: 2a306f1402fdf5df521c557a0fae0e423eb721be3634b15e95060f578f8658f8
                                                        • Instruction Fuzzy Hash: 4351A031A001169BCB14DF68CE518BEB3B5EF64729B215629E866F7280DF31DD48C7A0
                                                        APIs
                                                        • CoInitialize.OLE32 ref: 00E53774
                                                        • CoUninitialize.OLE32 ref: 00E5377F
                                                        • CoCreateInstance.OLE32(?,00000000,00000017,00E6FB78,?), ref: 00E537D9
                                                        • IIDFromString.OLE32(?,?), ref: 00E5384C
                                                        • VariantInit.OLEAUT32(?), ref: 00E538E4
                                                        • VariantClear.OLEAUT32(?), ref: 00E53936
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                        • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                        • API String ID: 636576611-1287834457
                                                        • Opcode ID: 99aeb460bfe847af31e451b5509b086f951f2e4796d33e2f7583fb03265222b9
                                                        • Instruction ID: d368bc2d37c97c1e4dfa7b1eb1dcb5de81df556fb8ff8303a8bd8042f11cde3d
                                                        • Opcode Fuzzy Hash: 99aeb460bfe847af31e451b5509b086f951f2e4796d33e2f7583fb03265222b9
                                                        • Instruction Fuzzy Hash: C361B3B0608301AFD315DF65D849B6BBBE4EF48795F10180AF985A7291D770EE4CCBA2
                                                        APIs
                                                          • Part of subcall function 00DE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DE9BB2
                                                          • Part of subcall function 00DE912D: GetCursorPos.USER32(?), ref: 00DE9141
                                                          • Part of subcall function 00DE912D: ScreenToClient.USER32(00000000,?), ref: 00DE915E
                                                          • Part of subcall function 00DE912D: GetAsyncKeyState.USER32(00000001), ref: 00DE9183
                                                          • Part of subcall function 00DE912D: GetAsyncKeyState.USER32(00000002), ref: 00DE919D
                                                        • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 00E68B6B
                                                        • ImageList_EndDrag.COMCTL32 ref: 00E68B71
                                                        • ReleaseCapture.USER32 ref: 00E68B77
                                                        • SetWindowTextW.USER32(?,00000000), ref: 00E68C12
                                                        • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00E68C25
                                                        • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 00E68CFF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                        • String ID: @GUI_DRAGFILE$@GUI_DROPID$p#
                                                        • API String ID: 1924731296-655930031
                                                        • Opcode ID: 294c32a0f696baa1c660e1f5a0340cb3b78e5e63df75e88c62edfd3a36efb472
                                                        • Instruction ID: 3e44754a0343c8e387ef18c092e451bee5bf46b0ee49427e144ca0a1da941614
                                                        • Opcode Fuzzy Hash: 294c32a0f696baa1c660e1f5a0340cb3b78e5e63df75e88c62edfd3a36efb472
                                                        • Instruction Fuzzy Hash: 6A518D70245300AFD704DF15EC56FAAB7E4FB88754F00166DF996672E1CB71A908CB62
                                                        APIs
                                                        • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00E433CF
                                                          • Part of subcall function 00DD9CB3: _wcslen.LIBCMT ref: 00DD9CBD
                                                        • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00E433F0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: LoadString$_wcslen
                                                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                        • API String ID: 4099089115-3080491070
                                                        • Opcode ID: 0a6b6f07f4c16e9aba71c9d5ab560349a307c4adaaf7f20a94d923b5efe91a17
                                                        • Instruction ID: 6b345935deeea00aa9d7a809d54a679123d1779254645efb89f91f1d07a2f687
                                                        • Opcode Fuzzy Hash: 0a6b6f07f4c16e9aba71c9d5ab560349a307c4adaaf7f20a94d923b5efe91a17
                                                        • Instruction Fuzzy Hash: 5E51BC72900209AADF14EBE0DD56EEEB7B8EF18340F204066F005721A2EB756F58DB71
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$BuffCharUpper
                                                        • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                        • API String ID: 1256254125-769500911
                                                        • Opcode ID: e9173b475e307d6c5b9d6c15796ae74e5da6bd799c6f29adb4812ee2dd34652b
                                                        • Instruction ID: a0e69aa2b1b940586be0218dc200b904430e59a96337d0e748d2203138ef8aab
                                                        • Opcode Fuzzy Hash: e9173b475e307d6c5b9d6c15796ae74e5da6bd799c6f29adb4812ee2dd34652b
                                                        • Instruction Fuzzy Hash: 7541EA32A000269BCB105F7DC8965BE7BA5EFA0758F25512AE627E7285E731CD41C7A0
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 00E453A0
                                                        • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00E45416
                                                        • GetLastError.KERNEL32 ref: 00E45420
                                                        • SetErrorMode.KERNEL32(00000000,READY), ref: 00E454A7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Error$Mode$DiskFreeLastSpace
                                                        • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                        • API String ID: 4194297153-14809454
                                                        • Opcode ID: 728885b6f05bf1ecef8ce2455ab84231aa70c7189166d09b03ddf100df5cbbfa
                                                        • Instruction ID: 25239a6e6c5c43e565c8cef214264ae85626b2edbd889eb32ff717e62bd2262c
                                                        • Opcode Fuzzy Hash: 728885b6f05bf1ecef8ce2455ab84231aa70c7189166d09b03ddf100df5cbbfa
                                                        • Instruction Fuzzy Hash: 8231C536A005049FCB10DF68E485AAEBBB4EF45349F149056E416EF393D771DD86CBA0
                                                        APIs
                                                        • CreateMenu.USER32 ref: 00E63C79
                                                        • SetMenu.USER32(?,00000000), ref: 00E63C88
                                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00E63D10
                                                        • IsMenu.USER32(?), ref: 00E63D24
                                                        • CreatePopupMenu.USER32 ref: 00E63D2E
                                                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00E63D5B
                                                        • DrawMenuBar.USER32 ref: 00E63D63
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                        • String ID: 0$F
                                                        • API String ID: 161812096-3044882817
                                                        • Opcode ID: 4253dff3f70378163335360f9815d9be8d105279693864287bfea759d944f20b
                                                        • Instruction ID: e1efca86bdbdfa270561a5d3b753ec00e8b9588e3df5b1d83db7e052ce319f54
                                                        • Opcode Fuzzy Hash: 4253dff3f70378163335360f9815d9be8d105279693864287bfea759d944f20b
                                                        • Instruction Fuzzy Hash: 6B415A79A01209EFDB14CF65EC44AEA7BB5FF49394F140029F946A7360D770AA14CFA4
                                                        APIs
                                                          • Part of subcall function 00DD9CB3: _wcslen.LIBCMT ref: 00DD9CBD
                                                          • Part of subcall function 00E33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00E33CCA
                                                        • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 00E31F64
                                                        • GetDlgCtrlID.USER32 ref: 00E31F6F
                                                        • GetParent.USER32 ref: 00E31F8B
                                                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00E31F8E
                                                        • GetDlgCtrlID.USER32(?), ref: 00E31F97
                                                        • GetParent.USER32(?), ref: 00E31FAB
                                                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00E31FAE
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 711023334-1403004172
                                                        • Opcode ID: 90029ef8aec83fd6b8c1f0418d2530521f7a6b96db58c3d6c2d90ba5b9076bb1
                                                        • Instruction ID: f4e62c745147485790f39cdab1d39a1f83fb495b8c6af03970f1d38040c0dd01
                                                        • Opcode Fuzzy Hash: 90029ef8aec83fd6b8c1f0418d2530521f7a6b96db58c3d6c2d90ba5b9076bb1
                                                        • Instruction Fuzzy Hash: 6E21BA70A00214ABCF00AFA0DC88AFEBBA8EF05350F10514AF9A1B32A1DB755918DB71
                                                        APIs
                                                        • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00E63A9D
                                                        • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00E63AA0
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00E63AC7
                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00E63AEA
                                                        • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00E63B62
                                                        • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00E63BAC
                                                        • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00E63BC7
                                                        • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00E63BE2
                                                        • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00E63BF6
                                                        • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00E63C13
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$LongWindow
                                                        • String ID:
                                                        • API String ID: 312131281-0
                                                        • Opcode ID: 62beaba7d0c0d8e2287860596012d6f69fac8c9fa2712b41b5dc5a4df9d27c8f
                                                        • Instruction ID: 2690cc048c464b6e7d3f3ca9a1079f795ff571385c59a756ceb2ec6f59e5b7d6
                                                        • Opcode Fuzzy Hash: 62beaba7d0c0d8e2287860596012d6f69fac8c9fa2712b41b5dc5a4df9d27c8f
                                                        • Instruction Fuzzy Hash: F5618A75940208AFDB10DFA8DC81EEE77F8EB49744F10019AFA15B72A1C774AE45DB60
                                                        APIs
                                                        • GetCurrentThreadId.KERNEL32 ref: 00E3B151
                                                        • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00E3A1E1,?,00000001), ref: 00E3B165
                                                        • GetWindowThreadProcessId.USER32(00000000), ref: 00E3B16C
                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00E3A1E1,?,00000001), ref: 00E3B17B
                                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00E3B18D
                                                        • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,00E3A1E1,?,00000001), ref: 00E3B1A6
                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00E3A1E1,?,00000001), ref: 00E3B1B8
                                                        • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00E3A1E1,?,00000001), ref: 00E3B1FD
                                                        • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,00E3A1E1,?,00000001), ref: 00E3B212
                                                        • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,00E3A1E1,?,00000001), ref: 00E3B21D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                        • String ID:
                                                        • API String ID: 2156557900-0
                                                        • Opcode ID: bd42daf94fa6b54dbcd2e84cfe7b34f34b401061771e13154413cc4e2bfc4df5
                                                        • Instruction ID: 98cb2111c662100511d6f2a45c44d04b376891e9199d34783f67a537e91cf539
                                                        • Opcode Fuzzy Hash: bd42daf94fa6b54dbcd2e84cfe7b34f34b401061771e13154413cc4e2bfc4df5
                                                        • Instruction Fuzzy Hash: BD31C171500204BFDB109F26EC89B7E7FAABB56355F215105FA03F61A0D7B4AA48CF64
                                                        APIs
                                                        • _free.LIBCMT ref: 00E02C94
                                                          • Part of subcall function 00E029C8: HeapFree.KERNEL32(00000000,00000000,?,00E0D7D1,00000000,00000000,00000000,00000000,?,00E0D7F8,00000000,00000007,00000000,?,00E0DBF5,00000000), ref: 00E029DE
                                                          • Part of subcall function 00E029C8: GetLastError.KERNEL32(00000000,?,00E0D7D1,00000000,00000000,00000000,00000000,?,00E0D7F8,00000000,00000007,00000000,?,00E0DBF5,00000000,00000000), ref: 00E029F0
                                                        • _free.LIBCMT ref: 00E02CA0
                                                        • _free.LIBCMT ref: 00E02CAB
                                                        • _free.LIBCMT ref: 00E02CB6
                                                        • _free.LIBCMT ref: 00E02CC1
                                                        • _free.LIBCMT ref: 00E02CCC
                                                        • _free.LIBCMT ref: 00E02CD7
                                                        • _free.LIBCMT ref: 00E02CE2
                                                        • _free.LIBCMT ref: 00E02CED
                                                        • _free.LIBCMT ref: 00E02CFB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 776569668-0
                                                        • Opcode ID: f88f436d79858a0373d6833e162489f101744363a6167fc3efa64e840bd7a948
                                                        • Instruction ID: d37823e3243472eefdd78ca0449f6a73af4918f41a1ad12801ae2ba0489fb94d
                                                        • Opcode Fuzzy Hash: f88f436d79858a0373d6833e162489f101744363a6167fc3efa64e840bd7a948
                                                        • Instruction Fuzzy Hash: 5811B976500108BFCB02EF54D886CDD3BE9FF45350F9154A9FA486F262D631EE909B90
                                                        APIs
                                                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00E47FAD
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00E47FC1
                                                        • GetFileAttributesW.KERNEL32(?), ref: 00E47FEB
                                                        • SetFileAttributesW.KERNEL32(?,00000000), ref: 00E48005
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00E48017
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00E48060
                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00E480B0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectory$AttributesFile
                                                        • String ID: *.*
                                                        • API String ID: 769691225-438819550
                                                        • Opcode ID: 8176591ed21ae1ea35f08a7c45ad4ba1f0ae96c1e3d7f966229748b26022e92b
                                                        • Instruction ID: 277ca302689e3c31ac3307ea1f2df7808f2f6ceeab8ce7727bfaec78b638c84f
                                                        • Opcode Fuzzy Hash: 8176591ed21ae1ea35f08a7c45ad4ba1f0ae96c1e3d7f966229748b26022e92b
                                                        • Instruction Fuzzy Hash: 8181BE725182019BCB20EF14D844AAEB3E8FF88354F14595EF8C5E7250EB35ED49CBA2
                                                        APIs
                                                        • SetWindowLongW.USER32(?,000000EB), ref: 00DD5C7A
                                                          • Part of subcall function 00DD5D0A: GetClientRect.USER32(?,?), ref: 00DD5D30
                                                          • Part of subcall function 00DD5D0A: GetWindowRect.USER32(?,?), ref: 00DD5D71
                                                          • Part of subcall function 00DD5D0A: ScreenToClient.USER32(?,?), ref: 00DD5D99
                                                        • GetDC.USER32 ref: 00E146F5
                                                        • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00E14708
                                                        • SelectObject.GDI32(00000000,00000000), ref: 00E14716
                                                        • SelectObject.GDI32(00000000,00000000), ref: 00E1472B
                                                        • ReleaseDC.USER32(?,00000000), ref: 00E14733
                                                        • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00E147C4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                        • String ID: U
                                                        • API String ID: 4009187628-3372436214
                                                        • Opcode ID: 6a0989771acd4782a25d3346c3c0c2635fe91b52ba3784e8d53fbc55e6d1ede7
                                                        • Instruction ID: b4afc9b884bbcfa2d9a8361e2d2aeb465588dd2696cf953e4e5d982f5a6fd5d5
                                                        • Opcode Fuzzy Hash: 6a0989771acd4782a25d3346c3c0c2635fe91b52ba3784e8d53fbc55e6d1ede7
                                                        • Instruction Fuzzy Hash: 3371E071500205DFCF218F64D984AFA3BB5FF4A369F14126AE9556A3EAC3309881DF60
                                                        APIs
                                                        • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 00E435E4
                                                          • Part of subcall function 00DD9CB3: _wcslen.LIBCMT ref: 00DD9CBD
                                                        • LoadStringW.USER32(00EA2390,?,00000FFF,?), ref: 00E4360A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: LoadString$_wcslen
                                                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                        • API String ID: 4099089115-2391861430
                                                        • Opcode ID: b00e4ca8cb068d69b2ea3ff551b65822ca30ba39fc6fcf2bf608df8efe06aa5d
                                                        • Instruction ID: 139f68a58aab35da0ac128a247c41ec93ea5660675b85fc19a75ea1baf1bf41e
                                                        • Opcode Fuzzy Hash: b00e4ca8cb068d69b2ea3ff551b65822ca30ba39fc6fcf2bf608df8efe06aa5d
                                                        • Instruction Fuzzy Hash: 3C518071900209BADF14EBA0DC56EEEBB78EF04344F145166F105722A2EB716B98DFB1
                                                        APIs
                                                        • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00E4C272
                                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00E4C29A
                                                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00E4C2CA
                                                        • GetLastError.KERNEL32 ref: 00E4C322
                                                        • SetEvent.KERNEL32(?), ref: 00E4C336
                                                        • InternetCloseHandle.WININET(00000000), ref: 00E4C341
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                        • String ID:
                                                        • API String ID: 3113390036-3916222277
                                                        • Opcode ID: cf9365b8fb22290ff5a94f6a4f80628636aeec7fac41eb69426bbe83d6e15a78
                                                        • Instruction ID: 1efde9176cf0f039ad93a23e7e28acfbf9eec9fc625179c3e39e34a85a33f7aa
                                                        • Opcode Fuzzy Hash: cf9365b8fb22290ff5a94f6a4f80628636aeec7fac41eb69426bbe83d6e15a78
                                                        • Instruction Fuzzy Hash: 3131B371601604AFD7619F65AC84ABB7BFCEB09784B20951EF486A3210DB70ED059B60
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00E13AAF,?,?,Bad directive syntax error,00E6CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 00E398BC
                                                        • LoadStringW.USER32(00000000,?,00E13AAF,?), ref: 00E398C3
                                                          • Part of subcall function 00DD9CB3: _wcslen.LIBCMT ref: 00DD9CBD
                                                        • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00E39987
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: HandleLoadMessageModuleString_wcslen
                                                        • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                        • API String ID: 858772685-4153970271
                                                        • Opcode ID: d8f0ce65a2595ad869c17eb47f6e660ec917aab2c91e29f1bf6ee0536126cf66
                                                        • Instruction ID: f1396d80d662cc0e388e643c9d790db81a624a7e0c9f8404407bf8f3a9e61f9a
                                                        • Opcode Fuzzy Hash: d8f0ce65a2595ad869c17eb47f6e660ec917aab2c91e29f1bf6ee0536126cf66
                                                        • Instruction Fuzzy Hash: 9821AD3190020AABCF11AF90CC0AEEE7775FF18744F04546AF515721A2EB71AA28DB31
                                                        APIs
                                                        • GetParent.USER32 ref: 00E320AB
                                                        • GetClassNameW.USER32(00000000,?,00000100), ref: 00E320C0
                                                        • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00E3214D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameParentSend
                                                        • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                        • API String ID: 1290815626-3381328864
                                                        • Opcode ID: 5a778bf3214b010deba7ea4fa0d1fc627af93ef07e7c394913fc8959e9f19342
                                                        • Instruction ID: 1c4474db21dee4a80ee827339fbb875a9f251f125db928894d90d4a913edd0e8
                                                        • Opcode Fuzzy Hash: 5a778bf3214b010deba7ea4fa0d1fc627af93ef07e7c394913fc8959e9f19342
                                                        • Instruction Fuzzy Hash: CD110D775C5706B9FA012220EC0ADFB3B9CCB04728F31615AFB44B50D1FAA158459628
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 075f6428e1bc1bb57c05ff58a02c2d1890d0bf04d0dda5833d1c209d0edd47a6
                                                        • Instruction ID: e221f2492ff1df9ce5d1f29b55e2ea5410eab6e24e31bb993ab29b3a4ac5cba4
                                                        • Opcode Fuzzy Hash: 075f6428e1bc1bb57c05ff58a02c2d1890d0bf04d0dda5833d1c209d0edd47a6
                                                        • Instruction Fuzzy Hash: 60C1EF74A04249AFDB11DFA8D841BADBBB1AF4A314F185199E954B73D3C7309981CB60
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                        • String ID:
                                                        • API String ID: 1282221369-0
                                                        • Opcode ID: 3e7897a98f6157d80c8da71dfed9d0101d4afd49f943215413a6d51cf6ee6b16
                                                        • Instruction ID: df9055cfa266d7bb100cc732173fd7627ac32a51d50ca6d4ac14a3685733161a
                                                        • Opcode Fuzzy Hash: 3e7897a98f6157d80c8da71dfed9d0101d4afd49f943215413a6d51cf6ee6b16
                                                        • Instruction Fuzzy Hash: 5961AA72A04302AFDF21AFB4DC85A6E7BE5EF05324F24526DFA04B72C1D6319D858761
                                                        APIs
                                                        • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00E65186
                                                        • ShowWindow.USER32(?,00000000), ref: 00E651C7
                                                        • ShowWindow.USER32(?,00000005,?,00000000), ref: 00E651CD
                                                        • SetFocus.USER32(?,?,00000005,?,00000000), ref: 00E651D1
                                                          • Part of subcall function 00E66FBA: DeleteObject.GDI32(00000000), ref: 00E66FE6
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00E6520D
                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00E6521A
                                                        • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00E6524D
                                                        • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00E65287
                                                        • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00E65296
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                        • String ID:
                                                        • API String ID: 3210457359-0
                                                        • Opcode ID: 07112559626bcc15f9b701cfd5ec76f3e9d847aa33cfab2287b722c6b7307d0b
                                                        • Instruction ID: 45e5ee7597454177b3d9403eb8600b2f26635dac2182f0aa02afd4405f64d094
                                                        • Opcode Fuzzy Hash: 07112559626bcc15f9b701cfd5ec76f3e9d847aa33cfab2287b722c6b7307d0b
                                                        • Instruction Fuzzy Hash: AC51D272BC1A08BEEF209F25EC55BD93BB5FB063A4F145002F515B62E1C3B1A984DB51
                                                        APIs
                                                        • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00E26890
                                                        • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 00E268A9
                                                        • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00E268B9
                                                        • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 00E268D1
                                                        • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00E268F2
                                                        • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00DE8874,00000000,00000000,00000000,000000FF,00000000), ref: 00E26901
                                                        • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00E2691E
                                                        • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00DE8874,00000000,00000000,00000000,000000FF,00000000), ref: 00E2692D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                        • String ID:
                                                        • API String ID: 1268354404-0
                                                        • Opcode ID: 282a974d539282cb6b13294fe11717031873f7f7d50c08450517f8708264d899
                                                        • Instruction ID: 0c1a24ed43a006a9c453e481ebcc524e76f14d08d2f833049eae364a068167d0
                                                        • Opcode Fuzzy Hash: 282a974d539282cb6b13294fe11717031873f7f7d50c08450517f8708264d899
                                                        • Instruction Fuzzy Hash: E751CF70600205EFDB24DF26DC51FAA7BB5FF88754F104618F95AA72A0DBB0E990DB60
                                                        APIs
                                                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00E4C182
                                                        • GetLastError.KERNEL32 ref: 00E4C195
                                                        • SetEvent.KERNEL32(?), ref: 00E4C1A9
                                                          • Part of subcall function 00E4C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00E4C272
                                                          • Part of subcall function 00E4C253: GetLastError.KERNEL32 ref: 00E4C322
                                                          • Part of subcall function 00E4C253: SetEvent.KERNEL32(?), ref: 00E4C336
                                                          • Part of subcall function 00E4C253: InternetCloseHandle.WININET(00000000), ref: 00E4C341
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                        • String ID:
                                                        • API String ID: 337547030-0
                                                        • Opcode ID: 489f1ac5f53ad6be8ddcb80a6b184668844fba2d22c072bcaaf5d77f3c37593e
                                                        • Instruction ID: b58f7bfbd4ddb6b1ab9899b0e6ac61b32186c77030c7580ddb97dfa3e790f194
                                                        • Opcode Fuzzy Hash: 489f1ac5f53ad6be8ddcb80a6b184668844fba2d22c072bcaaf5d77f3c37593e
                                                        • Instruction Fuzzy Hash: 3431A271102A41AFDB619FB6FC04A777BF8FF18344B20541EF956A3620D7B1E8149B64
                                                        APIs
                                                          • Part of subcall function 00E33A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00E33A57
                                                          • Part of subcall function 00E33A3D: GetCurrentThreadId.KERNEL32 ref: 00E33A5E
                                                          • Part of subcall function 00E33A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00E325B3), ref: 00E33A65
                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00E325BD
                                                        • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00E325DB
                                                        • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00E325DF
                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00E325E9
                                                        • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00E32601
                                                        • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00E32605
                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00E3260F
                                                        • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00E32623
                                                        • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00E32627
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                        • String ID:
                                                        • API String ID: 2014098862-0
                                                        • Opcode ID: 7d580e1e3746d038d293ba9f2745e675fda93ebd4392284f1537742436b0ccc7
                                                        • Instruction ID: e92b90a8ec52f0ae184be20f62dbbc50e3a21adeb80078507f534ce18cdc07f4
                                                        • Opcode Fuzzy Hash: 7d580e1e3746d038d293ba9f2745e675fda93ebd4392284f1537742436b0ccc7
                                                        • Instruction Fuzzy Hash: 5201B530290210BBFB106769EC8EF6A7E99DF4AB51F201005F394BE0D1C9E12444CA6A
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00E31449,?,?,00000000), ref: 00E3180C
                                                        • HeapAlloc.KERNEL32(00000000,?,00E31449,?,?,00000000), ref: 00E31813
                                                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00E31449,?,?,00000000), ref: 00E31828
                                                        • GetCurrentProcess.KERNEL32(?,00000000,?,00E31449,?,?,00000000), ref: 00E31830
                                                        • DuplicateHandle.KERNEL32(00000000,?,00E31449,?,?,00000000), ref: 00E31833
                                                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00E31449,?,?,00000000), ref: 00E31843
                                                        • GetCurrentProcess.KERNEL32(00E31449,00000000,?,00E31449,?,?,00000000), ref: 00E3184B
                                                        • DuplicateHandle.KERNEL32(00000000,?,00E31449,?,?,00000000), ref: 00E3184E
                                                        • CreateThread.KERNEL32(00000000,00000000,00E31874,00000000,00000000,00000000), ref: 00E31868
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                        • String ID:
                                                        • API String ID: 1957940570-0
                                                        • Opcode ID: 11d43fc327c93c6c5c7fbf70a309606a72d026a92cdd7c61f214fa258842658b
                                                        • Instruction ID: 23e1fc93aa4be76868443c6198c300eaaf9d03180c264489620372d8b94549fa
                                                        • Opcode Fuzzy Hash: 11d43fc327c93c6c5c7fbf70a309606a72d026a92cdd7c61f214fa258842658b
                                                        • Instruction Fuzzy Hash: F101BF75241344BFE710AB66EC4DF673B6CEB8AB51F104451FA45EB192C6B19804CB30
                                                        APIs
                                                          • Part of subcall function 00E3D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 00E3D501
                                                          • Part of subcall function 00E3D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 00E3D50F
                                                          • Part of subcall function 00E3D4DC: CloseHandle.KERNEL32(00000000), ref: 00E3D5DC
                                                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00E5A16D
                                                        • GetLastError.KERNEL32 ref: 00E5A180
                                                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00E5A1B3
                                                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 00E5A268
                                                        • GetLastError.KERNEL32(00000000), ref: 00E5A273
                                                        • CloseHandle.KERNEL32(00000000), ref: 00E5A2C4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                        • String ID: SeDebugPrivilege
                                                        • API String ID: 2533919879-2896544425
                                                        • Opcode ID: 3ad58bb149bfac0aaea908c291d4532a282eeeab8a4896b4687e7c43e37b3655
                                                        • Instruction ID: 23f46b9fa18cce36a9ca4d80c6f6d3400c10f7bd6c77ef8e38dc414a2a49d7ed
                                                        • Opcode Fuzzy Hash: 3ad58bb149bfac0aaea908c291d4532a282eeeab8a4896b4687e7c43e37b3655
                                                        • Instruction Fuzzy Hash: 8861E4742092429FD720DF15C495F26BBE1EF44318F18899CE8669B7A3C772EC49CB92
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00E63925
                                                        • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 00E6393A
                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00E63954
                                                        • _wcslen.LIBCMT ref: 00E63999
                                                        • SendMessageW.USER32(?,00001057,00000000,?), ref: 00E639C6
                                                        • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00E639F4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window_wcslen
                                                        • String ID: SysListView32
                                                        • API String ID: 2147712094-78025650
                                                        • Opcode ID: dabfce40409da0d7f1eb5be2fb26e4f1100093728c2d73d1c55759a410f9617e
                                                        • Instruction ID: 8ac435c8ed18dcadf8b06a25b3ffb9cc643b91bae3d67d572e32270356e69f10
                                                        • Opcode Fuzzy Hash: dabfce40409da0d7f1eb5be2fb26e4f1100093728c2d73d1c55759a410f9617e
                                                        • Instruction Fuzzy Hash: 9341E231A40308ABEF219F64DC49FEA7BA9EF48394F101126F958F7281D3B19D84CB90
                                                        APIs
                                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00E3BCFD
                                                        • IsMenu.USER32(00000000), ref: 00E3BD1D
                                                        • CreatePopupMenu.USER32 ref: 00E3BD53
                                                        • GetMenuItemCount.USER32(016B5F00), ref: 00E3BDA4
                                                        • InsertMenuItemW.USER32(016B5F00,?,00000001,00000030), ref: 00E3BDCC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                        • String ID: 0$2
                                                        • API String ID: 93392585-3793063076
                                                        • Opcode ID: d6faafbffe510bb5e3afe6aec40c10a14f669085c22091154b0e26e40f0ca997
                                                        • Instruction ID: 68ed247214f65e4d4d93f5e08e3864408425b9420d63a9edbeb42526fd8cb791
                                                        • Opcode Fuzzy Hash: d6faafbffe510bb5e3afe6aec40c10a14f669085c22091154b0e26e40f0ca997
                                                        • Instruction Fuzzy Hash: 4951BD70A002099BDB20DFA9D88CBAEBFF4AF85318F645119E643F7291D7709944CB61
                                                        APIs
                                                        • LoadIconW.USER32(00000000,00007F03), ref: 00E3C913
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: IconLoad
                                                        • String ID: blank$info$question$stop$warning
                                                        • API String ID: 2457776203-404129466
                                                        • Opcode ID: e09be11db8aaff4747554c287e04b686bb52aaa597a7a8172676e124c34169dc
                                                        • Instruction ID: b486d1ae9a67dd1095d38c700bc21c9d6e27c49d741757a7f7a5506f01304153
                                                        • Opcode Fuzzy Hash: e09be11db8aaff4747554c287e04b686bb52aaa597a7a8172676e124c34169dc
                                                        • Instruction Fuzzy Hash: 6E112B3268930ABAEB049B54DC86DEB7B9CDF15358F31506BF904B6182D7A0EF009374
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                        • String ID: 0.0.0.0
                                                        • API String ID: 642191829-3771769585
                                                        • Opcode ID: fd79a53624597bc8232f1fe3506520ba87221ea54f04525cb8e1ef0e34602399
                                                        • Instruction ID: 2c7e9798684a46f9bac4a6b9698d3c290b91e73708ffe2da4f137cb85314136f
                                                        • Opcode Fuzzy Hash: fd79a53624597bc8232f1fe3506520ba87221ea54f04525cb8e1ef0e34602399
                                                        • Instruction Fuzzy Hash: E9110531904108AFCB246B22AC0AEFB7BACDB10754F11516AF545B6091EFB19A80CA70
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$LocalTime
                                                        • String ID:
                                                        • API String ID: 952045576-0
                                                        • Opcode ID: 4aa273cdca9b11b9a380974775d7dd38366c2264854e3167edf93b202297c7e6
                                                        • Instruction ID: f29de7c442389cc16341b8c2893e70d945421a05a420ce38c002f1b07b5f29c4
                                                        • Opcode Fuzzy Hash: 4aa273cdca9b11b9a380974775d7dd38366c2264854e3167edf93b202297c7e6
                                                        • Instruction Fuzzy Hash: 1A41D065C0021C75CB10EBB4888A9EFB7A9EF45710F418426E618F3262FB34E245C3F9
                                                        APIs
                                                        • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00E2682C,00000004,00000000,00000000), ref: 00DEF953
                                                        • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,00E2682C,00000004,00000000,00000000), ref: 00E2F3D1
                                                        • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00E2682C,00000004,00000000,00000000), ref: 00E2F454
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ShowWindow
                                                        • String ID:
                                                        • API String ID: 1268545403-0
                                                        • Opcode ID: 0443a9377c6fe66bb85c1c5cb0e7414ec39c2e0f0d981bf80e1c2774be288671
                                                        • Instruction ID: e54f67c191ce44e03663eb35da452e0a8c8699c902adb620ddae7707664f76be
                                                        • Opcode Fuzzy Hash: 0443a9377c6fe66bb85c1c5cb0e7414ec39c2e0f0d981bf80e1c2774be288671
                                                        • Instruction Fuzzy Hash: 464108305046C0BEC738AB2B9C8876F7BA1AB5A314F59543DE0C766562C6B1A884CF31
                                                        APIs
                                                        • DeleteObject.GDI32(00000000), ref: 00E62D1B
                                                        • GetDC.USER32(00000000), ref: 00E62D23
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00E62D2E
                                                        • ReleaseDC.USER32(00000000,00000000), ref: 00E62D3A
                                                        • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00E62D76
                                                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00E62D87
                                                        • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00E65A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00E62DC2
                                                        • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00E62DE1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                        • String ID:
                                                        • API String ID: 3864802216-0
                                                        • Opcode ID: 296825a54d981d54d28d6f33bcf020f68669a43b796a692f23cbd5d76cb1aae0
                                                        • Instruction ID: 4b7bc9823fb2635e7abf3461c687184b291fb7dc4120fef4c15c12358c9426a5
                                                        • Opcode Fuzzy Hash: 296825a54d981d54d28d6f33bcf020f68669a43b796a692f23cbd5d76cb1aae0
                                                        • Instruction Fuzzy Hash: AD31BC72241610BFEB108F11EC8AFFB3BADEF09795F044055FE48AA291C6B59C41CBA4
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: _memcmp
                                                        • String ID:
                                                        • API String ID: 2931989736-0
                                                        • Opcode ID: 81c3d5fd62eb7e4b5e694160001656b7ae539fd035dc02d59a10c64d18a2e7da
                                                        • Instruction ID: 51e1df4ced76164acfa2bfb981e6a9e128376529144a939bd912e0c9927eb5a2
                                                        • Opcode Fuzzy Hash: 81c3d5fd62eb7e4b5e694160001656b7ae539fd035dc02d59a10c64d18a2e7da
                                                        • Instruction Fuzzy Hash: 8A21B3B6A84A09B7D2145520AD87FFA779DAE20388F866021FE05BA781F720ED10C1B5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: NULL Pointer assignment$Not an Object type
                                                        • API String ID: 0-572801152
                                                        • Opcode ID: 3f01c4fffaaacc8f1bb06b5745a9e81199d9011fe9b6abb377c43fe3133b5365
                                                        • Instruction ID: 00cc0e98fcc5ffdcf825ab16fe5aa7c6c3f6f6937d39909b9d7b017e24666b8b
                                                        • Opcode Fuzzy Hash: 3f01c4fffaaacc8f1bb06b5745a9e81199d9011fe9b6abb377c43fe3133b5365
                                                        • Instruction Fuzzy Hash: 50D1C276A0060A9FDF10CF98D8A1BAEB7B5FF48344F149869E915BB280D770DD49CB50
                                                        APIs
                                                        • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,00E117FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 00E115CE
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00E117FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00E11651
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00E117FB,?,00E117FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00E116E4
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00E117FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00E116FB
                                                          • Part of subcall function 00E03820: RtlAllocateHeap.NTDLL(00000000,?,00EA1444,?,00DEFDF5,?,?,00DDA976,00000010,00EA1440,00DD13FC,?,00DD13C6,?,00DD1129), ref: 00E03852
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,00E117FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00E11777
                                                        • __freea.LIBCMT ref: 00E117A2
                                                        • __freea.LIBCMT ref: 00E117AE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                        • String ID:
                                                        • API String ID: 2829977744-0
                                                        • Opcode ID: c456c1cea82a8982838a9280a52559994e9fc2e389345f03bc8a7e33c76aa9de
                                                        • Instruction ID: 9e958870bad605cae75709c8c8a868dca457384287ea6f7ca1f3946d4d559448
                                                        • Opcode Fuzzy Hash: c456c1cea82a8982838a9280a52559994e9fc2e389345f03bc8a7e33c76aa9de
                                                        • Instruction Fuzzy Hash: D691C571E002169EDB208E74DC41AEE7BF6AF49354F18669AEA01F7281D735DCC4C760
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit
                                                        • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                        • API String ID: 2610073882-625585964
                                                        • Opcode ID: b896edbb604c5496e531ca6152ce45ed6a8680d24954019e5c64d0137a3db7c8
                                                        • Instruction ID: ecf147939d3f26e6460ed88685342f48e1b75c7fb95f3cc0f6a99f723136b2ec
                                                        • Opcode Fuzzy Hash: b896edbb604c5496e531ca6152ce45ed6a8680d24954019e5c64d0137a3db7c8
                                                        • Instruction Fuzzy Hash: B591C6B0A00215AFCF20CF65D844FAE7BB8EF45719F10995AF905BB280D7709989CFA0
                                                        APIs
                                                        • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 00E4125C
                                                        • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00E41284
                                                        • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 00E412A8
                                                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00E412D8
                                                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00E4135F
                                                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00E413C4
                                                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00E41430
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                        • String ID:
                                                        • API String ID: 2550207440-0
                                                        • Opcode ID: e01070ff40864649425be3ae307596a25e9d2971c0fda51fd2335b619938a860
                                                        • Instruction ID: 3dcf0f89565854abdd072a4235eb5df3acb9df99cfe1d34f16c755eb9245fe83
                                                        • Opcode Fuzzy Hash: e01070ff40864649425be3ae307596a25e9d2971c0fda51fd2335b619938a860
                                                        • Instruction Fuzzy Hash: CC91F275A002189FDF00DFA4E884BBEB7B5FF44314F1150A9E950FB2A1D7B4A981CBA4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ObjectSelect$BeginCreatePath
                                                        • String ID:
                                                        • API String ID: 3225163088-0
                                                        • Opcode ID: cdd1f46f587d350850d21453e8ca4fbf823ddbb2f9fda3ad30a4ed216265d606
                                                        • Instruction ID: 846e983c782fc6445c9e08e8d7e4ea3e1e43982f9e397a7658609787a82e17bc
                                                        • Opcode Fuzzy Hash: cdd1f46f587d350850d21453e8ca4fbf823ddbb2f9fda3ad30a4ed216265d606
                                                        • Instruction Fuzzy Hash: 82913471D01219EFCB11DFAACC84AEEBBB8FF49320F248059E555B7251D774AA42CB60
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 00E5396B
                                                        • CharUpperBuffW.USER32(?,?), ref: 00E53A7A
                                                        • _wcslen.LIBCMT ref: 00E53A8A
                                                        • VariantClear.OLEAUT32(?), ref: 00E53C1F
                                                          • Part of subcall function 00E40CDF: VariantInit.OLEAUT32(00000000), ref: 00E40D1F
                                                          • Part of subcall function 00E40CDF: VariantCopy.OLEAUT32(?,?), ref: 00E40D28
                                                          • Part of subcall function 00E40CDF: VariantClear.OLEAUT32(?), ref: 00E40D34
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                        • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                        • API String ID: 4137639002-1221869570
                                                        • Opcode ID: dd3c68170a421fdf9f7fda1003bdc4293f470517f51bb21ef3807f031a764717
                                                        • Instruction ID: f7fe84c41781fd3c1b34d6528977bcd5d5361e3ee129cf398590f53d13f147c1
                                                        • Opcode Fuzzy Hash: dd3c68170a421fdf9f7fda1003bdc4293f470517f51bb21ef3807f031a764717
                                                        • Instruction Fuzzy Hash: E4917B746083059FC700EF24C48196AB7E5FF88755F14896EF889AB351DB31EE49CBA2
                                                        APIs
                                                          • Part of subcall function 00E3000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E2FF41,80070057,?,?,?,00E3035E), ref: 00E3002B
                                                          • Part of subcall function 00E3000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E2FF41,80070057,?,?), ref: 00E30046
                                                          • Part of subcall function 00E3000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E2FF41,80070057,?,?), ref: 00E30054
                                                          • Part of subcall function 00E3000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E2FF41,80070057,?), ref: 00E30064
                                                        • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00E54C51
                                                        • _wcslen.LIBCMT ref: 00E54D59
                                                        • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00E54DCF
                                                        • CoTaskMemFree.OLE32(?), ref: 00E54DDA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                        • String ID: NULL Pointer assignment
                                                        • API String ID: 614568839-2785691316
                                                        • Opcode ID: cf73b6c8c531fa10af84a7c130b5c7691fd6652f03709ac61df94c27da7e830d
                                                        • Instruction ID: f30a7aab61a523bbc7031f3d412da7e7c782164c1ce54cf6b496cad85b57ea20
                                                        • Opcode Fuzzy Hash: cf73b6c8c531fa10af84a7c130b5c7691fd6652f03709ac61df94c27da7e830d
                                                        • Instruction Fuzzy Hash: A89105B1D002199BDF14DFA4D891AEEB7B9FF08314F10856AE915BB291DB709A48CF60
                                                        APIs
                                                        • GetMenu.USER32(?), ref: 00E62183
                                                        • GetMenuItemCount.USER32(00000000), ref: 00E621B5
                                                        • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00E621DD
                                                        • _wcslen.LIBCMT ref: 00E62213
                                                        • GetMenuItemID.USER32(?,?), ref: 00E6224D
                                                        • GetSubMenu.USER32(?,?), ref: 00E6225B
                                                          • Part of subcall function 00E33A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00E33A57
                                                          • Part of subcall function 00E33A3D: GetCurrentThreadId.KERNEL32 ref: 00E33A5E
                                                          • Part of subcall function 00E33A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00E325B3), ref: 00E33A65
                                                        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00E622E3
                                                          • Part of subcall function 00E3E97B: Sleep.KERNEL32 ref: 00E3E9F3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                        • String ID:
                                                        • API String ID: 4196846111-0
                                                        • Opcode ID: d6380a7d5f87861cefb41852813be866c7269f0ad0a1d495629c7fa0fe21ce0a
                                                        • Instruction ID: 6c03cc157c5c3f5473dd9737538f4efa97b8483ed35c501e5c9c69e283867191
                                                        • Opcode Fuzzy Hash: d6380a7d5f87861cefb41852813be866c7269f0ad0a1d495629c7fa0fe21ce0a
                                                        • Instruction Fuzzy Hash: 8C71AC35A40605AFCB10EF64D845AAEBBF1EF88354F10945DEA16FB351DB34AE418BA0
                                                        APIs
                                                        • IsWindow.USER32(016B5D48), ref: 00E67F37
                                                        • IsWindowEnabled.USER32(016B5D48), ref: 00E67F43
                                                        • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 00E6801E
                                                        • SendMessageW.USER32(016B5D48,000000B0,?,?), ref: 00E68051
                                                        • IsDlgButtonChecked.USER32(?,?), ref: 00E68089
                                                        • GetWindowLongW.USER32(016B5D48,000000EC), ref: 00E680AB
                                                        • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00E680C3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                        • String ID:
                                                        • API String ID: 4072528602-0
                                                        • Opcode ID: 09c57145206e5b94303e12629fa97d883bce8cd544f8e85ca17388d1d45ecb21
                                                        • Instruction ID: d6bb19d25efd2bda9e70246c686b2484bcd7f65d8b9ee32596c3bd5c3d20d415
                                                        • Opcode Fuzzy Hash: 09c57145206e5b94303e12629fa97d883bce8cd544f8e85ca17388d1d45ecb21
                                                        • Instruction Fuzzy Hash: 9B71C134688204AFEB209F64EC94FFA7BB5EF09388F146559F99577261CB71AC44CB20
                                                        APIs
                                                        • GetParent.USER32(?), ref: 00E3AEF9
                                                        • GetKeyboardState.USER32(?), ref: 00E3AF0E
                                                        • SetKeyboardState.USER32(?), ref: 00E3AF6F
                                                        • PostMessageW.USER32(?,00000101,00000010,?), ref: 00E3AF9D
                                                        • PostMessageW.USER32(?,00000101,00000011,?), ref: 00E3AFBC
                                                        • PostMessageW.USER32(?,00000101,00000012,?), ref: 00E3AFFD
                                                        • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00E3B020
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: MessagePost$KeyboardState$Parent
                                                        • String ID:
                                                        • API String ID: 87235514-0
                                                        • Opcode ID: eacad272cc84186bb82f96f6234cbcf6f6b9ff62039896bad5e9a3ba65fe34a6
                                                        • Instruction ID: 5dd8044593d69292022bde8ee04d3cf5391d1971ed2a1050f71a24629a5a1211
                                                        • Opcode Fuzzy Hash: eacad272cc84186bb82f96f6234cbcf6f6b9ff62039896bad5e9a3ba65fe34a6
                                                        • Instruction Fuzzy Hash: 7E51D1A06047D57DFB364234C84DBBBBEE95B06308F0C9599E2DA698D2C3D8ACC8D751
                                                        APIs
                                                        • GetParent.USER32(00000000), ref: 00E3AD19
                                                        • GetKeyboardState.USER32(?), ref: 00E3AD2E
                                                        • SetKeyboardState.USER32(?), ref: 00E3AD8F
                                                        • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00E3ADBB
                                                        • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00E3ADD8
                                                        • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00E3AE17
                                                        • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00E3AE38
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: MessagePost$KeyboardState$Parent
                                                        • String ID:
                                                        • API String ID: 87235514-0
                                                        • Opcode ID: d998ba8330c6594676a0e9064e88573421d2cce2bacd83d5683df6eaa750b23d
                                                        • Instruction ID: efa37c35c7e3a154274db33e8cc606776a5ac040ec14ac6b4fc1a0cea73a5d20
                                                        • Opcode Fuzzy Hash: d998ba8330c6594676a0e9064e88573421d2cce2bacd83d5683df6eaa750b23d
                                                        • Instruction Fuzzy Hash: 1C51E4A16047D53DFB368335CC49B7ABEE85B46308F0C9598E1D56A8D2C394ECC8D762
                                                        APIs
                                                        • GetConsoleCP.KERNEL32(00E13CD6,?,?,?,?,?,?,?,?,00E05BA3,?,?,00E13CD6,?,?), ref: 00E05470
                                                        • __fassign.LIBCMT ref: 00E054EB
                                                        • __fassign.LIBCMT ref: 00E05506
                                                        • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00E13CD6,00000005,00000000,00000000), ref: 00E0552C
                                                        • WriteFile.KERNEL32(?,00E13CD6,00000000,00E05BA3,00000000,?,?,?,?,?,?,?,?,?,00E05BA3,?), ref: 00E0554B
                                                        • WriteFile.KERNEL32(?,?,00000001,00E05BA3,00000000,?,?,?,?,?,?,?,?,?,00E05BA3,?), ref: 00E05584
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                        • String ID:
                                                        • API String ID: 1324828854-0
                                                        • Opcode ID: 9591aaa8f5676f4eb3b1ba3af4401b5478ef250c337960dfec8c107d3ec49379
                                                        • Instruction ID: f7a1ab904a417d6dad133c5f5808c7607280b31c8b2e1fde57c31b1605e2606a
                                                        • Opcode Fuzzy Hash: 9591aaa8f5676f4eb3b1ba3af4401b5478ef250c337960dfec8c107d3ec49379
                                                        • Instruction Fuzzy Hash: 11519F71A006499FDB10CFA8DC45AEEBBF9EF09300F14515AE555F72D1D670AA81CF60
                                                        APIs
                                                        • _ValidateLocalCookies.LIBCMT ref: 00DF2D4B
                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 00DF2D53
                                                        • _ValidateLocalCookies.LIBCMT ref: 00DF2DE1
                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 00DF2E0C
                                                        • _ValidateLocalCookies.LIBCMT ref: 00DF2E61
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                        • String ID: csm
                                                        • API String ID: 1170836740-1018135373
                                                        • Opcode ID: b59ab2b1ae98f585c981e105932d16081fc215127f60505cfff45709763bfc4c
                                                        • Instruction ID: 701b4fbe1b48ec5fbb496060bd081a5a38899765fc6ae897cfc6ab65cc8bf273
                                                        • Opcode Fuzzy Hash: b59ab2b1ae98f585c981e105932d16081fc215127f60505cfff45709763bfc4c
                                                        • Instruction Fuzzy Hash: 8741A434A0020D9BCF10DF68CC45ABEBBA5FF45364F1AC155EA18AB252D7359A45CBF0
                                                        APIs
                                                          • Part of subcall function 00E5304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00E5307A
                                                          • Part of subcall function 00E5304E: _wcslen.LIBCMT ref: 00E5309B
                                                        • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00E51112
                                                        • WSAGetLastError.WSOCK32 ref: 00E51121
                                                        • WSAGetLastError.WSOCK32 ref: 00E511C9
                                                        • closesocket.WSOCK32(00000000), ref: 00E511F9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                        • String ID:
                                                        • API String ID: 2675159561-0
                                                        • Opcode ID: 37c3eb7f1588f3c27f25a55f475a1f09f4f7146eac6950bfa1afa1fc88c7b6d2
                                                        • Instruction ID: 12feb0f649640d86a54322cac134b2b5b3def5ffb1dcf2476534b7795094ecc4
                                                        • Opcode Fuzzy Hash: 37c3eb7f1588f3c27f25a55f475a1f09f4f7146eac6950bfa1afa1fc88c7b6d2
                                                        • Instruction Fuzzy Hash: 54414831200604AFDB109F24D884BAAB7E9FF44369F14849AFD55BB281C770ED49CBE0
                                                        APIs
                                                          • Part of subcall function 00E3DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00E3CF22,?), ref: 00E3DDFD
                                                          • Part of subcall function 00E3DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00E3CF22,?), ref: 00E3DE16
                                                        • lstrcmpiW.KERNEL32(?,?), ref: 00E3CF45
                                                        • MoveFileW.KERNEL32(?,?), ref: 00E3CF7F
                                                        • _wcslen.LIBCMT ref: 00E3D005
                                                        • _wcslen.LIBCMT ref: 00E3D01B
                                                        • SHFileOperationW.SHELL32(?), ref: 00E3D061
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                        • String ID: \*.*
                                                        • API String ID: 3164238972-1173974218
                                                        • Opcode ID: 0c539f91b5841043a8ac7210683240ec4642c7574f8e9dfe7b444f9596c3af94
                                                        • Instruction ID: eb33a6cb2322c493606368568414761ebd893ce8bad0a6fa793a6ad1c9e6173b
                                                        • Opcode Fuzzy Hash: 0c539f91b5841043a8ac7210683240ec4642c7574f8e9dfe7b444f9596c3af94
                                                        • Instruction Fuzzy Hash: 094144719452185EDF12EBA4D985AEEBBF9AF08384F1010E6E505FB141EA34E688CF60
                                                        APIs
                                                        • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00E62E1C
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00E62E4F
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00E62E84
                                                        • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00E62EB6
                                                        • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00E62EE0
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00E62EF1
                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00E62F0B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: LongWindow$MessageSend
                                                        • String ID:
                                                        • API String ID: 2178440468-0
                                                        • Opcode ID: 4fb34c6a7e56cb3989a10e137deff79d210b52c2a18646e2617bca4022e0779e
                                                        • Instruction ID: 6a28db7e0c903b661d6db4beb6fe57113ee1c8ad9ca83fe9969b57393ec78e77
                                                        • Opcode Fuzzy Hash: 4fb34c6a7e56cb3989a10e137deff79d210b52c2a18646e2617bca4022e0779e
                                                        • Instruction Fuzzy Hash: BE312A306845409FDB22CF59EC84F6637E0FB9A794F1411A9FA50AF2B1C772A844DB02
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00E37769
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00E3778F
                                                        • SysAllocString.OLEAUT32(00000000), ref: 00E37792
                                                        • SysAllocString.OLEAUT32(?), ref: 00E377B0
                                                        • SysFreeString.OLEAUT32(?), ref: 00E377B9
                                                        • StringFromGUID2.OLE32(?,?,00000028), ref: 00E377DE
                                                        • SysAllocString.OLEAUT32(?), ref: 00E377EC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                        • String ID:
                                                        • API String ID: 3761583154-0
                                                        • Opcode ID: 312a950c8b8ad0b373005b9b11a75711f06cdc273efcb4bd567234a8519748fe
                                                        • Instruction ID: 903c892cb60681673052d5977ce6bdf13700b0528b9f545ecb700b1543999eeb
                                                        • Opcode Fuzzy Hash: 312a950c8b8ad0b373005b9b11a75711f06cdc273efcb4bd567234a8519748fe
                                                        • Instruction Fuzzy Hash: 722192B6608219AFDB20EFA9DC88CBB77ACEF09764B148026F955EB150D670DC45C760
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00E37842
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00E37868
                                                        • SysAllocString.OLEAUT32(00000000), ref: 00E3786B
                                                        • SysAllocString.OLEAUT32 ref: 00E3788C
                                                        • SysFreeString.OLEAUT32 ref: 00E37895
                                                        • StringFromGUID2.OLE32(?,?,00000028), ref: 00E378AF
                                                        • SysAllocString.OLEAUT32(?), ref: 00E378BD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                        • String ID:
                                                        • API String ID: 3761583154-0
                                                        • Opcode ID: 65a1c8e628b1b9f0d8a761889c4c568e391074115038cca8d1b4e40c6472974e
                                                        • Instruction ID: fb08823d71de31ae41868c22bb7ed3e8146ebf11430506d73092696f69cb1db6
                                                        • Opcode Fuzzy Hash: 65a1c8e628b1b9f0d8a761889c4c568e391074115038cca8d1b4e40c6472974e
                                                        • Instruction Fuzzy Hash: 4B21C471604214AFDB24AFA9DC8CDBB7BECEB09764B108025F954EB2A0DA70DC41CB74
                                                        APIs
                                                        • GetStdHandle.KERNEL32(0000000C), ref: 00E404F2
                                                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00E4052E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: CreateHandlePipe
                                                        • String ID: nul
                                                        • API String ID: 1424370930-2873401336
                                                        • Opcode ID: 01a51c34fc7823b1ed16952242899b84ee629250cdbafd358d90f8e16147dba9
                                                        • Instruction ID: 0c5fb8c95cf19a14b34160e551957ba5dd0888ef09d4744a74e97bca1ae71b2e
                                                        • Opcode Fuzzy Hash: 01a51c34fc7823b1ed16952242899b84ee629250cdbafd358d90f8e16147dba9
                                                        • Instruction Fuzzy Hash: CA2151755003059FDB309F29E844A9A77B4EF45768F204A29E9A1F72E0D7B49944CF20
                                                        APIs
                                                        • GetStdHandle.KERNEL32(000000F6), ref: 00E405C6
                                                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00E40601
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: CreateHandlePipe
                                                        • String ID: nul
                                                        • API String ID: 1424370930-2873401336
                                                        • Opcode ID: e04982ae40a8af3f8f1327ef663acd5cde5c803750d884eab461085a735a6aa7
                                                        • Instruction ID: 2393186ad288780df60fba7da7c3f2e2bd2d1ba81d32eb1beff758e8d6ebe07b
                                                        • Opcode Fuzzy Hash: e04982ae40a8af3f8f1327ef663acd5cde5c803750d884eab461085a735a6aa7
                                                        • Instruction Fuzzy Hash: 4E21A3755003059FDB209F69AC04AAA77E4AF85764F200A69FEA2F72E0D7B09860CB10
                                                        APIs
                                                          • Part of subcall function 00DD600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00DD604C
                                                          • Part of subcall function 00DD600E: GetStockObject.GDI32(00000011), ref: 00DD6060
                                                          • Part of subcall function 00DD600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00DD606A
                                                        • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00E64112
                                                        • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00E6411F
                                                        • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00E6412A
                                                        • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00E64139
                                                        • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00E64145
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CreateObjectStockWindow
                                                        • String ID: Msctls_Progress32
                                                        • API String ID: 1025951953-3636473452
                                                        • Opcode ID: 51da145c13992d1ae334987126d02eeb60ebf001337b07575273599fa5dd64fb
                                                        • Instruction ID: bd805739aaa69471af7dd54863154d1cb0df265630123f3f594616d4a401cb11
                                                        • Opcode Fuzzy Hash: 51da145c13992d1ae334987126d02eeb60ebf001337b07575273599fa5dd64fb
                                                        • Instruction Fuzzy Hash: 1511D0B2180219BEEF108E64CC81EEB7F9DEF09798F005111BA18A2090C6729C219BA4
                                                        APIs
                                                          • Part of subcall function 00E0D7A3: _free.LIBCMT ref: 00E0D7CC
                                                        • _free.LIBCMT ref: 00E0D82D
                                                          • Part of subcall function 00E029C8: HeapFree.KERNEL32(00000000,00000000,?,00E0D7D1,00000000,00000000,00000000,00000000,?,00E0D7F8,00000000,00000007,00000000,?,00E0DBF5,00000000), ref: 00E029DE
                                                          • Part of subcall function 00E029C8: GetLastError.KERNEL32(00000000,?,00E0D7D1,00000000,00000000,00000000,00000000,?,00E0D7F8,00000000,00000007,00000000,?,00E0DBF5,00000000,00000000), ref: 00E029F0
                                                        • _free.LIBCMT ref: 00E0D838
                                                        • _free.LIBCMT ref: 00E0D843
                                                        • _free.LIBCMT ref: 00E0D897
                                                        • _free.LIBCMT ref: 00E0D8A2
                                                        • _free.LIBCMT ref: 00E0D8AD
                                                        • _free.LIBCMT ref: 00E0D8B8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 776569668-0
                                                        • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                        • Instruction ID: 6e29414d8e50e74a22d3db26305b851d3a0c622a753a6cacf1b606b70adde491
                                                        • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                        • Instruction Fuzzy Hash: 21116071544B04BAD621BFF4CC4BFCB7BDCAF80700F84682AB299B60D2DA75B5858760
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00E3DA74
                                                        • LoadStringW.USER32(00000000), ref: 00E3DA7B
                                                        • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00E3DA91
                                                        • LoadStringW.USER32(00000000), ref: 00E3DA98
                                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00E3DADC
                                                        Strings
                                                        • %s (%d) : ==> %s: %s %s, xrefs: 00E3DAB9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: HandleLoadModuleString$Message
                                                        • String ID: %s (%d) : ==> %s: %s %s
                                                        • API String ID: 4072794657-3128320259
                                                        • Opcode ID: e46a7c1e67a283269757b793cde050e0cc262e1237e47d99b30ca626c9dd4577
                                                        • Instruction ID: fa99a6d242766a213935c40632f721e30002baac524b607c69dcc7776184f039
                                                        • Opcode Fuzzy Hash: e46a7c1e67a283269757b793cde050e0cc262e1237e47d99b30ca626c9dd4577
                                                        • Instruction Fuzzy Hash: 6F014FF25002087FE7109BA4AD89EFB766CE708741F501492F746F2041E6B49E888B74
                                                        APIs
                                                        • InterlockedExchange.KERNEL32(016AEEA0,016AEEA0), ref: 00E4097B
                                                        • EnterCriticalSection.KERNEL32(016AEE80,00000000), ref: 00E4098D
                                                        • TerminateThread.KERNEL32(?,000001F6), ref: 00E4099B
                                                        • WaitForSingleObject.KERNEL32(?,000003E8), ref: 00E409A9
                                                        • CloseHandle.KERNEL32(?), ref: 00E409B8
                                                        • InterlockedExchange.KERNEL32(016AEEA0,000001F6), ref: 00E409C8
                                                        • LeaveCriticalSection.KERNEL32(016AEE80), ref: 00E409CF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                        • String ID:
                                                        • API String ID: 3495660284-0
                                                        • Opcode ID: f98dc047e3104b351e500439d51915ea25c895f361949e717c1f399844ce0d62
                                                        • Instruction ID: ab6f15e86945f39264ceebf82a3626965a1b2623bfa5186d577ef71bc50b3acf
                                                        • Opcode Fuzzy Hash: f98dc047e3104b351e500439d51915ea25c895f361949e717c1f399844ce0d62
                                                        • Instruction Fuzzy Hash: 37F01D31442902AFD7415BA6FE98AE77A35BF41742F502025F241608B1C7B59469CFA0
                                                        APIs
                                                        • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00E51DC0
                                                        • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00E51DE1
                                                        • WSAGetLastError.WSOCK32 ref: 00E51DF2
                                                        • htons.WSOCK32(?,?,?,?,?), ref: 00E51EDB
                                                        • inet_ntoa.WSOCK32(?), ref: 00E51E8C
                                                          • Part of subcall function 00E339E8: _strlen.LIBCMT ref: 00E339F2
                                                          • Part of subcall function 00E53224: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,00E4EC0C), ref: 00E53240
                                                        • _strlen.LIBCMT ref: 00E51F35
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                                        • String ID:
                                                        • API String ID: 3203458085-0
                                                        • Opcode ID: f383931c399b2499faa9ca888e61891cfcd96435b572a8c1db86f4a4e25e2316
                                                        • Instruction ID: bcc4bd983852a73f7e6d117f50b82cead5a48aa0b109ba754c8d5b4259ccbce3
                                                        • Opcode Fuzzy Hash: f383931c399b2499faa9ca888e61891cfcd96435b572a8c1db86f4a4e25e2316
                                                        • Instruction Fuzzy Hash: 81B1B231204340AFC724DF24C895F2ABBA5EF84318F54998DF8566B2E2DB71ED45CBA1
                                                        APIs
                                                        • GetClientRect.USER32(?,?), ref: 00DD5D30
                                                        • GetWindowRect.USER32(?,?), ref: 00DD5D71
                                                        • ScreenToClient.USER32(?,?), ref: 00DD5D99
                                                        • GetClientRect.USER32(?,?), ref: 00DD5ED7
                                                        • GetWindowRect.USER32(?,?), ref: 00DD5EF8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Rect$Client$Window$Screen
                                                        • String ID:
                                                        • API String ID: 1296646539-0
                                                        • Opcode ID: 339013e1a0b5ad5719c3b72f65f4f1ce3a8250acc42c2c7b22b0b1156df08b35
                                                        • Instruction ID: bdbb4f1befd2949bc1dd594caca913fb95ea89d85c79c128c06e3bdf72341b94
                                                        • Opcode Fuzzy Hash: 339013e1a0b5ad5719c3b72f65f4f1ce3a8250acc42c2c7b22b0b1156df08b35
                                                        • Instruction Fuzzy Hash: 3AB17874A0064ADBDB14DFA9C4407EEB7F1BF48310F14941AE8A9E7394DB30EA80DB60
                                                        APIs
                                                        • __allrem.LIBCMT ref: 00E000BA
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E000D6
                                                        • __allrem.LIBCMT ref: 00E000ED
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E0010B
                                                        • __allrem.LIBCMT ref: 00E00122
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E00140
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                        • String ID:
                                                        • API String ID: 1992179935-0
                                                        • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                        • Instruction ID: d544de1e67f96183a672d4f4d5f314f062924a87b0bd0338bcc4b31ed0821857
                                                        • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                        • Instruction Fuzzy Hash: D4812972A01B069BE7209F68CC41B6B73E9EF41724F25953EF651EB2C1E770D98087A0
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00DF82D9,00DF82D9,?,?,?,00E0644F,00000001,00000001,8BE85006), ref: 00E06258
                                                        • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00E0644F,00000001,00000001,8BE85006,?,?,?), ref: 00E062DE
                                                        • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00E063D8
                                                        • __freea.LIBCMT ref: 00E063E5
                                                          • Part of subcall function 00E03820: RtlAllocateHeap.NTDLL(00000000,?,00EA1444,?,00DEFDF5,?,?,00DDA976,00000010,00EA1440,00DD13FC,?,00DD13C6,?,00DD1129), ref: 00E03852
                                                        • __freea.LIBCMT ref: 00E063EE
                                                        • __freea.LIBCMT ref: 00E06413
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1414292761-0
                                                        • Opcode ID: 6c2bf29e20e122b9a7844852cdbe1c9d34a8fd1f33b08a46b9985707a3706e89
                                                        • Instruction ID: 68d29746af0c1da428f6d5d54d6228ef27fc2489e2849c4662e0d202b7b4194f
                                                        • Opcode Fuzzy Hash: 6c2bf29e20e122b9a7844852cdbe1c9d34a8fd1f33b08a46b9985707a3706e89
                                                        • Instruction Fuzzy Hash: 3851D372600216ABDB258F64DC81FAF77A9EF94754F145229F805FA1D0DB38DCE0C6A0
                                                        APIs
                                                          • Part of subcall function 00DD9CB3: _wcslen.LIBCMT ref: 00DD9CBD
                                                          • Part of subcall function 00E5C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00E5B6AE,?,?), ref: 00E5C9B5
                                                          • Part of subcall function 00E5C998: _wcslen.LIBCMT ref: 00E5C9F1
                                                          • Part of subcall function 00E5C998: _wcslen.LIBCMT ref: 00E5CA68
                                                          • Part of subcall function 00E5C998: _wcslen.LIBCMT ref: 00E5CA9E
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E5BCCA
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00E5BD25
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00E5BD6A
                                                        • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00E5BD99
                                                        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00E5BDF3
                                                        • RegCloseKey.ADVAPI32(?), ref: 00E5BDFF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                        • String ID:
                                                        • API String ID: 1120388591-0
                                                        • Opcode ID: c0d9ca2972b6da7a9a348963a05c7832166bcd0f088b6844022dc0f5cdcaafe6
                                                        • Instruction ID: b2c8f41c6d62104c67c5f272cf9276a1392938ba6cae93be4d4bc3e93cc76946
                                                        • Opcode Fuzzy Hash: c0d9ca2972b6da7a9a348963a05c7832166bcd0f088b6844022dc0f5cdcaafe6
                                                        • Instruction Fuzzy Hash: C7819030208241AFC714DF24C895E6ABBF5FF84308F14895DF8595B2A2DB31ED49CBA2
                                                        APIs
                                                        • VariantInit.OLEAUT32(00000035), ref: 00E2F7B9
                                                        • SysAllocString.OLEAUT32(00000001), ref: 00E2F860
                                                        • VariantCopy.OLEAUT32(00E2FA64,00000000), ref: 00E2F889
                                                        • VariantClear.OLEAUT32(00E2FA64), ref: 00E2F8AD
                                                        • VariantCopy.OLEAUT32(00E2FA64,00000000), ref: 00E2F8B1
                                                        • VariantClear.OLEAUT32(?), ref: 00E2F8BB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearCopy$AllocInitString
                                                        • String ID:
                                                        • API String ID: 3859894641-0
                                                        • Opcode ID: 978a3cd9ae74517e7cce62669ea3f20f4cc1cec67b15b0bbe74a78e878ae2299
                                                        • Instruction ID: 0102b9651cdd104916f1ae06ce7df6a44b08a08cdf04debd57f79d859527e4fb
                                                        • Opcode Fuzzy Hash: 978a3cd9ae74517e7cce62669ea3f20f4cc1cec67b15b0bbe74a78e878ae2299
                                                        • Instruction Fuzzy Hash: 8B51B635500320BACF14ABA5E895B69B3F8EF85714B246477F905FF291DB708C80C766
                                                        APIs
                                                          • Part of subcall function 00DD7620: _wcslen.LIBCMT ref: 00DD7625
                                                          • Part of subcall function 00DD6B57: _wcslen.LIBCMT ref: 00DD6B6A
                                                        • GetOpenFileNameW.COMDLG32(00000058), ref: 00E494E5
                                                        • _wcslen.LIBCMT ref: 00E49506
                                                        • _wcslen.LIBCMT ref: 00E4952D
                                                        • GetSaveFileNameW.COMDLG32(00000058), ref: 00E49585
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$FileName$OpenSave
                                                        • String ID: X
                                                        • API String ID: 83654149-3081909835
                                                        • Opcode ID: 9393373c5e389870ec86dc81813b7fc52223fc1e21bfdf5aa4897d5c3a9e3a50
                                                        • Instruction ID: ef4bb4c795899c7e45f855c0de57c2a17f229d3c651dddb818fa33a8bf344212
                                                        • Opcode Fuzzy Hash: 9393373c5e389870ec86dc81813b7fc52223fc1e21bfdf5aa4897d5c3a9e3a50
                                                        • Instruction Fuzzy Hash: 9AE17F316043409FC724DF24D881A6AB7E0FF85314F15896EE899AB3A2DB31DD05CBA2
                                                        APIs
                                                          • Part of subcall function 00DE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DE9BB2
                                                        • BeginPaint.USER32(?,?,?), ref: 00DE9241
                                                        • GetWindowRect.USER32(?,?), ref: 00DE92A5
                                                        • ScreenToClient.USER32(?,?), ref: 00DE92C2
                                                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00DE92D3
                                                        • EndPaint.USER32(?,?,?,?,?), ref: 00DE9321
                                                        • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00E271EA
                                                          • Part of subcall function 00DE9339: BeginPath.GDI32(00000000), ref: 00DE9357
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                        • String ID:
                                                        • API String ID: 3050599898-0
                                                        • Opcode ID: 2e70c43308f091da6df59eb34611f90519c4a72da09f9a2071b82207ab1e1283
                                                        • Instruction ID: fafa183b0ffc1e75a395df45666bc3dee4c2a109a80d8a7ce2b2a030e7ac33f0
                                                        • Opcode Fuzzy Hash: 2e70c43308f091da6df59eb34611f90519c4a72da09f9a2071b82207ab1e1283
                                                        • Instruction Fuzzy Hash: 4741B330106350AFD711EF16D894FBBBBA8EF8A760F140269F994A71A1C7709849CB71
                                                        APIs
                                                        • InterlockedExchange.KERNEL32(?,000001F5), ref: 00E4080C
                                                        • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00E40847
                                                        • EnterCriticalSection.KERNEL32(?), ref: 00E40863
                                                        • LeaveCriticalSection.KERNEL32(?), ref: 00E408DC
                                                        • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 00E408F3
                                                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 00E40921
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                        • String ID:
                                                        • API String ID: 3368777196-0
                                                        • Opcode ID: 8791281f3c91ba207f42ae4378e7b5c82ffa4e569a4d73eb9eea02f1ffbc356f
                                                        • Instruction ID: 61317fb150d899f1a2230509f0bc13d6761fe16a071f99dbe251caae1f61c061
                                                        • Opcode Fuzzy Hash: 8791281f3c91ba207f42ae4378e7b5c82ffa4e569a4d73eb9eea02f1ffbc356f
                                                        • Instruction Fuzzy Hash: 77415B71900205AFDF14AF55EC85A6A7778FF44700F1440B5EE00AA297DB70EE64DBA0
                                                        APIs
                                                        • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,00E2F3AB,00000000,?,?,00000000,?,00E2682C,00000004,00000000,00000000), ref: 00E6824C
                                                        • EnableWindow.USER32(?,00000000), ref: 00E68272
                                                        • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00E682D1
                                                        • ShowWindow.USER32(?,00000004), ref: 00E682E5
                                                        • EnableWindow.USER32(?,00000001), ref: 00E6830B
                                                        • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00E6832F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Window$Show$Enable$MessageSend
                                                        • String ID:
                                                        • API String ID: 642888154-0
                                                        • Opcode ID: ff663e982117fa6ca4e182638ba6cfe17396dcd2611f2ab1777561bf4874772c
                                                        • Instruction ID: de508e9c3a66c51464514d15b14907c6b907bbf363d1e625bef87685ea8e515f
                                                        • Opcode Fuzzy Hash: ff663e982117fa6ca4e182638ba6cfe17396dcd2611f2ab1777561bf4874772c
                                                        • Instruction Fuzzy Hash: 0E412A30281640EFDB11CF16E9A8BE53BE0FB4A758F1823A9E5486F272C7716845CB41
                                                        APIs
                                                        • IsWindowVisible.USER32(?), ref: 00E34C95
                                                        • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00E34CB2
                                                        • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00E34CEA
                                                        • _wcslen.LIBCMT ref: 00E34D08
                                                        • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00E34D10
                                                        • _wcsstr.LIBVCRUNTIME ref: 00E34D1A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                        • String ID:
                                                        • API String ID: 72514467-0
                                                        • Opcode ID: e3e08892dc8ab2a1b0e57e3d6639aff55214adb33b8d31157a608ccb1cc2a559
                                                        • Instruction ID: 9a7519437c18348fec0ea3d54bf25e2bdc3955ec84d7b1c87767225a23a40d04
                                                        • Opcode Fuzzy Hash: e3e08892dc8ab2a1b0e57e3d6639aff55214adb33b8d31157a608ccb1cc2a559
                                                        • Instruction Fuzzy Hash: 1F21D7B12042447BEB155B26EC49E7F7F9CDF45B54F109029F805EA191DAA1EC01D6B1
                                                        APIs
                                                          • Part of subcall function 00DD3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00DD3A97,?,?,00DD2E7F,?,?,?,00000000), ref: 00DD3AC2
                                                        • _wcslen.LIBCMT ref: 00E4587B
                                                        • CoInitialize.OLE32(00000000), ref: 00E45995
                                                        • CoCreateInstance.OLE32(00E6FCF8,00000000,00000001,00E6FB68,?), ref: 00E459AE
                                                        • CoUninitialize.OLE32 ref: 00E459CC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                        • String ID: .lnk
                                                        • API String ID: 3172280962-24824748
                                                        • Opcode ID: 18bac70a79feb3742850d5d0beedf5a2067fe317b40786e8b3dc89cf4f1fc905
                                                        • Instruction ID: 5a8c580498550689c1b8c9d007fcfb1530f986dfc4f0aae87e709cbf65b0d85c
                                                        • Opcode Fuzzy Hash: 18bac70a79feb3742850d5d0beedf5a2067fe317b40786e8b3dc89cf4f1fc905
                                                        • Instruction Fuzzy Hash: 73D16472608701DFC714DF24D48092ABBE1EF89714F14895EF889AB362DB31EC45CBA2
                                                        APIs
                                                          • Part of subcall function 00E30FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00E30FCA
                                                          • Part of subcall function 00E30FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00E30FD6
                                                          • Part of subcall function 00E30FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00E30FE5
                                                          • Part of subcall function 00E30FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00E30FEC
                                                          • Part of subcall function 00E30FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00E31002
                                                        • GetLengthSid.ADVAPI32(?,00000000,00E31335), ref: 00E317AE
                                                        • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00E317BA
                                                        • HeapAlloc.KERNEL32(00000000), ref: 00E317C1
                                                        • CopySid.ADVAPI32(00000000,00000000,?), ref: 00E317DA
                                                        • GetProcessHeap.KERNEL32(00000000,00000000,00E31335), ref: 00E317EE
                                                        • HeapFree.KERNEL32(00000000), ref: 00E317F5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                        • String ID:
                                                        • API String ID: 3008561057-0
                                                        • Opcode ID: 607c5c53dff9cb5b429cca06c892dd308a42a1f9f70743fc46cc09bdba73cfcb
                                                        • Instruction ID: 258faf47cc527e6780575a4d58145e1615f4208664b4c66e578e856c7dd21d1e
                                                        • Opcode Fuzzy Hash: 607c5c53dff9cb5b429cca06c892dd308a42a1f9f70743fc46cc09bdba73cfcb
                                                        • Instruction Fuzzy Hash: FE119D31505205EFDB209FA5DC49BBF7FB9EB42359F245059F481B7210C7759944CB60
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00E314FF
                                                        • OpenProcessToken.ADVAPI32(00000000), ref: 00E31506
                                                        • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00E31515
                                                        • CloseHandle.KERNEL32(00000004), ref: 00E31520
                                                        • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00E3154F
                                                        • DestroyEnvironmentBlock.USERENV(00000000), ref: 00E31563
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                        • String ID:
                                                        • API String ID: 1413079979-0
                                                        • Opcode ID: eee22bc89dbf6906c4b7d44f065f366e5e78e074f5298af47b473f998c477d97
                                                        • Instruction ID: 376bbe7ae6d7522b2f2cb9bba1d85ad650f5454354c12d432a59e011c2156e3f
                                                        • Opcode Fuzzy Hash: eee22bc89dbf6906c4b7d44f065f366e5e78e074f5298af47b473f998c477d97
                                                        • Instruction Fuzzy Hash: D3115972500209AFDF118FA9ED49BEE7BA9EF48788F144059FA05B2160C3B18E65DB60
                                                        APIs
                                                        • GetLastError.KERNEL32(?,?,00DF3379,00DF2FE5), ref: 00DF3390
                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00DF339E
                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00DF33B7
                                                        • SetLastError.KERNEL32(00000000,?,00DF3379,00DF2FE5), ref: 00DF3409
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ErrorLastValue___vcrt_
                                                        • String ID:
                                                        • API String ID: 3852720340-0
                                                        • Opcode ID: 12a586d612d329156aa79f3c5eafc785ed261d374d81f153f3c69d52c04115c7
                                                        • Instruction ID: ea285622ada10c96e79503a15231510a154f0b7896cff25e9241fc8027c1dcdd
                                                        • Opcode Fuzzy Hash: 12a586d612d329156aa79f3c5eafc785ed261d374d81f153f3c69d52c04115c7
                                                        • Instruction Fuzzy Hash: 7C012433608319BEAA2537B6BC85A372AD4EB053B9B37C22BF710A02F0EF514D195574
                                                        APIs
                                                        • GetLastError.KERNEL32(?,?,00E05686,00E13CD6,?,00000000,?,00E05B6A,?,?,?,?,?,00DFE6D1,?,00E98A48), ref: 00E02D78
                                                        • _free.LIBCMT ref: 00E02DAB
                                                        • _free.LIBCMT ref: 00E02DD3
                                                        • SetLastError.KERNEL32(00000000,?,?,?,?,00DFE6D1,?,00E98A48,00000010,00DD4F4A,?,?,00000000,00E13CD6), ref: 00E02DE0
                                                        • SetLastError.KERNEL32(00000000,?,?,?,?,00DFE6D1,?,00E98A48,00000010,00DD4F4A,?,?,00000000,00E13CD6), ref: 00E02DEC
                                                        • _abort.LIBCMT ref: 00E02DF2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$_free$_abort
                                                        • String ID:
                                                        • API String ID: 3160817290-0
                                                        • Opcode ID: 54ed1b793e9f5a8e73f34c87f3dd7270dd3f1c80bd0392c9bb3f8e6922b27623
                                                        • Instruction ID: d46c3cea76b36026b3e75c8c7f73f623fbbfc8a54e58541a6bcdde8735ac473a
                                                        • Opcode Fuzzy Hash: 54ed1b793e9f5a8e73f34c87f3dd7270dd3f1c80bd0392c9bb3f8e6922b27623
                                                        • Instruction Fuzzy Hash: 1CF02D315456002BC61233367C0EE5B29DD6FC17A4F30241DF624B21E6DF308CC54130
                                                        APIs
                                                          • Part of subcall function 00DE9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00DE9693
                                                          • Part of subcall function 00DE9639: SelectObject.GDI32(?,00000000), ref: 00DE96A2
                                                          • Part of subcall function 00DE9639: BeginPath.GDI32(?), ref: 00DE96B9
                                                          • Part of subcall function 00DE9639: SelectObject.GDI32(?,00000000), ref: 00DE96E2
                                                        • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00E68A4E
                                                        • LineTo.GDI32(?,00000003,00000000), ref: 00E68A62
                                                        • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00E68A70
                                                        • LineTo.GDI32(?,00000000,00000003), ref: 00E68A80
                                                        • EndPath.GDI32(?), ref: 00E68A90
                                                        • StrokePath.GDI32(?), ref: 00E68AA0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                        • String ID:
                                                        • API String ID: 43455801-0
                                                        • Opcode ID: c6e07e03edbe42640d5e91898648f389e1b5db71fa44f7d9facbb7c29f705eeb
                                                        • Instruction ID: 79c759a909be438ca42b61910f847fc54406ff2994d511754519d9a641d248cc
                                                        • Opcode Fuzzy Hash: c6e07e03edbe42640d5e91898648f389e1b5db71fa44f7d9facbb7c29f705eeb
                                                        • Instruction Fuzzy Hash: FF110C76040108FFDF129F95EC48EAA7F6CEB08394F108052FA55A5161C7719D59DB60
                                                        APIs
                                                        • GetDC.USER32(00000000), ref: 00E35218
                                                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 00E35229
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00E35230
                                                        • ReleaseDC.USER32(00000000,00000000), ref: 00E35238
                                                        • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00E3524F
                                                        • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00E35261
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: CapsDevice$Release
                                                        • String ID:
                                                        • API String ID: 1035833867-0
                                                        • Opcode ID: 9d3f7a571ec3a70b841972f345ebe439f057843f0a65cb5c528b8e7015f0aa91
                                                        • Instruction ID: 706f73a080d371ae8a26173d57f5202dd4ce4676b61830ffcd2bca5ba8d36309
                                                        • Opcode Fuzzy Hash: 9d3f7a571ec3a70b841972f345ebe439f057843f0a65cb5c528b8e7015f0aa91
                                                        • Instruction Fuzzy Hash: D3018475A01714BFEB105BA69C49A5FBFB8EB44751F144066FA04B7390D6B09804CBA0
                                                        APIs
                                                        • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00DD1BF4
                                                        • MapVirtualKeyW.USER32(00000010,00000000), ref: 00DD1BFC
                                                        • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00DD1C07
                                                        • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00DD1C12
                                                        • MapVirtualKeyW.USER32(00000011,00000000), ref: 00DD1C1A
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00DD1C22
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Virtual
                                                        • String ID:
                                                        • API String ID: 4278518827-0
                                                        • Opcode ID: ab2cc08ef0339378216b6f740ec90ed94816125cf8a6e487c460e537cce67fe2
                                                        • Instruction ID: 40fae7ccf0e77a6702c7dce8f3f16fcf040a86a61b1125005447c414eea43a35
                                                        • Opcode Fuzzy Hash: ab2cc08ef0339378216b6f740ec90ed94816125cf8a6e487c460e537cce67fe2
                                                        • Instruction Fuzzy Hash: F60148B090275A7DE3008F5A8C85A56FEA8FF19754F00411B915C47941C7F5A864CBE5
                                                        APIs
                                                        • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00E3EB30
                                                        • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00E3EB46
                                                        • GetWindowThreadProcessId.USER32(?,?), ref: 00E3EB55
                                                        • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00E3EB64
                                                        • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00E3EB6E
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00E3EB75
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                        • String ID:
                                                        • API String ID: 839392675-0
                                                        • Opcode ID: cc43e9251cb510fbde75e3a582344b0f1c768710ccc79201143f26dfdd80fcd8
                                                        • Instruction ID: f216609eea9885d7552781b2802d0b432ade988ba7d21f894a8b4584a8ef5daa
                                                        • Opcode Fuzzy Hash: cc43e9251cb510fbde75e3a582344b0f1c768710ccc79201143f26dfdd80fcd8
                                                        • Instruction Fuzzy Hash: 84F06772241118BFE6216B63EC0EEBF3E7CEFCAF91F100158F642E119096E01A05C6B9
                                                        APIs
                                                        • GetClientRect.USER32(?), ref: 00E27452
                                                        • SendMessageW.USER32(?,00001328,00000000,?), ref: 00E27469
                                                        • GetWindowDC.USER32(?), ref: 00E27475
                                                        • GetPixel.GDI32(00000000,?,?), ref: 00E27484
                                                        • ReleaseDC.USER32(?,00000000), ref: 00E27496
                                                        • GetSysColor.USER32(00000005), ref: 00E274B0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                        • String ID:
                                                        • API String ID: 272304278-0
                                                        • Opcode ID: 1132358efa24e999d59e967ecb55b26d886ea8e456f08c21b43f403568b38a64
                                                        • Instruction ID: 9643398345e396ba604fd9cbc6e37c0b1fa8fcdef9bbf5aeeef62162a3b247d8
                                                        • Opcode Fuzzy Hash: 1132358efa24e999d59e967ecb55b26d886ea8e456f08c21b43f403568b38a64
                                                        • Instruction Fuzzy Hash: 13018B31400215EFDB106FA5EC08BBE7BB5FB04351F215060F9A6B21A0CB712E45AB51
                                                        APIs
                                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00E3187F
                                                        • UnloadUserProfile.USERENV(?,?), ref: 00E3188B
                                                        • CloseHandle.KERNEL32(?), ref: 00E31894
                                                        • CloseHandle.KERNEL32(?), ref: 00E3189C
                                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00E318A5
                                                        • HeapFree.KERNEL32(00000000), ref: 00E318AC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                        • String ID:
                                                        • API String ID: 146765662-0
                                                        • Opcode ID: 33cb634c488126619d60f36e71c1cbb7ce5cb216664c7432f8e7ab1586e26812
                                                        • Instruction ID: 91dd89d84a23ea032259e01b6953cd1ea64d5a0a21b53bae1666918f786da393
                                                        • Opcode Fuzzy Hash: 33cb634c488126619d60f36e71c1cbb7ce5cb216664c7432f8e7ab1586e26812
                                                        • Instruction Fuzzy Hash: 23E0C936004101BFDA016BA3FD0C916BF39FB4A7627208221F265A1171CBB25464DB60
                                                        APIs
                                                        • __Init_thread_footer.LIBCMT ref: 00DDBEB3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Init_thread_footer
                                                        • String ID: D%$D%$D%$D%
                                                        • API String ID: 1385522511-2722557190
                                                        • Opcode ID: 2e75e254e92e4124467e353837b01207c51bf5960bd1bb75b5a43b805ead3de1
                                                        • Instruction ID: a5d75e898852f8017d677436e057e7e05ec44052fc3a0dfb260756703559a028
                                                        • Opcode Fuzzy Hash: 2e75e254e92e4124467e353837b01207c51bf5960bd1bb75b5a43b805ead3de1
                                                        • Instruction Fuzzy Hash: BB912C75A0020ACFCB14CF6DC0916A9B7F2FF59328B25815FD986AB351D731E981CBA0
                                                        APIs
                                                          • Part of subcall function 00DF0242: EnterCriticalSection.KERNEL32(00EA070C,00EA1884,?,?,00DE198B,00EA2518,?,?,?,00DD12F9,00000000), ref: 00DF024D
                                                          • Part of subcall function 00DF0242: LeaveCriticalSection.KERNEL32(00EA070C,?,00DE198B,00EA2518,?,?,?,00DD12F9,00000000), ref: 00DF028A
                                                          • Part of subcall function 00DD9CB3: _wcslen.LIBCMT ref: 00DD9CBD
                                                          • Part of subcall function 00DF00A3: __onexit.LIBCMT ref: 00DF00A9
                                                        • __Init_thread_footer.LIBCMT ref: 00E57BFB
                                                          • Part of subcall function 00DF01F8: EnterCriticalSection.KERNEL32(00EA070C,?,?,00DE8747,00EA2514), ref: 00DF0202
                                                          • Part of subcall function 00DF01F8: LeaveCriticalSection.KERNEL32(00EA070C,?,00DE8747,00EA2514), ref: 00DF0235
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                        • String ID: +T$5$G$Variable must be of type 'Object'.
                                                        • API String ID: 535116098-4125810065
                                                        • Opcode ID: e3029f68b2eda19368f251b5dd77e6aaf39ba9f9a64cbae9358b641fcc598761
                                                        • Instruction ID: 868851e98fd771fc691a34cf2e6e6968206e6cc8869655c08cbd1c0fe906272f
                                                        • Opcode Fuzzy Hash: e3029f68b2eda19368f251b5dd77e6aaf39ba9f9a64cbae9358b641fcc598761
                                                        • Instruction Fuzzy Hash: DD918E70A04209AFCB04EF54E8919BDB7B1FF49305F109459FC86BB292DB31AE59CB61
                                                        APIs
                                                          • Part of subcall function 00DD7620: _wcslen.LIBCMT ref: 00DD7625
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00E3C6EE
                                                        • _wcslen.LIBCMT ref: 00E3C735
                                                        • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00E3C79C
                                                        • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00E3C7CA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ItemMenu$Info_wcslen$Default
                                                        • String ID: 0
                                                        • API String ID: 1227352736-4108050209
                                                        • Opcode ID: 7fd29c1117a1aa74b2fac3af5744618a8b3f96d12e89604159c32608ece67dba
                                                        • Instruction ID: ab6ea191db4ccafe5eeddbdb3e62885eafd050fa1aeab57787d9e6fe0e6709cb
                                                        • Opcode Fuzzy Hash: 7fd29c1117a1aa74b2fac3af5744618a8b3f96d12e89604159c32608ece67dba
                                                        • Instruction Fuzzy Hash: BC51B1716043409BD7149F38C84DB6B7BE4EF89718F24292EF995F31A0DB60D904CB62
                                                        APIs
                                                        • ShellExecuteExW.SHELL32(0000003C), ref: 00E5AEA3
                                                          • Part of subcall function 00DD7620: _wcslen.LIBCMT ref: 00DD7625
                                                        • GetProcessId.KERNEL32(00000000), ref: 00E5AF38
                                                        • CloseHandle.KERNEL32(00000000), ref: 00E5AF67
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: CloseExecuteHandleProcessShell_wcslen
                                                        • String ID: <$@
                                                        • API String ID: 146682121-1426351568
                                                        • Opcode ID: 96152131c4b39e964c992fe2b3d303ff3124d4d15bbc3fb251b009e92af22b6e
                                                        • Instruction ID: 6c3c59f1f6de0fe57a7981b3f87bc29ed0a853b6c60a87e256c06fe3f585b005
                                                        • Opcode Fuzzy Hash: 96152131c4b39e964c992fe2b3d303ff3124d4d15bbc3fb251b009e92af22b6e
                                                        • Instruction Fuzzy Hash: 9C717C70A00215DFCB14EF54D495A9EBBF0FF08314F0889AAE856AB352DB74ED45CBA1
                                                        APIs
                                                        • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00E37206
                                                        • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00E3723C
                                                        • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00E3724D
                                                        • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00E372CF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$AddressCreateInstanceProc
                                                        • String ID: DllGetClassObject
                                                        • API String ID: 753597075-1075368562
                                                        • Opcode ID: dc54095c7e1cd39b27fb1be76055ae3408f5d5d6b2665f7beb6b7678c1dc92b4
                                                        • Instruction ID: 9d79b4b7d41bcda6d7f262f43165cd509e669435fcb185f5699afc2bcc6a8e87
                                                        • Opcode Fuzzy Hash: dc54095c7e1cd39b27fb1be76055ae3408f5d5d6b2665f7beb6b7678c1dc92b4
                                                        • Instruction Fuzzy Hash: 73414CF1604204AFDB25CF54C888A9B7FA9EF44354F2490A9BD45AF21AD7B0D944CBA0
                                                        APIs
                                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00E63E35
                                                        • IsMenu.USER32(?), ref: 00E63E4A
                                                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00E63E92
                                                        • DrawMenuBar.USER32 ref: 00E63EA5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Menu$Item$DrawInfoInsert
                                                        • String ID: 0
                                                        • API String ID: 3076010158-4108050209
                                                        • Opcode ID: a914317b7fc9ddd071760436e048742fb846f7a3617b1b7404029d04822b2dab
                                                        • Instruction ID: eddbe1f3200822b1b1a3ad52d08582f4694569217dbb9b7aca5943a46f4bfcba
                                                        • Opcode Fuzzy Hash: a914317b7fc9ddd071760436e048742fb846f7a3617b1b7404029d04822b2dab
                                                        • Instruction Fuzzy Hash: 04416775A00309AFDB10DF61E884AEABBF9FF49398F04412AF905A7250D735AE44CF60
                                                        APIs
                                                          • Part of subcall function 00DD9CB3: _wcslen.LIBCMT ref: 00DD9CBD
                                                          • Part of subcall function 00E33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00E33CCA
                                                        • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00E31E66
                                                        • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00E31E79
                                                        • SendMessageW.USER32(?,00000189,?,00000000), ref: 00E31EA9
                                                          • Part of subcall function 00DD6B57: _wcslen.LIBCMT ref: 00DD6B6A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$_wcslen$ClassName
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 2081771294-1403004172
                                                        • Opcode ID: d2eb5a274abaea316b1b3edf674f6f562abbfd5ea53e305d8dd2a7d55876800c
                                                        • Instruction ID: 389dcd6402ee8467f3ed29e092a30d18062de4989c4356489a0da684d13e0717
                                                        • Opcode Fuzzy Hash: d2eb5a274abaea316b1b3edf674f6f562abbfd5ea53e305d8dd2a7d55876800c
                                                        • Instruction Fuzzy Hash: 3E212371A00104AEDB14AB66DC59CFFBBB8DF41794F10611AF821B32E0DB765909C630
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00E62F8D
                                                        • LoadLibraryW.KERNEL32(?), ref: 00E62F94
                                                        • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00E62FA9
                                                        • DestroyWindow.USER32(?), ref: 00E62FB1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$DestroyLibraryLoadWindow
                                                        • String ID: SysAnimate32
                                                        • API String ID: 3529120543-1011021900
                                                        • Opcode ID: 28874768cb8769a282af9da04c1bc780b5e4d26992fad2295edf030548fbd7e7
                                                        • Instruction ID: 137daefeb182e061bc197021be70a9d01fcec17fc603cf6b7691728215d12bc8
                                                        • Opcode Fuzzy Hash: 28874768cb8769a282af9da04c1bc780b5e4d26992fad2295edf030548fbd7e7
                                                        • Instruction Fuzzy Hash: 23219A71344A05AFEB104FA4EC80EBB37B9EB593A8F10661DFA50F61A0D7B1DC519760
                                                        APIs
                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00DF4D1E,00E028E9,(,00DF4CBE,00000000,00E988B8,0000000C,00DF4E15,(,00000002), ref: 00DF4D8D
                                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00DF4DA0
                                                        • FreeLibrary.KERNEL32(00000000,?,?,?,00DF4D1E,00E028E9,(,00DF4CBE,00000000,00E988B8,0000000C,00DF4E15,(,00000002,00000000), ref: 00DF4DC3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                        • String ID: CorExitProcess$mscoree.dll
                                                        • API String ID: 4061214504-1276376045
                                                        • Opcode ID: 9474d5052ce24f337cd28d1bd0346b8c05ff7c5e082afb3fb38ac8d360e81240
                                                        • Instruction ID: a603eb565f24a1ea84ae05eb545043669d5d942f232ab39436152ad0147ff5f0
                                                        • Opcode Fuzzy Hash: 9474d5052ce24f337cd28d1bd0346b8c05ff7c5e082afb3fb38ac8d360e81240
                                                        • Instruction Fuzzy Hash: D8F0AF30A4020CBFDB149F91EC09BBEBFB4EF44752F1580A5F909B2260CB705944CBA1
                                                        APIs
                                                        • LoadLibraryA.KERNEL32 ref: 00E2D3AD
                                                        • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00E2D3BF
                                                        • FreeLibrary.KERNEL32(00000000), ref: 00E2D3E5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Library$AddressFreeLoadProc
                                                        • String ID: GetSystemWow64DirectoryW$X64
                                                        • API String ID: 145871493-2590602151
                                                        • Opcode ID: 9d1cd3b0f3d8bbdb98425b0b005632351f8a2b43a86c9757063cdebd984b7e4f
                                                        • Instruction ID: eaf09cb1bfcbb1dcc6ee6293a92cad2547624c7569a5f3f5cd7ac26fa077039f
                                                        • Opcode Fuzzy Hash: 9d1cd3b0f3d8bbdb98425b0b005632351f8a2b43a86c9757063cdebd984b7e4f
                                                        • Instruction Fuzzy Hash: 32F0553280E670DFEB316712BC089FA7320AF01745B74F555F682F1125DB60CD488A92
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00DD4EDD,?,00EA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DD4E9C
                                                        • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00DD4EAE
                                                        • FreeLibrary.KERNEL32(00000000,?,?,00DD4EDD,?,00EA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DD4EC0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Library$AddressFreeLoadProc
                                                        • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                        • API String ID: 145871493-3689287502
                                                        • Opcode ID: 6459ab6b69dee976bd3ca397a8d7313e0b250f2a0f95cfef9903e3a7097cf563
                                                        • Instruction ID: ed355dc0e2ca5c915035eccf4850f036a21cf0c8027bba59b92f83004b89e46c
                                                        • Opcode Fuzzy Hash: 6459ab6b69dee976bd3ca397a8d7313e0b250f2a0f95cfef9903e3a7097cf563
                                                        • Instruction Fuzzy Hash: E6E08C36A026226F92221B26BC18A7B6668AF82BE2B1D0116FC40F2200DFB0CD0581B1
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00E13CDE,?,00EA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DD4E62
                                                        • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00DD4E74
                                                        • FreeLibrary.KERNEL32(00000000,?,?,00E13CDE,?,00EA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00DD4E87
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Library$AddressFreeLoadProc
                                                        • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                        • API String ID: 145871493-1355242751
                                                        • Opcode ID: bf6c79f6b9a4f231005cbbf84f1282908ab0268860c48d3d64e63f54920da8d0
                                                        • Instruction ID: 9cf382e429a857a6951b98c6af9728a68e6ae3b181380b9ed0be7f86be73d65f
                                                        • Opcode Fuzzy Hash: bf6c79f6b9a4f231005cbbf84f1282908ab0268860c48d3d64e63f54920da8d0
                                                        • Instruction Fuzzy Hash: 5AD012355036616B5A621B26BC18DAB6B28AFC6B913190616F955B2214CFB0CD0585E1
                                                        APIs
                                                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00E42C05
                                                        • DeleteFileW.KERNEL32(?), ref: 00E42C87
                                                        • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00E42C9D
                                                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00E42CAE
                                                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00E42CC0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: File$Delete$Copy
                                                        • String ID:
                                                        • API String ID: 3226157194-0
                                                        • Opcode ID: 547a14c1536aceba7150f98db5c71215e0b674399a2e3c64a2adec715f127d55
                                                        • Instruction ID: a1b40d103ab5f5a7a78d582447446c843bcbced16d93d14e2178678c4c4ad160
                                                        • Opcode Fuzzy Hash: 547a14c1536aceba7150f98db5c71215e0b674399a2e3c64a2adec715f127d55
                                                        • Instruction Fuzzy Hash: 9FB16C71D00119ABDF21DBA4DC85EEEBBBDEF48344F5040AAF609F6251EA319A448F71
                                                        APIs
                                                        • GetCurrentProcessId.KERNEL32 ref: 00E5A427
                                                        • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00E5A435
                                                        • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00E5A468
                                                        • CloseHandle.KERNEL32(?), ref: 00E5A63D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Process$CloseCountersCurrentHandleOpen
                                                        • String ID:
                                                        • API String ID: 3488606520-0
                                                        • Opcode ID: b4a28c80ae509819a57847c3d2cfd817bee89bb0fc8607a23f3dd7201405f1c8
                                                        • Instruction ID: 29cd252f9bea6205fa5028ed52552d839d80d76caf371f1ca5285659331d4d2c
                                                        • Opcode Fuzzy Hash: b4a28c80ae509819a57847c3d2cfd817bee89bb0fc8607a23f3dd7201405f1c8
                                                        • Instruction Fuzzy Hash: 31A19E716043019FD720DF24D886B2AB7E1EF84714F18995DF99A9B392D7B0EC44CBA2
                                                        APIs
                                                        • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00E73700), ref: 00E0BB91
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00EA121C,000000FF,00000000,0000003F,00000000,?,?), ref: 00E0BC09
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00EA1270,000000FF,?,0000003F,00000000,?), ref: 00E0BC36
                                                        • _free.LIBCMT ref: 00E0BB7F
                                                          • Part of subcall function 00E029C8: HeapFree.KERNEL32(00000000,00000000,?,00E0D7D1,00000000,00000000,00000000,00000000,?,00E0D7F8,00000000,00000007,00000000,?,00E0DBF5,00000000), ref: 00E029DE
                                                          • Part of subcall function 00E029C8: GetLastError.KERNEL32(00000000,?,00E0D7D1,00000000,00000000,00000000,00000000,?,00E0D7F8,00000000,00000007,00000000,?,00E0DBF5,00000000,00000000), ref: 00E029F0
                                                        • _free.LIBCMT ref: 00E0BD4B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                        • String ID:
                                                        • API String ID: 1286116820-0
                                                        • Opcode ID: a53eddccd9419b579a176c9495fa5d12cbb4019bb4b134364abb448e0b6da3b4
                                                        • Instruction ID: c6ab369d6ea5ee02b4ddc5a406e9f8a7dad855e00c28f917df163c65af8eb746
                                                        • Opcode Fuzzy Hash: a53eddccd9419b579a176c9495fa5d12cbb4019bb4b134364abb448e0b6da3b4
                                                        • Instruction Fuzzy Hash: 08510571800209AFDB10EF659C81AAEB7FCFF45354F2052AAE554F71E1EB709E849B60
                                                        APIs
                                                          • Part of subcall function 00E3DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00E3CF22,?), ref: 00E3DDFD
                                                          • Part of subcall function 00E3DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00E3CF22,?), ref: 00E3DE16
                                                          • Part of subcall function 00E3E199: GetFileAttributesW.KERNEL32(?,00E3CF95), ref: 00E3E19A
                                                        • lstrcmpiW.KERNEL32(?,?), ref: 00E3E473
                                                        • MoveFileW.KERNEL32(?,?), ref: 00E3E4AC
                                                        • _wcslen.LIBCMT ref: 00E3E5EB
                                                        • _wcslen.LIBCMT ref: 00E3E603
                                                        • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 00E3E650
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                        • String ID:
                                                        • API String ID: 3183298772-0
                                                        • Opcode ID: de9b6a1ced654976d5717175f92a1fc254666a212c8a7cc9c2569cc7e770e0af
                                                        • Instruction ID: 257d5d4c136325bc474229b628cc94442f1842c8bc9ffeb864655ab8c4aa38d0
                                                        • Opcode Fuzzy Hash: de9b6a1ced654976d5717175f92a1fc254666a212c8a7cc9c2569cc7e770e0af
                                                        • Instruction Fuzzy Hash: 0A51A1B24083455BC724EB90D8959EFB7ECEF84344F00491EF689E3291EF75A588C766
                                                        APIs
                                                          • Part of subcall function 00DD9CB3: _wcslen.LIBCMT ref: 00DD9CBD
                                                          • Part of subcall function 00E5C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00E5B6AE,?,?), ref: 00E5C9B5
                                                          • Part of subcall function 00E5C998: _wcslen.LIBCMT ref: 00E5C9F1
                                                          • Part of subcall function 00E5C998: _wcslen.LIBCMT ref: 00E5CA68
                                                          • Part of subcall function 00E5C998: _wcslen.LIBCMT ref: 00E5CA9E
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E5BAA5
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00E5BB00
                                                        • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00E5BB63
                                                        • RegCloseKey.ADVAPI32(?,?), ref: 00E5BBA6
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00E5BBB3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                        • String ID:
                                                        • API String ID: 826366716-0
                                                        • Opcode ID: 81f0b97b0dcdbe1410d6bf8404c697efde0cbf76c3baa91c52c32edfcdbbf828
                                                        • Instruction ID: a537f6b394520e3aa79264e117a93c84740a1c88c0a83ea74a9a7115918b3167
                                                        • Opcode Fuzzy Hash: 81f0b97b0dcdbe1410d6bf8404c697efde0cbf76c3baa91c52c32edfcdbbf828
                                                        • Instruction Fuzzy Hash: 9C61D331208241EFD314DF14C494E2ABBE5FF84348F54995DF8999B2A2DB31ED49CBA2
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 00E38BCD
                                                        • VariantClear.OLEAUT32 ref: 00E38C3E
                                                        • VariantClear.OLEAUT32 ref: 00E38C9D
                                                        • VariantClear.OLEAUT32(?), ref: 00E38D10
                                                        • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00E38D3B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Variant$Clear$ChangeInitType
                                                        • String ID:
                                                        • API String ID: 4136290138-0
                                                        • Opcode ID: 205c22b1b0fc9ef9322d9556f81d1328d437cfb12aeed400e2f6f9201f9b01af
                                                        • Instruction ID: cefc69fcdde01787c94ba5b301b2baa05056a99ef64c4fdc3c8d0d5fe608ad74
                                                        • Opcode Fuzzy Hash: 205c22b1b0fc9ef9322d9556f81d1328d437cfb12aeed400e2f6f9201f9b01af
                                                        • Instruction Fuzzy Hash: EB517CB1A00219DFCB14CF18C894AAABBF8FF89314F118559F915EB350DB30E911CB90
                                                        APIs
                                                        • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00E48BAE
                                                        • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00E48BDA
                                                        • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00E48C32
                                                        • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00E48C57
                                                        • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00E48C5F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: PrivateProfile$SectionWrite$String
                                                        • String ID:
                                                        • API String ID: 2832842796-0
                                                        • Opcode ID: 9d5eef9a416b2ef4d235ca8c9e0d46c51b15db32f9737b58082b3014e4020336
                                                        • Instruction ID: 3d02de553f3677396b4d02a89c9276da26729cce55c9f69d50711f2ab8b13cb5
                                                        • Opcode Fuzzy Hash: 9d5eef9a416b2ef4d235ca8c9e0d46c51b15db32f9737b58082b3014e4020336
                                                        • Instruction Fuzzy Hash: 12515A35A00215AFCB10DF65D880E6EBBF5FF48314F088499E849AB362DB31ED41CBA1
                                                        APIs
                                                        • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00E58F40
                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00E58FD0
                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 00E58FEC
                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00E59032
                                                        • FreeLibrary.KERNEL32(00000000), ref: 00E59052
                                                          • Part of subcall function 00DEF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00E41043,?,7735E610), ref: 00DEF6E6
                                                          • Part of subcall function 00DEF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00E2FA64,00000000,00000000,?,?,00E41043,?,7735E610,?,00E2FA64), ref: 00DEF70D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                        • String ID:
                                                        • API String ID: 666041331-0
                                                        • Opcode ID: 57bfc9666a2f007a461153adb8bec5623ae7f2d0b71b019c1551473ea0ca6362
                                                        • Instruction ID: dd4101c2326ea5d0707655d6ddbe39a84bff91baf03cc72a3982ae825402a602
                                                        • Opcode Fuzzy Hash: 57bfc9666a2f007a461153adb8bec5623ae7f2d0b71b019c1551473ea0ca6362
                                                        • Instruction Fuzzy Hash: FD513835601205DFC711DF58C4948ADBBB1FF49329B1594A9E80AAB362DB31ED89CBA0
                                                        APIs
                                                        • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00E66C33
                                                        • SetWindowLongW.USER32(?,000000EC,?), ref: 00E66C4A
                                                        • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00E66C73
                                                        • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,00E4AB79,00000000,00000000), ref: 00E66C98
                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00E66CC7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Window$Long$MessageSendShow
                                                        • String ID:
                                                        • API String ID: 3688381893-0
                                                        • Opcode ID: ea4a1c6c49b2930c0c5cce331c27cc83badea8d9c6c1ea7a0209508fbe274d99
                                                        • Instruction ID: ed0e0602e371b9745b9824b041e0293c3ab08ec09d06a5898206deb8453569b8
                                                        • Opcode Fuzzy Hash: ea4a1c6c49b2930c0c5cce331c27cc83badea8d9c6c1ea7a0209508fbe274d99
                                                        • Instruction Fuzzy Hash: B241D335650504AFDB24CF29EC58FBABFA4EB493D4F141268F895B72E0C371AD41CA50
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: _free
                                                        • String ID:
                                                        • API String ID: 269201875-0
                                                        • Opcode ID: ef566e847847e0d41d7f1709094ef8ec87973869bbff46daa57835647215233b
                                                        • Instruction ID: c7ed762563b67d4d6e4b9c3661d643f9101b27e0e623207ea9d40946c8e0ef93
                                                        • Opcode Fuzzy Hash: ef566e847847e0d41d7f1709094ef8ec87973869bbff46daa57835647215233b
                                                        • Instruction Fuzzy Hash: DF41D232A002009FCB24DF79C885A5EB7F5EF89714F2545ADE615FB391D631AD41CB90
                                                        APIs
                                                        • GetCursorPos.USER32(?), ref: 00DE9141
                                                        • ScreenToClient.USER32(00000000,?), ref: 00DE915E
                                                        • GetAsyncKeyState.USER32(00000001), ref: 00DE9183
                                                        • GetAsyncKeyState.USER32(00000002), ref: 00DE919D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: AsyncState$ClientCursorScreen
                                                        • String ID:
                                                        • API String ID: 4210589936-0
                                                        • Opcode ID: c6da78bc99876c96fe5cfe0c2fc3487d0946fb9340fc65ca4465a40846ddbbff
                                                        • Instruction ID: 098177fb85ed601809d5f72955654889ac7225226a9fe82111aa3b2f01845e0b
                                                        • Opcode Fuzzy Hash: c6da78bc99876c96fe5cfe0c2fc3487d0946fb9340fc65ca4465a40846ddbbff
                                                        • Instruction Fuzzy Hash: CD419F31A0861AFBDF09AF65D854BEEF774FF05364F20821AE469A32D0C7306954CBA1
                                                        APIs
                                                        • GetInputState.USER32 ref: 00E438CB
                                                        • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00E43922
                                                        • TranslateMessage.USER32(?), ref: 00E4394B
                                                        • DispatchMessageW.USER32(?), ref: 00E43955
                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00E43966
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                        • String ID:
                                                        • API String ID: 2256411358-0
                                                        • Opcode ID: 14aaf0e82003427c8aa979076a7355bef22f8bfa3a00f5a8e63c3bf0ef0ca19a
                                                        • Instruction ID: 89ebc9fd07be3a38f79d675685cfb34c6640ce338ef8595deaf9bd2b45783562
                                                        • Opcode Fuzzy Hash: 14aaf0e82003427c8aa979076a7355bef22f8bfa3a00f5a8e63c3bf0ef0ca19a
                                                        • Instruction Fuzzy Hash: A031DB709043419EEB39CB36BC48BB777A8AB4A348F14159DD562F24D4E3F4A648CB11
                                                        APIs
                                                        • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,00E4C21E,00000000), ref: 00E4CF38
                                                        • InternetReadFile.WININET(?,00000000,?,?), ref: 00E4CF6F
                                                        • GetLastError.KERNEL32(?,00000000,?,?,?,00E4C21E,00000000), ref: 00E4CFB4
                                                        • SetEvent.KERNEL32(?,?,00000000,?,?,?,00E4C21E,00000000), ref: 00E4CFC8
                                                        • SetEvent.KERNEL32(?,?,00000000,?,?,?,00E4C21E,00000000), ref: 00E4CFF2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                        • String ID:
                                                        • API String ID: 3191363074-0
                                                        • Opcode ID: 9286265385a8223bb496210b84ce9aebb1fb76e4f9a5ccbcc9d98369316f3dd5
                                                        • Instruction ID: 03ff66dd2b57a44b07343b6e8b740b05b1ee23b22e7eda794935ffcd9322108f
                                                        • Opcode Fuzzy Hash: 9286265385a8223bb496210b84ce9aebb1fb76e4f9a5ccbcc9d98369316f3dd5
                                                        • Instruction Fuzzy Hash: A0318E71601205EFDB60DFA6E884AABBBF9EB14354B20442EF506F3111DB34AE49DB60
                                                        APIs
                                                        • GetWindowRect.USER32(?,?), ref: 00E31915
                                                        • PostMessageW.USER32(00000001,00000201,00000001), ref: 00E319C1
                                                        • Sleep.KERNEL32(00000000,?,?,?), ref: 00E319C9
                                                        • PostMessageW.USER32(00000001,00000202,00000000), ref: 00E319DA
                                                        • Sleep.KERNEL32(00000000,?,?,?,?), ref: 00E319E2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: MessagePostSleep$RectWindow
                                                        • String ID:
                                                        • API String ID: 3382505437-0
                                                        • Opcode ID: 3e40ce3255428b1d2d3fbdfa53c656130223b15fe51d263c221803a6c1a506d9
                                                        • Instruction ID: 0f6770806e689057fae2249fd7af79584987928dca80e020fe009acec1c1d947
                                                        • Opcode Fuzzy Hash: 3e40ce3255428b1d2d3fbdfa53c656130223b15fe51d263c221803a6c1a506d9
                                                        • Instruction Fuzzy Hash: 7331BE71900219EFCB00CFA8D99CBEE3BB5EB44315F105269F961A72D0C7B09954CB91
                                                        APIs
                                                        • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00E65745
                                                        • SendMessageW.USER32(?,00001074,?,00000001), ref: 00E6579D
                                                        • _wcslen.LIBCMT ref: 00E657AF
                                                        • _wcslen.LIBCMT ref: 00E657BA
                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00E65816
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$_wcslen
                                                        • String ID:
                                                        • API String ID: 763830540-0
                                                        • Opcode ID: 9c366067106740c90888bd6dd744daf2046b300506df84b3023f8884cc86cb68
                                                        • Instruction ID: 9e7a850297f8e007fa8af7a5cdae592352f25f2a2dae72f774bcc4cd3caa3de1
                                                        • Opcode Fuzzy Hash: 9c366067106740c90888bd6dd744daf2046b300506df84b3023f8884cc86cb68
                                                        • Instruction Fuzzy Hash: E921A572A44618DADB208F60EC84AFE7BB8FF447A4F109256F929FB180D7709985CF51
                                                        APIs
                                                        • IsWindow.USER32(00000000), ref: 00E50951
                                                        • GetForegroundWindow.USER32 ref: 00E50968
                                                        • GetDC.USER32(00000000), ref: 00E509A4
                                                        • GetPixel.GDI32(00000000,?,00000003), ref: 00E509B0
                                                        • ReleaseDC.USER32(00000000,00000003), ref: 00E509E8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Window$ForegroundPixelRelease
                                                        • String ID:
                                                        • API String ID: 4156661090-0
                                                        • Opcode ID: c16f6f1a307ed4d3c4289ab9b7f7bf78f39d34f08fe865b563c74c917be40e29
                                                        • Instruction ID: 5553dd28c6d544fde0227b9cee9d239db339a697844564541edacf9701399644
                                                        • Opcode Fuzzy Hash: c16f6f1a307ed4d3c4289ab9b7f7bf78f39d34f08fe865b563c74c917be40e29
                                                        • Instruction Fuzzy Hash: B9218135600204AFD714EF65E884AAFBBF5EF84741F148469F85AE7352CB70AC48CBA0
                                                        APIs
                                                        • GetEnvironmentStringsW.KERNEL32 ref: 00E0CDC6
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00E0CDE9
                                                          • Part of subcall function 00E03820: RtlAllocateHeap.NTDLL(00000000,?,00EA1444,?,00DEFDF5,?,?,00DDA976,00000010,00EA1440,00DD13FC,?,00DD13C6,?,00DD1129), ref: 00E03852
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00E0CE0F
                                                        • _free.LIBCMT ref: 00E0CE22
                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00E0CE31
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                        • String ID:
                                                        • API String ID: 336800556-0
                                                        • Opcode ID: 62c92538a0324c26f71b10d30fcd62227456c9e2f74b09cafdc54ff43523d2a4
                                                        • Instruction ID: 37f6a28398d1ae14287adfc7e0723a67390ca77348d2b3be5844996abc9e94ee
                                                        • Opcode Fuzzy Hash: 62c92538a0324c26f71b10d30fcd62227456c9e2f74b09cafdc54ff43523d2a4
                                                        • Instruction Fuzzy Hash: FE01D8726022157FA32127B7AC4CC7F6A6DDFC6BA53351229FD05F7280DA608D4291B0
                                                        APIs
                                                        • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00DE9693
                                                        • SelectObject.GDI32(?,00000000), ref: 00DE96A2
                                                        • BeginPath.GDI32(?), ref: 00DE96B9
                                                        • SelectObject.GDI32(?,00000000), ref: 00DE96E2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ObjectSelect$BeginCreatePath
                                                        • String ID:
                                                        • API String ID: 3225163088-0
                                                        • Opcode ID: 067bee462d1f92824035713a79bc51fb870043b52b9b23d3bb05f3d78e6c4de4
                                                        • Instruction ID: 81365117f911b048077bca48383648edc75239ca8d2520af5d31beb383c91cd8
                                                        • Opcode Fuzzy Hash: 067bee462d1f92824035713a79bc51fb870043b52b9b23d3bb05f3d78e6c4de4
                                                        • Instruction Fuzzy Hash: 94217130803345EFDB11AF27EC247AA7B74BB86395F14025AF450B61A0D370A999CBA4
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: _memcmp
                                                        • String ID:
                                                        • API String ID: 2931989736-0
                                                        • Opcode ID: 6863aa57e836be60e480cfa7d343d22e32be9d44a1518305013e4782b7839ec3
                                                        • Instruction ID: e26143c37008e24ee60a19a44ce6874d032e99eecfd77ec00261ebff09bad731
                                                        • Opcode Fuzzy Hash: 6863aa57e836be60e480cfa7d343d22e32be9d44a1518305013e4782b7839ec3
                                                        • Instruction Fuzzy Hash: C1019267685709FAD2085610AD86FFA779DDB21398F425022FE04BA341F660ED20C2F4
                                                        APIs
                                                        • GetLastError.KERNEL32(?,?,?,00DFF2DE,00E03863,00EA1444,?,00DEFDF5,?,?,00DDA976,00000010,00EA1440,00DD13FC,?,00DD13C6), ref: 00E02DFD
                                                        • _free.LIBCMT ref: 00E02E32
                                                        • _free.LIBCMT ref: 00E02E59
                                                        • SetLastError.KERNEL32(00000000,00DD1129), ref: 00E02E66
                                                        • SetLastError.KERNEL32(00000000,00DD1129), ref: 00E02E6F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$_free
                                                        • String ID:
                                                        • API String ID: 3170660625-0
                                                        • Opcode ID: b8e55727abdf0c4f30d9fea4c3b43ef242d8e24373468b235da94d484c64300b
                                                        • Instruction ID: 18dd4bf97248fe19bfad48ec60fcd5c72f3e4874c4b30290a2b970f5704bdf5f
                                                        • Opcode Fuzzy Hash: b8e55727abdf0c4f30d9fea4c3b43ef242d8e24373468b235da94d484c64300b
                                                        • Instruction Fuzzy Hash: 5A01F9361C56016BC6133776AC4DD6B2AEDABD13E5771602DF655B22E2EA608CC64120
                                                        APIs
                                                        • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E2FF41,80070057,?,?,?,00E3035E), ref: 00E3002B
                                                        • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E2FF41,80070057,?,?), ref: 00E30046
                                                        • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E2FF41,80070057,?,?), ref: 00E30054
                                                        • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E2FF41,80070057,?), ref: 00E30064
                                                        • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E2FF41,80070057,?,?), ref: 00E30070
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: From$Prog$FreeStringTasklstrcmpi
                                                        • String ID:
                                                        • API String ID: 3897988419-0
                                                        • Opcode ID: 7f0da1c9b5c36d9cdbac4b35d9db999173d860e4d1e0b8a4e02a57dd39cd105b
                                                        • Instruction ID: 7c645ea11be6a92b37a710414fc54db52814b00e236766c957bfb46602371268
                                                        • Opcode Fuzzy Hash: 7f0da1c9b5c36d9cdbac4b35d9db999173d860e4d1e0b8a4e02a57dd39cd105b
                                                        • Instruction Fuzzy Hash: 5601DF72600204BFDB294F69EC48BAA7EADEB44791F205424F845F3210D7B1DD04DBA0
                                                        APIs
                                                        • QueryPerformanceCounter.KERNEL32(?), ref: 00E3E997
                                                        • QueryPerformanceFrequency.KERNEL32(?), ref: 00E3E9A5
                                                        • Sleep.KERNEL32(00000000), ref: 00E3E9AD
                                                        • QueryPerformanceCounter.KERNEL32(?), ref: 00E3E9B7
                                                        • Sleep.KERNEL32 ref: 00E3E9F3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: PerformanceQuery$CounterSleep$Frequency
                                                        • String ID:
                                                        • API String ID: 2833360925-0
                                                        • Opcode ID: a88a1f3d9df9e88e2a3d49a1ea64bf2b96294405d1cc47a1c1e67a1e6c3cc755
                                                        • Instruction ID: a89563341b3ce6b68652af02d09d68cbaa5d282d1118fe956e42b825bded4179
                                                        • Opcode Fuzzy Hash: a88a1f3d9df9e88e2a3d49a1ea64bf2b96294405d1cc47a1c1e67a1e6c3cc755
                                                        • Instruction Fuzzy Hash: FB015B31C01529DBCF04ABE5EC5D6EEBF78FF49301F100586E542B2280CB709555C7A1
                                                        APIs
                                                        • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00E31114
                                                        • GetLastError.KERNEL32(?,00000000,00000000,?,?,00E30B9B,?,?,?), ref: 00E31120
                                                        • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00E30B9B,?,?,?), ref: 00E3112F
                                                        • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00E30B9B,?,?,?), ref: 00E31136
                                                        • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00E3114D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 842720411-0
                                                        • Opcode ID: be058403b366c7d9022d777a0b3d4c305a10ff25bf22efff207fcd1b7a829ec4
                                                        • Instruction ID: ec856978d1f6680b42825776b03c1c9cf9b4b80d9b22347acabe8a3b3b0d019f
                                                        • Opcode Fuzzy Hash: be058403b366c7d9022d777a0b3d4c305a10ff25bf22efff207fcd1b7a829ec4
                                                        • Instruction Fuzzy Hash: 7C016D75201205BFDB114F65EC4DAAB3F7EEF853A4B200459FA85E3350DA71DC40CA60
                                                        APIs
                                                        • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00E30FCA
                                                        • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00E30FD6
                                                        • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00E30FE5
                                                        • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00E30FEC
                                                        • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00E31002
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: HeapInformationToken$AllocErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 44706859-0
                                                        • Opcode ID: 274c584980718d26959b12f35ba81de2831cac3c769d0382baaf95dd62bccad3
                                                        • Instruction ID: b5833600d082ab176a2400f8dfce209e78a9ad4fb465375169c338ea43f30079
                                                        • Opcode Fuzzy Hash: 274c584980718d26959b12f35ba81de2831cac3c769d0382baaf95dd62bccad3
                                                        • Instruction Fuzzy Hash: 99F04F35101301BFD7214FA6AC4DF673F6EEF8A7A1F204458F985E6251CAB1DC44CA60
                                                        APIs
                                                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00E3102A
                                                        • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00E31036
                                                        • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00E31045
                                                        • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00E3104C
                                                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00E31062
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: HeapInformationToken$AllocErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 44706859-0
                                                        • Opcode ID: e7366746240545e84f0c404770271dcc1e4c5dd3e55661aa096289c3e44d0fd9
                                                        • Instruction ID: be9b78d42767dc8c7ed6b15536f18c92c7a3c5a7e0bced068757c590e7bf0447
                                                        • Opcode Fuzzy Hash: e7366746240545e84f0c404770271dcc1e4c5dd3e55661aa096289c3e44d0fd9
                                                        • Instruction Fuzzy Hash: 63F04F35201301BFD7215FA6EC5DF673F6DEF8A7A1F210454F985E6250CAB1D844DA60
                                                        APIs
                                                        • CloseHandle.KERNEL32(?,?,?,?,00E4017D,?,00E432FC,?,00000001,00E12592,?), ref: 00E40324
                                                        • CloseHandle.KERNEL32(?,?,?,?,00E4017D,?,00E432FC,?,00000001,00E12592,?), ref: 00E40331
                                                        • CloseHandle.KERNEL32(?,?,?,?,00E4017D,?,00E432FC,?,00000001,00E12592,?), ref: 00E4033E
                                                        • CloseHandle.KERNEL32(?,?,?,?,00E4017D,?,00E432FC,?,00000001,00E12592,?), ref: 00E4034B
                                                        • CloseHandle.KERNEL32(?,?,?,?,00E4017D,?,00E432FC,?,00000001,00E12592,?), ref: 00E40358
                                                        • CloseHandle.KERNEL32(?,?,?,?,00E4017D,?,00E432FC,?,00000001,00E12592,?), ref: 00E40365
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: CloseHandle
                                                        • String ID:
                                                        • API String ID: 2962429428-0
                                                        • Opcode ID: 811873ada3ddfce7256a1171eef6ffd83a68ea4a9a7d2b850484eee6fa86b155
                                                        • Instruction ID: 4cb28a2bbbb800499e71410cf11228f7db3929374b2102decb922267dae56a8c
                                                        • Opcode Fuzzy Hash: 811873ada3ddfce7256a1171eef6ffd83a68ea4a9a7d2b850484eee6fa86b155
                                                        • Instruction Fuzzy Hash: AD01A272800B159FC7309F66E890412FBF5BF503193159A3FD29662931C3B1A958CF80
                                                        APIs
                                                        • _free.LIBCMT ref: 00E0D752
                                                          • Part of subcall function 00E029C8: HeapFree.KERNEL32(00000000,00000000,?,00E0D7D1,00000000,00000000,00000000,00000000,?,00E0D7F8,00000000,00000007,00000000,?,00E0DBF5,00000000), ref: 00E029DE
                                                          • Part of subcall function 00E029C8: GetLastError.KERNEL32(00000000,?,00E0D7D1,00000000,00000000,00000000,00000000,?,00E0D7F8,00000000,00000007,00000000,?,00E0DBF5,00000000,00000000), ref: 00E029F0
                                                        • _free.LIBCMT ref: 00E0D764
                                                        • _free.LIBCMT ref: 00E0D776
                                                        • _free.LIBCMT ref: 00E0D788
                                                        • _free.LIBCMT ref: 00E0D79A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 776569668-0
                                                        • Opcode ID: 52fc2db2ad439a791a2b2e125c64780b237dbaf6fe8bc52cea1a2ce90a30074c
                                                        • Instruction ID: 552a90a75923dc1428124900416f4e2e0834584ac374df80660dedce92312cee
                                                        • Opcode Fuzzy Hash: 52fc2db2ad439a791a2b2e125c64780b237dbaf6fe8bc52cea1a2ce90a30074c
                                                        • Instruction Fuzzy Hash: E5F0C932548204ABC625BBA9F98581677D9BB847147F8280BF148F7581C620F8C086A4
                                                        APIs
                                                        • GetDlgItem.USER32(?,000003E9), ref: 00E35C58
                                                        • GetWindowTextW.USER32(00000000,?,00000100), ref: 00E35C6F
                                                        • MessageBeep.USER32(00000000), ref: 00E35C87
                                                        • KillTimer.USER32(?,0000040A), ref: 00E35CA3
                                                        • EndDialog.USER32(?,00000001), ref: 00E35CBD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                        • String ID:
                                                        • API String ID: 3741023627-0
                                                        • Opcode ID: 3ae534dd9ba09a568e4a5644e94aa2feed63c5a7ea946324e2a10369e1d54374
                                                        • Instruction ID: bb733e08272cd713998513abfe7a673dcf9e1492150f20e691ff447baa14b119
                                                        • Opcode Fuzzy Hash: 3ae534dd9ba09a568e4a5644e94aa2feed63c5a7ea946324e2a10369e1d54374
                                                        • Instruction Fuzzy Hash: 88018B315007049FEB205B11ED4EFB6BBB8FB00B49F04255AE583715E1D7F4A988CE94
                                                        APIs
                                                        • _free.LIBCMT ref: 00E022BE
                                                          • Part of subcall function 00E029C8: HeapFree.KERNEL32(00000000,00000000,?,00E0D7D1,00000000,00000000,00000000,00000000,?,00E0D7F8,00000000,00000007,00000000,?,00E0DBF5,00000000), ref: 00E029DE
                                                          • Part of subcall function 00E029C8: GetLastError.KERNEL32(00000000,?,00E0D7D1,00000000,00000000,00000000,00000000,?,00E0D7F8,00000000,00000007,00000000,?,00E0DBF5,00000000,00000000), ref: 00E029F0
                                                        • _free.LIBCMT ref: 00E022D0
                                                        • _free.LIBCMT ref: 00E022E3
                                                        • _free.LIBCMT ref: 00E022F4
                                                        • _free.LIBCMT ref: 00E02305
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 776569668-0
                                                        • Opcode ID: 1c7d4957ca1e54549d470b2a90b2de4f1124677913f189201006d249a7245498
                                                        • Instruction ID: fd75ab52eeb423a1d0b514ec69bd36f73b453d67cc1ec45b02850dbef4852f66
                                                        • Opcode Fuzzy Hash: 1c7d4957ca1e54549d470b2a90b2de4f1124677913f189201006d249a7245498
                                                        • Instruction Fuzzy Hash: 09F03A789101208FCA22BF56BC059483BE4B75E760BA0254FF510F33F1C7306899ABA4
                                                        APIs
                                                        • EndPath.GDI32(?), ref: 00DE95D4
                                                        • StrokeAndFillPath.GDI32(?,?,00E271F7,00000000,?,?,?), ref: 00DE95F0
                                                        • SelectObject.GDI32(?,00000000), ref: 00DE9603
                                                        • DeleteObject.GDI32 ref: 00DE9616
                                                        • StrokePath.GDI32(?), ref: 00DE9631
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Path$ObjectStroke$DeleteFillSelect
                                                        • String ID:
                                                        • API String ID: 2625713937-0
                                                        • Opcode ID: 4fc61666bfb3714b9ce3a9dc5ca6c146c6880e143f5ee3ca8a8cfe0b01cc6fa7
                                                        • Instruction ID: 13566177fc4e5c094f8a97384c23e6f3351a0bc57e6d96f896e4054debae76b3
                                                        • Opcode Fuzzy Hash: 4fc61666bfb3714b9ce3a9dc5ca6c146c6880e143f5ee3ca8a8cfe0b01cc6fa7
                                                        • Instruction Fuzzy Hash: EDF03C30006244EFDB126F67ED2C7763B61AB863A2F148295F4A5750F0C7709999DF20
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: __freea$_free
                                                        • String ID: a/p$am/pm
                                                        • API String ID: 3432400110-3206640213
                                                        • Opcode ID: 1f95cad513e82c5a83e725e1ff0ce8e8589f84d563ae12fbf539f77f147cdfe2
                                                        • Instruction ID: 8d56a5cd4ad79bc64018a3f678b663b0c9d48a0accb8e5ca6fb2a1942aa6844f
                                                        • Opcode Fuzzy Hash: 1f95cad513e82c5a83e725e1ff0ce8e8589f84d563ae12fbf539f77f147cdfe2
                                                        • Instruction Fuzzy Hash: 18D10131900246CACB289F68C885BFAB7B5FF05304F296199E941BF6D0D3799DC0CBA1
                                                        APIs
                                                          • Part of subcall function 00DF0242: EnterCriticalSection.KERNEL32(00EA070C,00EA1884,?,?,00DE198B,00EA2518,?,?,?,00DD12F9,00000000), ref: 00DF024D
                                                          • Part of subcall function 00DF0242: LeaveCriticalSection.KERNEL32(00EA070C,?,00DE198B,00EA2518,?,?,?,00DD12F9,00000000), ref: 00DF028A
                                                          • Part of subcall function 00DF00A3: __onexit.LIBCMT ref: 00DF00A9
                                                        • __Init_thread_footer.LIBCMT ref: 00E56238
                                                          • Part of subcall function 00DF01F8: EnterCriticalSection.KERNEL32(00EA070C,?,?,00DE8747,00EA2514), ref: 00DF0202
                                                          • Part of subcall function 00DF01F8: LeaveCriticalSection.KERNEL32(00EA070C,?,00DE8747,00EA2514), ref: 00DF0235
                                                          • Part of subcall function 00E4359C: LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 00E435E4
                                                          • Part of subcall function 00E4359C: LoadStringW.USER32(00EA2390,?,00000FFF,?), ref: 00E4360A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeaveLoadString$Init_thread_footer__onexit
                                                        • String ID: x#$x#$x#
                                                        • API String ID: 1072379062-1894725482
                                                        • Opcode ID: 9ee201c7f3619d813abcdbd8c2de736fb58bb2009832ffb9758f4aa1cc7e83de
                                                        • Instruction ID: edf34a1ac63725b1d53d0835d00cfe2a0f4f1f366cfb6c3f272d905267a301a0
                                                        • Opcode Fuzzy Hash: 9ee201c7f3619d813abcdbd8c2de736fb58bb2009832ffb9758f4aa1cc7e83de
                                                        • Instruction Fuzzy Hash: 84C1A271A00205AFCB14DF98C891DBEB7B9FF49304F508429FA55AB251DB70ED48CBA0
                                                        APIs
                                                          • Part of subcall function 00E3B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00E321D0,?,?,00000034,00000800,?,00000034), ref: 00E3B42D
                                                        • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00E32760
                                                          • Part of subcall function 00E3B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00E321FF,?,?,00000800,?,00001073,00000000,?,?), ref: 00E3B3F8
                                                          • Part of subcall function 00E3B32A: GetWindowThreadProcessId.USER32(?,?), ref: 00E3B355
                                                          • Part of subcall function 00E3B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00E32194,00000034,?,?,00001004,00000000,00000000), ref: 00E3B365
                                                          • Part of subcall function 00E3B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00E32194,00000034,?,?,00001004,00000000,00000000), ref: 00E3B37B
                                                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00E327CD
                                                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00E3281A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                        • String ID: @
                                                        • API String ID: 4150878124-2766056989
                                                        • Opcode ID: 0810f0733542b45199b1513d183bbd10660e963c742ff83e2eb8cc00306beac9
                                                        • Instruction ID: ace79a21ecb727d33c7eb8cc692c55aced4b11fe13d0d07230d2996f96588f84
                                                        • Opcode Fuzzy Hash: 0810f0733542b45199b1513d183bbd10660e963c742ff83e2eb8cc00306beac9
                                                        • Instruction Fuzzy Hash: 43411C76900218BFDB10DFA4CD45AEEBBB8EF09704F105099FA95B7181DBB06E45CBA1
                                                        APIs
                                                        • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\file.exe,00000104), ref: 00E01769
                                                        • _free.LIBCMT ref: 00E01834
                                                        • _free.LIBCMT ref: 00E0183E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: _free$FileModuleName
                                                        • String ID: C:\Users\user\Desktop\file.exe
                                                        • API String ID: 2506810119-3587028468
                                                        • Opcode ID: 9e79a7d23717e70a6c4c8989abd135499c0693e2ecfa34d2a8c96db5398b89b2
                                                        • Instruction ID: 641d986675b38e6465c5aea00033800a50e0e2a4c2b761f5986350b501b68287
                                                        • Opcode Fuzzy Hash: 9e79a7d23717e70a6c4c8989abd135499c0693e2ecfa34d2a8c96db5398b89b2
                                                        • Instruction Fuzzy Hash: 87319375A00258AFCB21DF999885D9EBBFCEB8A314F1451A6F504FB251D6709E80CBA0
                                                        APIs
                                                        • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00E3C306
                                                        • DeleteMenu.USER32(?,00000007,00000000), ref: 00E3C34C
                                                        • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00EA1990,016B5F00), ref: 00E3C395
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Menu$Delete$InfoItem
                                                        • String ID: 0
                                                        • API String ID: 135850232-4108050209
                                                        • Opcode ID: ae1101eda18a88c0b1a2fa29675d3a99d8b8f101391c5d19f54059d5feeb9996
                                                        • Instruction ID: 1eed0dc0ece5cf28635b59ee1fea54e5cd15d6bdd9f8a2115fa1a8e0b2505d43
                                                        • Opcode Fuzzy Hash: ae1101eda18a88c0b1a2fa29675d3a99d8b8f101391c5d19f54059d5feeb9996
                                                        • Instruction Fuzzy Hash: D2419F712043019FD720DF25D888B6ABBE4EF85314F20966DF9A5B72D1D771E904CB62
                                                        APIs
                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00E6CC08,00000000,?,?,?,?), ref: 00E644AA
                                                        • GetWindowLongW.USER32 ref: 00E644C7
                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00E644D7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Window$Long
                                                        • String ID: SysTreeView32
                                                        • API String ID: 847901565-1698111956
                                                        • Opcode ID: 4b3cf0c1d2f86ad998c8726c12abe30cbf41b2d0c7e44979a5436e9652bf2aa6
                                                        • Instruction ID: 9a57f9247c479385aa3dfa329ad1faa6cd46b50d2e4e25898e9c29e917355339
                                                        • Opcode Fuzzy Hash: 4b3cf0c1d2f86ad998c8726c12abe30cbf41b2d0c7e44979a5436e9652bf2aa6
                                                        • Instruction Fuzzy Hash: BB319071250205AFDF219E38EC46BEB7BA9EB093B8F205715F975A21D0DB70EC509760
                                                        APIs
                                                        • SysReAllocString.OLEAUT32(?,?), ref: 00E36EED
                                                        • VariantCopyInd.OLEAUT32(?,?), ref: 00E36F08
                                                        • VariantClear.OLEAUT32(?), ref: 00E36F12
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Variant$AllocClearCopyString
                                                        • String ID: *j
                                                        • API String ID: 2173805711-1845181700
                                                        • Opcode ID: 2d86e608f9111e895ee3d7e7221728523cacf5a3e32052ba71f84ea3dd55d386
                                                        • Instruction ID: 2e89e47617bf2e5293d46a72ee9626181f3b2fdad02da8932235cd5ae7a4db24
                                                        • Opcode Fuzzy Hash: 2d86e608f9111e895ee3d7e7221728523cacf5a3e32052ba71f84ea3dd55d386
                                                        • Instruction Fuzzy Hash: D931B372704245EFCB04AFB5E8549BE3B76EF84304F10449AF9066B3A1CB309912DBB0
                                                        APIs
                                                          • Part of subcall function 00E5335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00E53077,?,?), ref: 00E53378
                                                        • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00E5307A
                                                        • _wcslen.LIBCMT ref: 00E5309B
                                                        • htons.WSOCK32(00000000,?,?,00000000), ref: 00E53106
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                        • String ID: 255.255.255.255
                                                        • API String ID: 946324512-2422070025
                                                        • Opcode ID: 590c729de5e274fa569ba79049f5feb385869a5ba2bd7e06d9baa88b536ac43c
                                                        • Instruction ID: 15f7fea0c4a083f40f32798b29d3ec79b51886997308b3466b7517fd14962eae
                                                        • Opcode Fuzzy Hash: 590c729de5e274fa569ba79049f5feb385869a5ba2bd7e06d9baa88b536ac43c
                                                        • Instruction Fuzzy Hash: F731C4352003059FCB20CF39C585EAAB7E0EF54399F249859ED15AB392D772EE49C760
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00E63F40
                                                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00E63F54
                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00E63F78
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window
                                                        • String ID: SysMonthCal32
                                                        • API String ID: 2326795674-1439706946
                                                        • Opcode ID: 6816aea8c63ecbcf1610c26eff3568b7ba5bca18ef418e71027d914d5b19cec5
                                                        • Instruction ID: 38ea900eaf4d4fdf165b3f5ea46eb9a440a427ee0a3f23216579f470cb2acf9f
                                                        • Opcode Fuzzy Hash: 6816aea8c63ecbcf1610c26eff3568b7ba5bca18ef418e71027d914d5b19cec5
                                                        • Instruction Fuzzy Hash: E821BF32640219BFDF258F60DC46FEA3BB9EB48768F111214FA557B1D0D6B1A854CBA0
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00E64705
                                                        • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00E64713
                                                        • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00E6471A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$DestroyWindow
                                                        • String ID: msctls_updown32
                                                        • API String ID: 4014797782-2298589950
                                                        • Opcode ID: db67be93cdc0b99d1715e03a87289996c7ca6ea02ef7b8e8e657eba5f7cf150b
                                                        • Instruction ID: b7a0f93180753e19df208b3c15af9fb1930b1e42c7e68a9725a19f309141b476
                                                        • Opcode Fuzzy Hash: db67be93cdc0b99d1715e03a87289996c7ca6ea02ef7b8e8e657eba5f7cf150b
                                                        • Instruction Fuzzy Hash: 9E2151F5641209AFDB10DF64EC91DBB37ADEF5A398B14105AF600A7291C770FC51CA61
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: _wcslen
                                                        • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                        • API String ID: 176396367-2734436370
                                                        • Opcode ID: 524a8d3db7a382e3eb0cf37bc431a6e78095cf8434c9e7d7326b11c5d8a55c08
                                                        • Instruction ID: 4cff54db492985c975227c075c3a5b2d148529608162422926c810a0316de7c2
                                                        • Opcode Fuzzy Hash: 524a8d3db7a382e3eb0cf37bc431a6e78095cf8434c9e7d7326b11c5d8a55c08
                                                        • Instruction Fuzzy Hash: 8E215B7224561066C331AB24AC0BFB77BE8DF51314F54902AF94AB7183EBD1AD81C2B5
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00E63840
                                                        • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00E63850
                                                        • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00E63876
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$MoveWindow
                                                        • String ID: Listbox
                                                        • API String ID: 3315199576-2633736733
                                                        • Opcode ID: 5896a39ce2975df62a92f34c1ff1fae2feacf3df1eb6ea4ee221339410597345
                                                        • Instruction ID: a8184ee4dd867586c8c181a67b0601defce3d1430747c1b5c02bb662665ea6f4
                                                        • Opcode Fuzzy Hash: 5896a39ce2975df62a92f34c1ff1fae2feacf3df1eb6ea4ee221339410597345
                                                        • Instruction Fuzzy Hash: 2421B072650218BFEF218F65EC41EFB376AEF89794F109115F950AB190C6B1EC5187A0
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 00E44A08
                                                        • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00E44A5C
                                                        • SetErrorMode.KERNEL32(00000000,?,?,00E6CC08), ref: 00E44AD0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$InformationVolume
                                                        • String ID: %lu
                                                        • API String ID: 2507767853-685833217
                                                        • Opcode ID: e182dd9eba9314cc9f2a192b1357e537ecde88c97edfcf9f3494feafed994a61
                                                        • Instruction ID: e067b8f2f54866ae0996977c9a92842e549394efb46d1a047e8054c5d37f35c7
                                                        • Opcode Fuzzy Hash: e182dd9eba9314cc9f2a192b1357e537ecde88c97edfcf9f3494feafed994a61
                                                        • Instruction Fuzzy Hash: 5D312F75A00109AFDB10DF54D885EAABBF8EF09308F144095E905EB262DB71ED45CB71
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00E6424F
                                                        • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00E64264
                                                        • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00E64271
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: msctls_trackbar32
                                                        • API String ID: 3850602802-1010561917
                                                        • Opcode ID: e8041307c6e41ec4d4f8bd7ca062c9584a3fdceb754301cf8d01909f42866df7
                                                        • Instruction ID: 386dc441b5f12988abc9fe0751b31da7b5f617fbe84a5e7e839974a7b70b5346
                                                        • Opcode Fuzzy Hash: e8041307c6e41ec4d4f8bd7ca062c9584a3fdceb754301cf8d01909f42866df7
                                                        • Instruction Fuzzy Hash: 3E11E371280208BEEF205E69DC46FAB3BACEF85BA8F111114FA55F20E0D2B1D8519B20
                                                        APIs
                                                          • Part of subcall function 00DD6B57: _wcslen.LIBCMT ref: 00DD6B6A
                                                          • Part of subcall function 00E32DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00E32DC5
                                                          • Part of subcall function 00E32DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00E32DD6
                                                          • Part of subcall function 00E32DA7: GetCurrentThreadId.KERNEL32 ref: 00E32DDD
                                                          • Part of subcall function 00E32DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00E32DE4
                                                        • GetFocus.USER32 ref: 00E32F78
                                                          • Part of subcall function 00E32DEE: GetParent.USER32(00000000), ref: 00E32DF9
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00E32FC3
                                                        • EnumChildWindows.USER32(?,00E3303B), ref: 00E32FEB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                        • String ID: %s%d
                                                        • API String ID: 1272988791-1110647743
                                                        • Opcode ID: da142dfccdca40e5ca3b84b674b66dbf5193e72572f3c09333a6d3906c648fa9
                                                        • Instruction ID: 0b7a49c71596da07e826e32f8ec4ce12c4fa8fb5580a0552cd5d9575dabce976
                                                        • Opcode Fuzzy Hash: da142dfccdca40e5ca3b84b674b66dbf5193e72572f3c09333a6d3906c648fa9
                                                        • Instruction Fuzzy Hash: C611C0712002056BCF147F709C89EEE7BAAEF94314F04507AF909BB252DE709949CB70
                                                        APIs
                                                        • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00E658C1
                                                        • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00E658EE
                                                        • DrawMenuBar.USER32(?), ref: 00E658FD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Menu$InfoItem$Draw
                                                        • String ID: 0
                                                        • API String ID: 3227129158-4108050209
                                                        • Opcode ID: 280d6fd7e401a1043a050dd7db41ff4cf8b9591534db8ecf89628e73cb608102
                                                        • Instruction ID: 33bbba9d5051fcfe098ec63bc80e4b953f8a4f0c93f6d0700d7a5071f5b79990
                                                        • Opcode Fuzzy Hash: 280d6fd7e401a1043a050dd7db41ff4cf8b9591534db8ecf89628e73cb608102
                                                        • Instruction Fuzzy Hash: F6016132600258EFDB219F12EC44BAFBBB4FB457A4F108099F859E6151DB709A84DF31
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5420ca64a41fa0c8e7fe611a46ecf3ac824d617f0ba8759b6297d2f9a92097c8
                                                        • Instruction ID: e02862725092172c84f4fa925f3469c132dd16497bc8930830d45ba7f6b54eb1
                                                        • Opcode Fuzzy Hash: 5420ca64a41fa0c8e7fe611a46ecf3ac824d617f0ba8759b6297d2f9a92097c8
                                                        • Instruction Fuzzy Hash: 30C14C75A0021AEFDB14CFA4C8A8EAEBBB5FF48704F209598E505EB251D731ED41CB90
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: __alldvrm$_strrchr
                                                        • String ID:
                                                        • API String ID: 1036877536-0
                                                        • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                        • Instruction ID: 5d37508c8280392df86a02d5c581b8274eb6f45f24f332520e83c0ea6e2ab79b
                                                        • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                        • Instruction Fuzzy Hash: BFA155F2A003869FDB25CF28C9817AEBBE5EF61354F1851ADE685BB2C1C23489C1C751
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInitInitializeUninitialize
                                                        • String ID:
                                                        • API String ID: 1998397398-0
                                                        • Opcode ID: f19c9f2b8fd775db9c730e64244249c0b2f6eaf02d3ae81b1f5ec48e56070d88
                                                        • Instruction ID: 28ecba14f5e7c986fe41bf604360baedd017f97e1575fd34279a406ea533a145
                                                        • Opcode Fuzzy Hash: f19c9f2b8fd775db9c730e64244249c0b2f6eaf02d3ae81b1f5ec48e56070d88
                                                        • Instruction Fuzzy Hash: 54A15B756042009FC710DF24C485A2AB7E5FF88355F14895EFD8AAB362DB70EE05CB62
                                                        APIs
                                                        • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00E6FC08,?), ref: 00E305F0
                                                        • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00E6FC08,?), ref: 00E30608
                                                        • CLSIDFromProgID.OLE32(?,?,00000000,00E6CC40,000000FF,?,00000000,00000800,00000000,?,00E6FC08,?), ref: 00E3062D
                                                        • _memcmp.LIBVCRUNTIME ref: 00E3064E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: FromProg$FreeTask_memcmp
                                                        • String ID:
                                                        • API String ID: 314563124-0
                                                        • Opcode ID: ca543a711a2699f978a37735862613ce728aa7b82e7a7c9d54eba241ec34d55d
                                                        • Instruction ID: 110c33eaecc7aba9c2cadce53e007779c561701ebb931600574bcc026b3b80fc
                                                        • Opcode Fuzzy Hash: ca543a711a2699f978a37735862613ce728aa7b82e7a7c9d54eba241ec34d55d
                                                        • Instruction Fuzzy Hash: B6811D71A00109EFCB14DF94C998DEEBBB9FF89315F204598E516BB250DB71AE06CB60
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: _free
                                                        • String ID:
                                                        • API String ID: 269201875-0
                                                        • Opcode ID: 3b624461b4b2cd097d8f98970b08d8103c298458dda50b2eeb524dd9a3a4421a
                                                        • Instruction ID: ef1c799ef2563376927759962e397c845545aa8210f1f147265ab6bb1aae9184
                                                        • Opcode Fuzzy Hash: 3b624461b4b2cd097d8f98970b08d8103c298458dda50b2eeb524dd9a3a4421a
                                                        • Instruction Fuzzy Hash: 53415B31600204ABDB216FF99C456FE3AE6EF41B70F2552A5F739F21D2E63448C19272
                                                        APIs
                                                        • GetWindowRect.USER32(?,?), ref: 00E662E2
                                                        • ScreenToClient.USER32(?,?), ref: 00E66315
                                                        • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00E66382
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Window$ClientMoveRectScreen
                                                        • String ID:
                                                        • API String ID: 3880355969-0
                                                        • Opcode ID: 18a7d8345373144c608757abe9982c479fdd355bd3971eabd3fb9e7b36b80f5a
                                                        • Instruction ID: d1e8ec80b336ada54a0fe9096d50266fac0d5d13f13fcf8427a9a91da8b6b51e
                                                        • Opcode Fuzzy Hash: 18a7d8345373144c608757abe9982c479fdd355bd3971eabd3fb9e7b36b80f5a
                                                        • Instruction Fuzzy Hash: F0512C74A50209AFCF10DF69E8809AE7BB5FB953A4F10915AF865AB2A0D730ED41CB50
                                                        APIs
                                                        • socket.WSOCK32(00000002,00000002,00000011), ref: 00E51AFD
                                                        • WSAGetLastError.WSOCK32 ref: 00E51B0B
                                                        • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00E51B8A
                                                        • WSAGetLastError.WSOCK32 ref: 00E51B94
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$socket
                                                        • String ID:
                                                        • API String ID: 1881357543-0
                                                        • Opcode ID: 6ba2be877e06af6ffe7229526f8a31b6f1a207cd34122a959f4ceb3fe9eb4912
                                                        • Instruction ID: dcfb0bd1b8d6e77560e1ecbbd49dda96021e0d9446c558a874953ea528f2c499
                                                        • Opcode Fuzzy Hash: 6ba2be877e06af6ffe7229526f8a31b6f1a207cd34122a959f4ceb3fe9eb4912
                                                        • Instruction Fuzzy Hash: E641B334600200AFE720AF24D886F6677E5EF48718F549489F95A9F3D2D7B2ED41CBA0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 59de1c3268e1cec57a3d7fbc21621d948258118f9bd859e51badb6370d7b90d1
                                                        • Instruction ID: 2476473a0fa0a1501a3fa03a17b5599fc7165a456deb07259d37ce874713bf32
                                                        • Opcode Fuzzy Hash: 59de1c3268e1cec57a3d7fbc21621d948258118f9bd859e51badb6370d7b90d1
                                                        • Instruction Fuzzy Hash: 4641F771A00304AFD7249F78CC41BAABBE9FB88710F10956AF155FB2C1E7719A818790
                                                        APIs
                                                        • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00E45783
                                                        • GetLastError.KERNEL32(?,00000000), ref: 00E457A9
                                                        • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00E457CE
                                                        • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00E457FA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: CreateHardLink$DeleteErrorFileLast
                                                        • String ID:
                                                        • API String ID: 3321077145-0
                                                        • Opcode ID: 33ee3f61b00db9d8d77e240531aad86ba4fe4cf4dfb875091cb305c83c614ded
                                                        • Instruction ID: 3c6d3753d936cf59e0f7f2022267758191edbd79fd1d7dfa05845847ad2a43d4
                                                        • Opcode Fuzzy Hash: 33ee3f61b00db9d8d77e240531aad86ba4fe4cf4dfb875091cb305c83c614ded
                                                        • Instruction Fuzzy Hash: 20414E35600A11DFCB11DF15D444A5EBBE2EF89724B198499EC4AAB362DB30FD00CBA1
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,00DF6D71,00000000,00000000,00DF82D9,?,00DF82D9,?,00000001,00DF6D71,8BE85006,00000001,00DF82D9,00DF82D9), ref: 00E0D910
                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00E0D999
                                                        • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00E0D9AB
                                                        • __freea.LIBCMT ref: 00E0D9B4
                                                          • Part of subcall function 00E03820: RtlAllocateHeap.NTDLL(00000000,?,00EA1444,?,00DEFDF5,?,?,00DDA976,00000010,00EA1440,00DD13FC,?,00DD13C6,?,00DD1129), ref: 00E03852
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                        • String ID:
                                                        • API String ID: 2652629310-0
                                                        • Opcode ID: c74ae9f29f85b2f37517a250e3e39474ebac569d0f212968dca2c0e4b761fe08
                                                        • Instruction ID: 4b6ea1bf8d94351345e2c52154ad1ae9dac9ff4b774a16136c6b263765f0e111
                                                        • Opcode Fuzzy Hash: c74ae9f29f85b2f37517a250e3e39474ebac569d0f212968dca2c0e4b761fe08
                                                        • Instruction Fuzzy Hash: 8E31A072A0020AABDB249FA5DC41EBF7BA5EB81324B154169FC04E7190E775CD94CBA0
                                                        APIs
                                                        • SendMessageW.USER32(?,00001024,00000000,?), ref: 00E65352
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00E65375
                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00E65382
                                                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00E653A8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: LongWindow$InvalidateMessageRectSend
                                                        • String ID:
                                                        • API String ID: 3340791633-0
                                                        • Opcode ID: 23a52098b5d77ee09d8ad8a84e7581f663fa0c240e0d9b54d346a40bcfe96534
                                                        • Instruction ID: 6518e6cf1cfb8844707d301569837b4d4607262648a5003eab4afd90f61775d8
                                                        • Opcode Fuzzy Hash: 23a52098b5d77ee09d8ad8a84e7581f663fa0c240e0d9b54d346a40bcfe96534
                                                        • Instruction Fuzzy Hash: D531F036BD5A08EFEB309F14EC05BE93761AB05BD4F586102FA10B63E5C3B0A9409B52
                                                        APIs
                                                        • GetKeyboardState.USER32(?,76C1C0D0,?,00008000), ref: 00E3ABF1
                                                        • SetKeyboardState.USER32(00000080,?,00008000), ref: 00E3AC0D
                                                        • PostMessageW.USER32(00000000,00000101,00000000), ref: 00E3AC74
                                                        • SendInput.USER32(00000001,?,0000001C,76C1C0D0,?,00008000), ref: 00E3ACC6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: KeyboardState$InputMessagePostSend
                                                        • String ID:
                                                        • API String ID: 432972143-0
                                                        • Opcode ID: a545359064c7d5091871bd3148765d67e6c0b26c66e6dfcce579d52619fde959
                                                        • Instruction ID: b5af855e3eea756fe5be7556bdabcfc1fe6dba055af9cb628cf67520f18b8c65
                                                        • Opcode Fuzzy Hash: a545359064c7d5091871bd3148765d67e6c0b26c66e6dfcce579d52619fde959
                                                        • Instruction Fuzzy Hash: FE310330A04218AFEB358B65880C7FAFEA5AB89714F0C722AE4C1B21D1C3758DC5C752
                                                        APIs
                                                        • ClientToScreen.USER32(?,?), ref: 00E6769A
                                                        • GetWindowRect.USER32(?,?), ref: 00E67710
                                                        • PtInRect.USER32(?,?,00E68B89), ref: 00E67720
                                                        • MessageBeep.USER32(00000000), ref: 00E6778C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Rect$BeepClientMessageScreenWindow
                                                        • String ID:
                                                        • API String ID: 1352109105-0
                                                        • Opcode ID: d8ffc9a20fa38c128ef8f06f011536d13fb4ba1d1f567680dcb2224c49a02dd2
                                                        • Instruction ID: a9762d45f77381a79bee761057e74c4cbf9979be19b94ccfa6fbb2d9e322af7b
                                                        • Opcode Fuzzy Hash: d8ffc9a20fa38c128ef8f06f011536d13fb4ba1d1f567680dcb2224c49a02dd2
                                                        • Instruction Fuzzy Hash: B541EE34649204DFDB01CF59E894EAA77F0FF49399F1490AAE894AB261D730F945CF90
                                                        APIs
                                                        • GetForegroundWindow.USER32 ref: 00E616EB
                                                          • Part of subcall function 00E33A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00E33A57
                                                          • Part of subcall function 00E33A3D: GetCurrentThreadId.KERNEL32 ref: 00E33A5E
                                                          • Part of subcall function 00E33A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00E325B3), ref: 00E33A65
                                                        • GetCaretPos.USER32(?), ref: 00E616FF
                                                        • ClientToScreen.USER32(00000000,?), ref: 00E6174C
                                                        • GetForegroundWindow.USER32 ref: 00E61752
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                        • String ID:
                                                        • API String ID: 2759813231-0
                                                        • Opcode ID: 4d120a2cd1220405b2ad02924d87721ed2352c10834e3883794690252b7515a5
                                                        • Instruction ID: 80867ced846f9695eac5227f0fb5049c97a209f835b8cd5e30347a0e299486ab
                                                        • Opcode Fuzzy Hash: 4d120a2cd1220405b2ad02924d87721ed2352c10834e3883794690252b7515a5
                                                        • Instruction Fuzzy Hash: 9F313071D00149AFC700DFAAD881CAEBBF9EF89304B5490AAE455E7351E631AE45CBA0
                                                        APIs
                                                        • CreateToolhelp32Snapshot.KERNEL32 ref: 00E3D501
                                                        • Process32FirstW.KERNEL32(00000000,?), ref: 00E3D50F
                                                        • Process32NextW.KERNEL32(00000000,?), ref: 00E3D52F
                                                        • CloseHandle.KERNEL32(00000000), ref: 00E3D5DC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                        • String ID:
                                                        • API String ID: 420147892-0
                                                        • Opcode ID: f750c9a1d5e50984110c02318638adb3ba3d103d1494dcd1f25e1f7b5c0fe66b
                                                        • Instruction ID: c57f297a8d86dc2fe11a54e26402a6f3605963b8dc55b211ee6b094c4267d24a
                                                        • Opcode Fuzzy Hash: f750c9a1d5e50984110c02318638adb3ba3d103d1494dcd1f25e1f7b5c0fe66b
                                                        • Instruction Fuzzy Hash: B531AF71108300AFD300EF54EC95AAFBBF8EF99344F14092DF581922A1EB719948CBA2
                                                        APIs
                                                          • Part of subcall function 00DE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DE9BB2
                                                        • GetCursorPos.USER32(?), ref: 00E69001
                                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00E27711,?,?,?,?,?), ref: 00E69016
                                                        • GetCursorPos.USER32(?), ref: 00E6905E
                                                        • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00E27711,?,?,?), ref: 00E69094
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                        • String ID:
                                                        • API String ID: 2864067406-0
                                                        • Opcode ID: 17424afa79b09d4ee656cc71d6671206fa05e861455aa42eb4e2f2382699a551
                                                        • Instruction ID: 8b3fe0306762e7c50572778bb0bbbfa88c8572193b64da32b3b3ba4465bb4415
                                                        • Opcode Fuzzy Hash: 17424afa79b09d4ee656cc71d6671206fa05e861455aa42eb4e2f2382699a551
                                                        • Instruction Fuzzy Hash: AB21D335601018EFCF558F95EC58EFB7BB9EF8A3A0F104055F50567262C375A950DB60
                                                        APIs
                                                        • GetFileAttributesW.KERNEL32(?,00E6CB68), ref: 00E3D2FB
                                                        • GetLastError.KERNEL32 ref: 00E3D30A
                                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 00E3D319
                                                        • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00E6CB68), ref: 00E3D376
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: CreateDirectory$AttributesErrorFileLast
                                                        • String ID:
                                                        • API String ID: 2267087916-0
                                                        • Opcode ID: 4fb66e5a8da5b5ec6a45899ed52d7108b8f92492a26cb1670c04674fcabeed8a
                                                        • Instruction ID: dadb430918fc87913a8f63512723b8ef3d663872e15702223ad3996c38bb02c0
                                                        • Opcode Fuzzy Hash: 4fb66e5a8da5b5ec6a45899ed52d7108b8f92492a26cb1670c04674fcabeed8a
                                                        • Instruction Fuzzy Hash: A62180705092019F8310DF24E8854AEBBE4EF56768F205A1EF499E32A1D7319D49CBA3
                                                        APIs
                                                          • Part of subcall function 00E31014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00E3102A
                                                          • Part of subcall function 00E31014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00E31036
                                                          • Part of subcall function 00E31014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00E31045
                                                          • Part of subcall function 00E31014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00E3104C
                                                          • Part of subcall function 00E31014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00E31062
                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00E315BE
                                                        • _memcmp.LIBVCRUNTIME ref: 00E315E1
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E31617
                                                        • HeapFree.KERNEL32(00000000), ref: 00E3161E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                        • String ID:
                                                        • API String ID: 1592001646-0
                                                        • Opcode ID: 37f288c3723766a3d88bdc549ac27e7b8f861f2b59ce98303fb5e0adeab5a096
                                                        • Instruction ID: 0cc2a53fb01507471d71bb4ba5e931cecf6210525f67e2ad2ca94464a286da12
                                                        • Opcode Fuzzy Hash: 37f288c3723766a3d88bdc549ac27e7b8f861f2b59ce98303fb5e0adeab5a096
                                                        • Instruction Fuzzy Hash: 6E218E31E00109EFDF00DFA5C949BEEBBB8EF44348F194499E441B7241D770AA45CB60
                                                        APIs
                                                        • GetWindowLongW.USER32(?,000000EC), ref: 00E6280A
                                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00E62824
                                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00E62832
                                                        • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00E62840
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Window$Long$AttributesLayered
                                                        • String ID:
                                                        • API String ID: 2169480361-0
                                                        • Opcode ID: a53a158cd0a201e3802d0702e3703e64dcdf6740048d0a875f63ed3ac0f37472
                                                        • Instruction ID: dbf93d1d746b337dcde8761bb5c470a7daae175b17bd72b7b94cdfdba21d8170
                                                        • Opcode Fuzzy Hash: a53a158cd0a201e3802d0702e3703e64dcdf6740048d0a875f63ed3ac0f37472
                                                        • Instruction Fuzzy Hash: C2212131244911AFD7149B24EC40FAA7B95EF85368F24810DF5269B2E2C7B1FC42C7E0
                                                        APIs
                                                          • Part of subcall function 00E38D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00E3790A,?,000000FF,?,00E38754,00000000,?,0000001C,?,?), ref: 00E38D8C
                                                          • Part of subcall function 00E38D7D: lstrcpyW.KERNEL32(00000000,?,?,00E3790A,?,000000FF,?,00E38754,00000000,?,0000001C,?,?,00000000), ref: 00E38DB2
                                                          • Part of subcall function 00E38D7D: lstrcmpiW.KERNEL32(00000000,?,00E3790A,?,000000FF,?,00E38754,00000000,?,0000001C,?,?), ref: 00E38DE3
                                                        • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00E38754,00000000,?,0000001C,?,?,00000000), ref: 00E37923
                                                        • lstrcpyW.KERNEL32(00000000,?,?,00E38754,00000000,?,0000001C,?,?,00000000), ref: 00E37949
                                                        • lstrcmpiW.KERNEL32(00000002,cdecl,?,00E38754,00000000,?,0000001C,?,?,00000000), ref: 00E37984
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: lstrcmpilstrcpylstrlen
                                                        • String ID: cdecl
                                                        • API String ID: 4031866154-3896280584
                                                        • Opcode ID: acefa329ee7d16a76a1bd94dbbcb86982216b7a35235b8e3da6ced136db30660
                                                        • Instruction ID: cecb1aa8b736ace2ecef82cba9614048ead8abe574ec6014c0222bb3e63a97b7
                                                        • Opcode Fuzzy Hash: acefa329ee7d16a76a1bd94dbbcb86982216b7a35235b8e3da6ced136db30660
                                                        • Instruction Fuzzy Hash: 6311067A200341AFCB256F35D848E7B7BA9FF85394F50512AF982D7264EB719801C761
                                                        APIs
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00E67D0B
                                                        • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00E67D2A
                                                        • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00E67D42
                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00E4B7AD,00000000), ref: 00E67D6B
                                                          • Part of subcall function 00DE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DE9BB2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Window$Long
                                                        • String ID:
                                                        • API String ID: 847901565-0
                                                        • Opcode ID: 71514c1b5337d13bd1336cdb6c3474f865e4ce94a0171538a0765d045e213ae3
                                                        • Instruction ID: c4f687366ebcfbf9e393b7ea3bf200bde60a2e6db6e5190cc0cff08ec7c1a111
                                                        • Opcode Fuzzy Hash: 71514c1b5337d13bd1336cdb6c3474f865e4ce94a0171538a0765d045e213ae3
                                                        • Instruction Fuzzy Hash: BB11D5312446149FCB109F29EC04ABA3BA4AF4A3E8F215724F875E71F0E7309954CB50
                                                        APIs
                                                        • SendMessageW.USER32(?,00001060,?,00000004), ref: 00E656BB
                                                        • _wcslen.LIBCMT ref: 00E656CD
                                                        • _wcslen.LIBCMT ref: 00E656D8
                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00E65816
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: MessageSend_wcslen
                                                        • String ID:
                                                        • API String ID: 455545452-0
                                                        • Opcode ID: d57f2620c771c47eb4df88c90ff469b0eaf8c0d58189033e26f8df128f99c0e7
                                                        • Instruction ID: cac4f7e4d56dfe7e72fb95b83fcb8c2f414e9e2ad5c8d916b2d52b7482fc288a
                                                        • Opcode Fuzzy Hash: d57f2620c771c47eb4df88c90ff469b0eaf8c0d58189033e26f8df128f99c0e7
                                                        • Instruction Fuzzy Hash: CD110A7274060896DB209F61EC85AFE37ACEF017E8F10506AF926F6081DBB0D944CF60
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c256eac8038e42ad795390125bcd7a450fa8a1de96f85aaf4b9bc651be8672c1
                                                        • Instruction ID: ac1a19b182318aad20a6a807ad23b928ff66e3461c86398022c1a2dee7fd7c28
                                                        • Opcode Fuzzy Hash: c256eac8038e42ad795390125bcd7a450fa8a1de96f85aaf4b9bc651be8672c1
                                                        • Instruction Fuzzy Hash: 2401D6B220A7163EF61126B87CC0F67665CDF823B9F302369F621751D2EB608C805170
                                                        APIs
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00E31A47
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00E31A59
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00E31A6F
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00E31A8A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID:
                                                        • API String ID: 3850602802-0
                                                        • Opcode ID: 5657c8c397a4c7b78d8c3569c395c9a87a52c5c820163128d6ebdd1c553f7d2d
                                                        • Instruction ID: 595551e6fad07830261a58a59b107ac7d59a591d34e3ac5c6e0121a626599eba
                                                        • Opcode Fuzzy Hash: 5657c8c397a4c7b78d8c3569c395c9a87a52c5c820163128d6ebdd1c553f7d2d
                                                        • Instruction Fuzzy Hash: 9211093AD01219FFEB11DBA5CD85FADBB78EB08754F200095EA04B7290D6716E50DB94
                                                        APIs
                                                        • GetCurrentThreadId.KERNEL32 ref: 00E3E1FD
                                                        • MessageBoxW.USER32(?,?,?,?), ref: 00E3E230
                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00E3E246
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00E3E24D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                        • String ID:
                                                        • API String ID: 2880819207-0
                                                        • Opcode ID: b6dac0a6023729367c4a1e6cafc5f75e013970ee8bbae15a65fb0227bb89c710
                                                        • Instruction ID: f371c81899f62a1cf9ac9c5f465de2ee41979e0145c9ddda7dcfe37d156887c4
                                                        • Opcode Fuzzy Hash: b6dac0a6023729367c4a1e6cafc5f75e013970ee8bbae15a65fb0227bb89c710
                                                        • Instruction Fuzzy Hash: 7A110872904254BFCB019FA9AC09AAF7FAD9B46324F114255F914F33D1D2B0DD0887A0
                                                        APIs
                                                        • CreateThread.KERNEL32(00000000,?,00DFCFF9,00000000,00000004,00000000), ref: 00DFD218
                                                        • GetLastError.KERNEL32 ref: 00DFD224
                                                        • __dosmaperr.LIBCMT ref: 00DFD22B
                                                        • ResumeThread.KERNEL32(00000000), ref: 00DFD249
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                        • String ID:
                                                        • API String ID: 173952441-0
                                                        • Opcode ID: e0e9c290cd033aa8f0aa07dfe5c461ac208bf80b08a7e600fb8e40f8823e7058
                                                        • Instruction ID: a810e98ffcb7f46bde31fbeb4614db2ee9ed171e3bf8b40bfe87f2a0d13f0878
                                                        • Opcode Fuzzy Hash: e0e9c290cd033aa8f0aa07dfe5c461ac208bf80b08a7e600fb8e40f8823e7058
                                                        • Instruction Fuzzy Hash: 2B01043240520C7FCB115BA6DC09ABB7A6BDF82330F268219FA24A61D0CB71C945C6B0
                                                        APIs
                                                          • Part of subcall function 00DE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00DE9BB2
                                                        • GetClientRect.USER32(?,?), ref: 00E69F31
                                                        • GetCursorPos.USER32(?), ref: 00E69F3B
                                                        • ScreenToClient.USER32(?,?), ref: 00E69F46
                                                        • DefDlgProcW.USER32(?,00000020,?,00000000,?,?,?), ref: 00E69F7A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Client$CursorLongProcRectScreenWindow
                                                        • String ID:
                                                        • API String ID: 4127811313-0
                                                        • Opcode ID: e26b5fd6c55f9264eb092d6dc2679c5c971761d995bceaec43eb098103da33f2
                                                        • Instruction ID: 7de8f9e6afbefa7bda596fd5bf6dbdf5e82a6a3938677518490ce30aa4353648
                                                        • Opcode Fuzzy Hash: e26b5fd6c55f9264eb092d6dc2679c5c971761d995bceaec43eb098103da33f2
                                                        • Instruction Fuzzy Hash: 34115532A0011AABCB009FA9E8899FE77BCEB45391F100451F802F3042C370BA85CBA1
                                                        APIs
                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00DD604C
                                                        • GetStockObject.GDI32(00000011), ref: 00DD6060
                                                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 00DD606A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: CreateMessageObjectSendStockWindow
                                                        • String ID:
                                                        • API String ID: 3970641297-0
                                                        • Opcode ID: d766379d5635c31b62e2a675145d66157d3eba50b2de5e234845a1cec18cc903
                                                        • Instruction ID: 3d908c26d6c229ac7a68827a02e66760dc5ac4a7efaf07a24aa79150a2fd8e70
                                                        • Opcode Fuzzy Hash: d766379d5635c31b62e2a675145d66157d3eba50b2de5e234845a1cec18cc903
                                                        • Instruction Fuzzy Hash: 3B118B72101509BFEF125FA49C44EFBBB69EF093A4F140206FA1462210C772EC60DBA0
                                                        APIs
                                                        • ___BuildCatchObject.LIBVCRUNTIME ref: 00DF3B56
                                                          • Part of subcall function 00DF3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00DF3AD2
                                                          • Part of subcall function 00DF3AA3: ___AdjustPointer.LIBCMT ref: 00DF3AED
                                                        • _UnwindNestedFrames.LIBCMT ref: 00DF3B6B
                                                        • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00DF3B7C
                                                        • CallCatchBlock.LIBVCRUNTIME ref: 00DF3BA4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                        • String ID:
                                                        • API String ID: 737400349-0
                                                        • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                        • Instruction ID: 126f7fcaed881fd3290680acf82d144ddc2f027765b38ea8e4b3426649488a8c
                                                        • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                        • Instruction Fuzzy Hash: 0B01D73210014DBBDF125E95CC46EFB7B69EF98754F068015FE4866121C632E9619BB0
                                                        APIs
                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00DD13C6,00000000,00000000,?,00E0301A,00DD13C6,00000000,00000000,00000000,?,00E0328B,00000006,FlsSetValue), ref: 00E030A5
                                                        • GetLastError.KERNEL32(?,00E0301A,00DD13C6,00000000,00000000,00000000,?,00E0328B,00000006,FlsSetValue,00E72290,FlsSetValue,00000000,00000364,?,00E02E46), ref: 00E030B1
                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00E0301A,00DD13C6,00000000,00000000,00000000,?,00E0328B,00000006,FlsSetValue,00E72290,FlsSetValue,00000000), ref: 00E030BF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad$ErrorLast
                                                        • String ID:
                                                        • API String ID: 3177248105-0
                                                        • Opcode ID: 5775e29c85a57be4d19b5d0a17316fd15cf4b9a26d668639f2f625b807c7b067
                                                        • Instruction ID: aa102d759fc2d040c82b38593e1d0a4a278ac7c8e94f7188f27da61a0d6b1afc
                                                        • Opcode Fuzzy Hash: 5775e29c85a57be4d19b5d0a17316fd15cf4b9a26d668639f2f625b807c7b067
                                                        • Instruction Fuzzy Hash: E5012B32313622AFCB314B7AAC44A677B9CAF05BA5B214621F945F31D0D721D985C6E0
                                                        APIs
                                                        • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 00E3747F
                                                        • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00E37497
                                                        • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00E374AC
                                                        • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00E374CA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Type$Register$FileLoadModuleNameUser
                                                        • String ID:
                                                        • API String ID: 1352324309-0
                                                        • Opcode ID: db225bdc7d5176cc226416f25df6609b531c0c11e846b90c626d8295c6b2f9cb
                                                        • Instruction ID: 93d294eb442eb72f24aad14471a9eb058e1cca93e595f225384199670e0ef80b
                                                        • Opcode Fuzzy Hash: db225bdc7d5176cc226416f25df6609b531c0c11e846b90c626d8295c6b2f9cb
                                                        • Instruction Fuzzy Hash: E2117CB12053109FE7308F55EC0CBA27FF8EB40B44F108569A6A6E6151D7B0F908DB50
                                                        APIs
                                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00E3ACD3,?,00008000), ref: 00E3B0C4
                                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00E3ACD3,?,00008000), ref: 00E3B0E9
                                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00E3ACD3,?,00008000), ref: 00E3B0F3
                                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00E3ACD3,?,00008000), ref: 00E3B126
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: CounterPerformanceQuerySleep
                                                        • String ID:
                                                        • API String ID: 2875609808-0
                                                        • Opcode ID: 0aa05e14d15f449eac3f6d5c1978f4ca0d80738490a7b43bfc574a3c6ed2f604
                                                        • Instruction ID: 1b70ac8c9a9bce743e4e781612fc6f45ef3e72075c462eb3eb434c065a3dd59b
                                                        • Opcode Fuzzy Hash: 0aa05e14d15f449eac3f6d5c1978f4ca0d80738490a7b43bfc574a3c6ed2f604
                                                        • Instruction Fuzzy Hash: 7D113931C0252CEBCF04AFA5E9686FEBF78FF4A711F105086DA82B6185CB709654CB61
                                                        APIs
                                                        • GetWindowRect.USER32(?,?), ref: 00E67E33
                                                        • ScreenToClient.USER32(?,?), ref: 00E67E4B
                                                        • ScreenToClient.USER32(?,?), ref: 00E67E6F
                                                        • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00E67E8A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ClientRectScreen$InvalidateWindow
                                                        • String ID:
                                                        • API String ID: 357397906-0
                                                        • Opcode ID: c83a1c4bcd1c53f11afd8bc4a07c3af4c22129c760057dec22a5c644616a6c5f
                                                        • Instruction ID: 8a83a8794125000468b5c580f2a6181832e060632d8da8dedc36ec310baf8c0a
                                                        • Opcode Fuzzy Hash: c83a1c4bcd1c53f11afd8bc4a07c3af4c22129c760057dec22a5c644616a6c5f
                                                        • Instruction Fuzzy Hash: 651186B9D0020AAFDB41CFA9D8849EEBBF5FF08354F505066E951E3210D775AA54CF50
                                                        APIs
                                                        • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00E32DC5
                                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00E32DD6
                                                        • GetCurrentThreadId.KERNEL32 ref: 00E32DDD
                                                        • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00E32DE4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                        • String ID:
                                                        • API String ID: 2710830443-0
                                                        • Opcode ID: df7810bf92dcbb1cb7dbd906e433407bc144388826af6f03e0910958cf0f15c0
                                                        • Instruction ID: a7f672368efbba5cbd2844bf041ecceb3c3124c9b6e573d8cdfafb75253117d6
                                                        • Opcode Fuzzy Hash: df7810bf92dcbb1cb7dbd906e433407bc144388826af6f03e0910958cf0f15c0
                                                        • Instruction Fuzzy Hash: 33E06D711022247BDB202B63EC0DEFB7E6CEF82FA1F501019F246F10809AE18884C6B0
                                                        APIs
                                                          • Part of subcall function 00DE9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00DE9693
                                                          • Part of subcall function 00DE9639: SelectObject.GDI32(?,00000000), ref: 00DE96A2
                                                          • Part of subcall function 00DE9639: BeginPath.GDI32(?), ref: 00DE96B9
                                                          • Part of subcall function 00DE9639: SelectObject.GDI32(?,00000000), ref: 00DE96E2
                                                        • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00E68887
                                                        • LineTo.GDI32(?,?,?), ref: 00E68894
                                                        • EndPath.GDI32(?), ref: 00E688A4
                                                        • StrokePath.GDI32(?), ref: 00E688B2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                        • String ID:
                                                        • API String ID: 1539411459-0
                                                        • Opcode ID: d27e5cecb3267e62c8d63e7f15b5c6549184b828abcbf2db83ca337c4c98834e
                                                        • Instruction ID: 7a5eaf5338890d61a7ceae8bb9b52ae2811ff08fe540460869ef0f8175974e09
                                                        • Opcode Fuzzy Hash: d27e5cecb3267e62c8d63e7f15b5c6549184b828abcbf2db83ca337c4c98834e
                                                        • Instruction Fuzzy Hash: 92F09A36042258BADB126F96AC09FDB3E29AF0A390F508140FA21710E1C7B41518CBA5
                                                        APIs
                                                        • GetSysColor.USER32(00000008), ref: 00DE98CC
                                                        • SetTextColor.GDI32(?,?), ref: 00DE98D6
                                                        • SetBkMode.GDI32(?,00000001), ref: 00DE98E9
                                                        • GetStockObject.GDI32(00000005), ref: 00DE98F1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Color$ModeObjectStockText
                                                        • String ID:
                                                        • API String ID: 4037423528-0
                                                        • Opcode ID: 4a5433f5fac47cdf4cfcf8f88a8e22ad84f777af5c3b790c5c4e77277704ccb4
                                                        • Instruction ID: 2ed9fad24a3a1cb12ff52886bc65458b4f1fd81ad69c004de98fe6ca1ae95461
                                                        • Opcode Fuzzy Hash: 4a5433f5fac47cdf4cfcf8f88a8e22ad84f777af5c3b790c5c4e77277704ccb4
                                                        • Instruction Fuzzy Hash: F4E06531245280AEDB216B75BC0DBEA7F21AB12376F148219F6FA640E1C3B146549B11
                                                        APIs
                                                        • GetCurrentThread.KERNEL32 ref: 00E31634
                                                        • OpenThreadToken.ADVAPI32(00000000,?,?,?,00E311D9), ref: 00E3163B
                                                        • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00E311D9), ref: 00E31648
                                                        • OpenProcessToken.ADVAPI32(00000000,?,?,?,00E311D9), ref: 00E3164F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: CurrentOpenProcessThreadToken
                                                        • String ID:
                                                        • API String ID: 3974789173-0
                                                        • Opcode ID: a542cb414db871a45bc5269ec209b43bf907805d724b8bb3e060c2159891c549
                                                        • Instruction ID: c62c40513c69c9155d6113bedce33baf252cb14ae7c74872e8a317209abfd7d2
                                                        • Opcode Fuzzy Hash: a542cb414db871a45bc5269ec209b43bf907805d724b8bb3e060c2159891c549
                                                        • Instruction Fuzzy Hash: FCE04F31601211AFD7601BE2AD0DB673B78AF547D5F24484CF685E9090E6A44449C750
                                                        APIs
                                                        • GetDesktopWindow.USER32 ref: 00E2D858
                                                        • GetDC.USER32(00000000), ref: 00E2D862
                                                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00E2D882
                                                        • ReleaseDC.USER32(?), ref: 00E2D8A3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: CapsDesktopDeviceReleaseWindow
                                                        • String ID:
                                                        • API String ID: 2889604237-0
                                                        • Opcode ID: 790a15fae8c739c6ea226cf112d50f846d09f2be14a39549fd00941a40ab0582
                                                        • Instruction ID: c9dfbcba3b9cda49afe28d11ace7b388318c4b01b530c37d3c2a654b6f77fce5
                                                        • Opcode Fuzzy Hash: 790a15fae8c739c6ea226cf112d50f846d09f2be14a39549fd00941a40ab0582
                                                        • Instruction Fuzzy Hash: 19E01275800205DFCB419FA1E80867EBBB1FB08750F249005E886F7250C77455059F54
                                                        APIs
                                                        • GetDesktopWindow.USER32 ref: 00E2D86C
                                                        • GetDC.USER32(00000000), ref: 00E2D876
                                                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00E2D882
                                                        • ReleaseDC.USER32(?), ref: 00E2D8A3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: CapsDesktopDeviceReleaseWindow
                                                        • String ID:
                                                        • API String ID: 2889604237-0
                                                        • Opcode ID: 2b9e373055a828ace3b2a8c8204d86948e67fdf8bdd5189f507ba957ab46c800
                                                        • Instruction ID: 960ef16eda3f99c4685f99e00e08a3bca1ce9d46ab7ea90a1c75ebdc9ba00972
                                                        • Opcode Fuzzy Hash: 2b9e373055a828ace3b2a8c8204d86948e67fdf8bdd5189f507ba957ab46c800
                                                        • Instruction Fuzzy Hash: F6E01A70800200DFCB50AFA2E80866EBBB1FB08750F249009E88AF7250CBB859069F54
                                                        APIs
                                                          • Part of subcall function 00DD7620: _wcslen.LIBCMT ref: 00DD7625
                                                        • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00E44ED4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Connection_wcslen
                                                        • String ID: *$LPT
                                                        • API String ID: 1725874428-3443410124
                                                        • Opcode ID: 5fcdbaed480c238d14b078dbb36578ab4ed283401023e72d5ef657a6a8a4c87b
                                                        • Instruction ID: c6078934e0b01da408e7aedfe664cfccfbcd4049caff15210b99f42c5809298c
                                                        • Opcode Fuzzy Hash: 5fcdbaed480c238d14b078dbb36578ab4ed283401023e72d5ef657a6a8a4c87b
                                                        • Instruction Fuzzy Hash: 019140B5B002449FDB14DF54D484EA9BBF1EF44308F199099E806AF3A2D735ED45CB61
                                                        APIs
                                                        • __startOneArgErrorHandling.LIBCMT ref: 00DFE30D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ErrorHandling__start
                                                        • String ID: pow
                                                        • API String ID: 3213639722-2276729525
                                                        • Opcode ID: ea5984def0df3be01c9e46dd30339c40bda672b06d2840e029c0580e674d3ed2
                                                        • Instruction ID: 041951d05c615f33a364098c01d65e550a4ab6d79b6c8048fdb96759ecb7b9ed
                                                        • Opcode Fuzzy Hash: ea5984def0df3be01c9e46dd30339c40bda672b06d2840e029c0580e674d3ed2
                                                        • Instruction Fuzzy Hash: D351DF60E0D2069ACB15B714CD0537A3BE4EB40741F38D99CE1D5A22F9EB309CD69A56
                                                        APIs
                                                        • CharUpperBuffW.USER32(00E2569E,00000000,?,00E6CC08,?,00000000,00000000), ref: 00E578DD
                                                          • Part of subcall function 00DD6B57: _wcslen.LIBCMT ref: 00DD6B6A
                                                        • CharUpperBuffW.USER32(00E2569E,00000000,?,00E6CC08,00000000,?,00000000,00000000), ref: 00E5783B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: BuffCharUpper$_wcslen
                                                        • String ID: <s
                                                        • API String ID: 3544283678-2940880691
                                                        • Opcode ID: d4a516b26214dcba24493292a48f8629c9ca3a7b2f05b1708c307bc3c289059a
                                                        • Instruction ID: e6f28e8245b42a3f7fc153ee3982761f04d2c8767828cef84027b2dbb2f8f15c
                                                        • Opcode Fuzzy Hash: d4a516b26214dcba24493292a48f8629c9ca3a7b2f05b1708c307bc3c289059a
                                                        • Instruction Fuzzy Hash: 92616F72914128AACF04EBA4EC91DFDB378FF14705B545526F982B3191EF30AA19CBB0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: #
                                                        • API String ID: 0-1885708031
                                                        • Opcode ID: d83852046ae3476c2961e2e1d4c95a8d69fdba3bff26258987e4320cfaab52c4
                                                        • Instruction ID: 2cb44e26b2c5e4f23b32c3e1a898f7896d2aa32376e9be37b9348678c2c2ddcf
                                                        • Opcode Fuzzy Hash: d83852046ae3476c2961e2e1d4c95a8d69fdba3bff26258987e4320cfaab52c4
                                                        • Instruction Fuzzy Hash: A15134356002A6DFDB18EF69D4816FA7BA8EF15314F245056E891AB3C0D6309D42CBB4
                                                        APIs
                                                        • Sleep.KERNEL32(00000000), ref: 00DEF2A2
                                                        • GlobalMemoryStatusEx.KERNEL32(?), ref: 00DEF2BB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: GlobalMemorySleepStatus
                                                        • String ID: @
                                                        • API String ID: 2783356886-2766056989
                                                        • Opcode ID: c6a9f62d8658b10eca53eb3a54d0d54ac556b4bdab4b31ea80834701eb9e8112
                                                        • Instruction ID: b50cfc15f9d9822f78800d089651e0076b4f1906a120b5b420568f7cfaf43df3
                                                        • Opcode Fuzzy Hash: c6a9f62d8658b10eca53eb3a54d0d54ac556b4bdab4b31ea80834701eb9e8112
                                                        • Instruction Fuzzy Hash: C65137714187459BD320AF11DC86BABBBF8FF84300F81885EF1D9912A5EB709529CB76
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 00E557E0
                                                        • _wcslen.LIBCMT ref: 00E557EC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: BuffCharUpper_wcslen
                                                        • String ID: CALLARGARRAY
                                                        • API String ID: 157775604-1150593374
                                                        • Opcode ID: c2212df9f3f7ef1897311043f44b9fba216f6a3f165a3dd41fdc87d1ef5c81f7
                                                        • Instruction ID: 223b9e3b05ce91eeb9cae23e86b41d4772a9e7d7ab5a7b8fa43c145405581e4c
                                                        • Opcode Fuzzy Hash: c2212df9f3f7ef1897311043f44b9fba216f6a3f165a3dd41fdc87d1ef5c81f7
                                                        • Instruction Fuzzy Hash: A441B032A002099FCB08DFA9C8929BEBBF5EF59325F10542DE805B7251E7719D85CBA0
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 00E4D130
                                                        • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00E4D13A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: CrackInternet_wcslen
                                                        • String ID: |
                                                        • API String ID: 596671847-2343686810
                                                        • Opcode ID: 09c01e281507190997a73c4e42721677e1c740ce2bb902a0b6234b4534bc9db5
                                                        • Instruction ID: f6bfbd79900d2e8fed3e2da956b70fed4f3aa5e51a5b61334f013d02dae99595
                                                        • Opcode Fuzzy Hash: 09c01e281507190997a73c4e42721677e1c740ce2bb902a0b6234b4534bc9db5
                                                        • Instruction Fuzzy Hash: 23314C75D01209ABCF11EFA4DC85AEEBFB9FF04304F00401AF815B6265D731AA06DBA0
                                                        APIs
                                                        • DestroyWindow.USER32(?,?,?,?), ref: 00E63621
                                                        • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00E6365C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Window$DestroyMove
                                                        • String ID: static
                                                        • API String ID: 2139405536-2160076837
                                                        • Opcode ID: cd77add220ee1ebec5eabed875843b93131dd3b88afb7291846849c628ffbdf4
                                                        • Instruction ID: 1838863dbbeada6dc7a2d7c17acb52ee7474a175cbd95e4d0df96eff935f9c1c
                                                        • Opcode Fuzzy Hash: cd77add220ee1ebec5eabed875843b93131dd3b88afb7291846849c628ffbdf4
                                                        • Instruction Fuzzy Hash: F3319271150204AEDB24DF74EC40EFB73A9FF58794F10A619F9A5A7290DA70AD81C760
                                                        APIs
                                                        • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 00E6461F
                                                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00E64634
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: '
                                                        • API String ID: 3850602802-1997036262
                                                        • Opcode ID: 9d434685266c5d9f7077539501d193661093bda431983a6017bb724cd172975b
                                                        • Instruction ID: b4ee59cc89d9845949f56efc9db20bb5cab32b5d21eb0754acc1de8e99e15d0d
                                                        • Opcode Fuzzy Hash: 9d434685266c5d9f7077539501d193661093bda431983a6017bb724cd172975b
                                                        • Instruction Fuzzy Hash: CA3138B4A4120A9FDF14CFA9D980BDE7BB5FF49344F10506AE905AB381D770A941CF90
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00E6327C
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00E63287
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: Combobox
                                                        • API String ID: 3850602802-2096851135
                                                        • Opcode ID: 363dc0d8d0bce7011e682667817044924f5b2d9eae97cf951742ad2cb62f1076
                                                        • Instruction ID: 176e414b275182fe6eec1271d63b589959f3afe18fa43c8cd46866f920024e16
                                                        • Opcode Fuzzy Hash: 363dc0d8d0bce7011e682667817044924f5b2d9eae97cf951742ad2cb62f1076
                                                        • Instruction Fuzzy Hash: 2A11E6713402087FFF259E64EC90EBB379BEB543E8F101124F514B72A0D6719D518760
                                                        APIs
                                                          • Part of subcall function 00DD600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00DD604C
                                                          • Part of subcall function 00DD600E: GetStockObject.GDI32(00000011), ref: 00DD6060
                                                          • Part of subcall function 00DD600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00DD606A
                                                        • GetWindowRect.USER32(00000000,?), ref: 00E6377A
                                                        • GetSysColor.USER32(00000012), ref: 00E63794
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                        • String ID: static
                                                        • API String ID: 1983116058-2160076837
                                                        • Opcode ID: 36e2a08f578ec1fbb2d0a096abeaaf48f60146ed9bd9a30939101087e1048919
                                                        • Instruction ID: 1bb553b8c879d9945cdb1b5d45e0e79572c978b44527de81cab13ff2467bf535
                                                        • Opcode Fuzzy Hash: 36e2a08f578ec1fbb2d0a096abeaaf48f60146ed9bd9a30939101087e1048919
                                                        • Instruction Fuzzy Hash: B91159B2650209AFDB00DFB8DC45AFA7BB8EB08384F005925F956E2250D775E8509B60
                                                        APIs
                                                        • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00E4CD7D
                                                        • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00E4CDA6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Internet$OpenOption
                                                        • String ID: <local>
                                                        • API String ID: 942729171-4266983199
                                                        • Opcode ID: 090ac730dd5eeae843beca5adb441b0b4621da90e477744704c129ba464cd170
                                                        • Instruction ID: 232cb41e2247d97d812b4b601a5720ebcc391cde7be71e66f70baa7b96b94216
                                                        • Opcode Fuzzy Hash: 090ac730dd5eeae843beca5adb441b0b4621da90e477744704c129ba464cd170
                                                        • Instruction Fuzzy Hash: 3A110671A026317AD7784B66AC44EF3BE6CEF127A8F205226B109A3080D3709841D6F0
                                                        APIs
                                                        • GetWindowTextLengthW.USER32(00000000), ref: 00E634AB
                                                        • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00E634BA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: LengthMessageSendTextWindow
                                                        • String ID: edit
                                                        • API String ID: 2978978980-2167791130
                                                        • Opcode ID: 881d628fdc7500b0bbac40d1f04c459d88b322efcafd052a9d8b24dfdec12dfb
                                                        • Instruction ID: 05f45fcabc9281ab8006c1165f4a40ed8489a1089adc9b66c2b5e50629524146
                                                        • Opcode Fuzzy Hash: 881d628fdc7500b0bbac40d1f04c459d88b322efcafd052a9d8b24dfdec12dfb
                                                        • Instruction Fuzzy Hash: BD116D71140208AEEB114E75EC44AFB776AEB157B8F606324F971A31E0CB71DC559760
                                                        APIs
                                                          • Part of subcall function 00DD9CB3: _wcslen.LIBCMT ref: 00DD9CBD
                                                        • CharUpperBuffW.USER32(?,?,?), ref: 00E36CB6
                                                        • _wcslen.LIBCMT ref: 00E36CC2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$BuffCharUpper
                                                        • String ID: STOP
                                                        • API String ID: 1256254125-2411985666
                                                        • Opcode ID: 8d17d2d60082c30549f68d3ff24c636b956bdc0049a4305fa2f5cc859a089a82
                                                        • Instruction ID: f43d0dfbcf797cb4f9b08417fbf2368365f4db7ab11a6ed19a713d4059099a06
                                                        • Opcode Fuzzy Hash: 8d17d2d60082c30549f68d3ff24c636b956bdc0049a4305fa2f5cc859a089a82
                                                        • Instruction Fuzzy Hash: D20108327005269ACB10AFBDDC449BFBBB4EF60718B506929E452B6191EB31D800C760
                                                        APIs
                                                          • Part of subcall function 00DD9CB3: _wcslen.LIBCMT ref: 00DD9CBD
                                                          • Part of subcall function 00E33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00E33CCA
                                                        • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00E31D4C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameSend_wcslen
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 624084870-1403004172
                                                        • Opcode ID: 0ddfc78ce07332c08fc6187b4066d44b684acb5240fdb495d074edec46b25732
                                                        • Instruction ID: 14288c4372aec1af2895ef282b079d4708fd2976eddc8255bda2e407309d35d4
                                                        • Opcode Fuzzy Hash: 0ddfc78ce07332c08fc6187b4066d44b684acb5240fdb495d074edec46b25732
                                                        • Instruction Fuzzy Hash: 6F012871600214AB8B04EBA4DC19CFEBBA8EB07390F40151EF832773C1EA315908C770
                                                        APIs
                                                          • Part of subcall function 00DD9CB3: _wcslen.LIBCMT ref: 00DD9CBD
                                                          • Part of subcall function 00E33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00E33CCA
                                                        • SendMessageW.USER32(?,00000180,00000000,?), ref: 00E31C46
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameSend_wcslen
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 624084870-1403004172
                                                        • Opcode ID: 8d9c5f026d146238cad1671735b684ec4b9a57f157012a1d3a753da7f0e116d3
                                                        • Instruction ID: 963d84b8a827aab4203247dcdd4e9d980dea68003cd6101dadcdef59ac2f10f9
                                                        • Opcode Fuzzy Hash: 8d9c5f026d146238cad1671735b684ec4b9a57f157012a1d3a753da7f0e116d3
                                                        • Instruction Fuzzy Hash: A801F7B17802046ACF08EBA1C965EFFFBA8DB11340F10201AB40673281EA219E08C7B1
                                                        APIs
                                                          • Part of subcall function 00DD9CB3: _wcslen.LIBCMT ref: 00DD9CBD
                                                          • Part of subcall function 00E33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00E33CCA
                                                        • SendMessageW.USER32(?,00000182,?,00000000), ref: 00E31CC8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameSend_wcslen
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 624084870-1403004172
                                                        • Opcode ID: ef80902f13c3576b054832945d4bea18663e69722246ad902f2cb3555b7ba641
                                                        • Instruction ID: a522c053276e1782e4a521f55bbb14a86739efd22a717d2ce932734222d906f0
                                                        • Opcode Fuzzy Hash: ef80902f13c3576b054832945d4bea18663e69722246ad902f2cb3555b7ba641
                                                        • Instruction Fuzzy Hash: 5701D6B178021867CF18EBA4CA15EFFFBE89B11740F14301AB80273281EA619F18D672
                                                        APIs
                                                        • __Init_thread_footer.LIBCMT ref: 00DEA529
                                                          • Part of subcall function 00DD9CB3: _wcslen.LIBCMT ref: 00DD9CBD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Init_thread_footer_wcslen
                                                        • String ID: ,%$3y
                                                        • API String ID: 2551934079-4248191106
                                                        • Opcode ID: aa7184671937ae9550fac68d5be8c91ae5bbc86642678be8bf6311de785803f5
                                                        • Instruction ID: 79e46fc30c8723fdb980bb9bd147174f303ae0f14e3d8b29af00f8eafbc82869
                                                        • Opcode Fuzzy Hash: aa7184671937ae9550fac68d5be8c91ae5bbc86642678be8bf6311de785803f5
                                                        • Instruction Fuzzy Hash: 43017631B002658BC600F3AEEC5BAAC7354DB4A710F404429F6123B2C3EE10BD0186B7
                                                        APIs
                                                          • Part of subcall function 00DD9CB3: _wcslen.LIBCMT ref: 00DD9CBD
                                                          • Part of subcall function 00E33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00E33CCA
                                                        • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00E31DD3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameSend_wcslen
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 624084870-1403004172
                                                        • Opcode ID: 7a2bc45ea53b085cd07caf0bb6a4f3ec60ed0ffc153e07d826485c442e4b13ad
                                                        • Instruction ID: 770f9a5450534b05e550434139614febad82f0e428ac43c986e9b7d3950c968b
                                                        • Opcode Fuzzy Hash: 7a2bc45ea53b085cd07caf0bb6a4f3ec60ed0ffc153e07d826485c442e4b13ad
                                                        • Instruction Fuzzy Hash: E5F0A471B5121466DB14E7A4DC66EFFBBA8EF02754F44291AF822732C1EA615908C271
                                                        APIs
                                                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00EA3018,00EA305C), ref: 00E681BF
                                                        • CloseHandle.KERNEL32 ref: 00E681D1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: CloseCreateHandleProcess
                                                        • String ID: \0
                                                        • API String ID: 3712363035-3218720685
                                                        • Opcode ID: f5a4755af21c0c36a27617d7699e55b4c44f65a74bc867d8c9e47561a51ced03
                                                        • Instruction ID: abc217725b39ea251a46e3f69cc6dc6567024a47c3227d844ce36c420cddc407
                                                        • Opcode Fuzzy Hash: f5a4755af21c0c36a27617d7699e55b4c44f65a74bc867d8c9e47561a51ced03
                                                        • Instruction Fuzzy Hash: 77F054F1640304BEE21067726C86F777A5CDB0A750F014465FB48F51A2D675AE0482B4
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: _wcslen
                                                        • String ID: 3, 3, 16, 1
                                                        • API String ID: 176396367-3042988571
                                                        • Opcode ID: 1bab9974235f43168ec55b739d198e2899895ea8a4b5f0d53adcdb43d17dac14
                                                        • Instruction ID: 5f4054121ad0916d35b358d532ada8f17e7ad31479d4e07cb39bb68303e8e4a6
                                                        • Opcode Fuzzy Hash: 1bab9974235f43168ec55b739d198e2899895ea8a4b5f0d53adcdb43d17dac14
                                                        • Instruction Fuzzy Hash: 02E02B023143201092311279BCC197F5A89CFC57617142C2FFED5E2266EAD48DA593B0
                                                        APIs
                                                        • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00E30B23
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Message
                                                        • String ID: AutoIt$Error allocating memory.
                                                        • API String ID: 2030045667-4017498283
                                                        • Opcode ID: dd24db14414bbcb41a25524a84c2f1fefbd54f06241e26e4476e58783212aa0f
                                                        • Instruction ID: b435b5e2ca87c3824470381acac16f8ce564d85ab73164cde0f6416d8f484bcd
                                                        • Opcode Fuzzy Hash: dd24db14414bbcb41a25524a84c2f1fefbd54f06241e26e4476e58783212aa0f
                                                        • Instruction Fuzzy Hash: 21E04F322843583AD31537957C07F9ABA84CF05FA5F20542BFB98B55C38AE2649056F9
                                                        APIs
                                                          • Part of subcall function 00DEF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00DF0D71,?,?,?,00DD100A), ref: 00DEF7CE
                                                        • IsDebuggerPresent.KERNEL32(?,?,?,00DD100A), ref: 00DF0D75
                                                        • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00DD100A), ref: 00DF0D84
                                                        Strings
                                                        • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00DF0D7F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                        • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                        • API String ID: 55579361-631824599
                                                        • Opcode ID: 60b415802e952e65a8219695920e0e0c7585b4d6479937108eaa19fabb4b4333
                                                        • Instruction ID: 16ce9797588d9bf7072280962db698cf1625177c67629dcb302e9b790a9cb514
                                                        • Opcode Fuzzy Hash: 60b415802e952e65a8219695920e0e0c7585b4d6479937108eaa19fabb4b4333
                                                        • Instruction Fuzzy Hash: A7E06D742007518FD720AFB9F8083667FE4AB14785F05C92DE986D7A62DBB1E4488BB1
                                                        APIs
                                                        • __Init_thread_footer.LIBCMT ref: 00DEE3D5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Init_thread_footer
                                                        • String ID: 0%$8%
                                                        • API String ID: 1385522511-2949748613
                                                        • Opcode ID: 795f7d1ce7aed5b8cd8670b8d02260ceb654066722f0d97e25b69475adc405bb
                                                        • Instruction ID: fdbb8a5758f087a556fa5c8a28a022d1cf2d36f850713197e98929d99b010b22
                                                        • Opcode Fuzzy Hash: 795f7d1ce7aed5b8cd8670b8d02260ceb654066722f0d97e25b69475adc405bb
                                                        • Instruction Fuzzy Hash: 92E02635C00A94CFC608B71EB875A983391FB4F322B10916DE302BB5D2DB313841867A
                                                        APIs
                                                        • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 00E4302F
                                                        • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00E43044
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: Temp$FileNamePath
                                                        • String ID: aut
                                                        • API String ID: 3285503233-3010740371
                                                        • Opcode ID: 5756c2a1185ae44a6372183ab4e4cebf9bb5124d1e9f4010a899e7da61cc511a
                                                        • Instruction ID: 6576670e101f5095b827373eb11de51d0f7393b9cc3ee4bd8618bb76ec058554
                                                        • Opcode Fuzzy Hash: 5756c2a1185ae44a6372183ab4e4cebf9bb5124d1e9f4010a899e7da61cc511a
                                                        • Instruction Fuzzy Hash: CAD05B71500314ABDA209795EC0DFD73A6CD704750F000152BA95F20A1DAF49544CAD0
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: LocalTime
                                                        • String ID: %.3d$X64
                                                        • API String ID: 481472006-1077770165
                                                        • Opcode ID: 78f7a239cca7707a07e8bce6d26f5dfe6d763f350e0e9aa11c1badd7fe127581
                                                        • Instruction ID: a9702de3e43e843e9a9be8557ff59a4372b901cfcf8dffdd2b2720ff82c14ca4
                                                        • Opcode Fuzzy Hash: 78f7a239cca7707a07e8bce6d26f5dfe6d763f350e0e9aa11c1badd7fe127581
                                                        • Instruction Fuzzy Hash: 90D0126280C128E9CB50A7E1EC458FAB37CFB08341F609452FA46B1050E624C508A771
                                                        APIs
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00E6236C
                                                        • PostMessageW.USER32(00000000), ref: 00E62373
                                                          • Part of subcall function 00E3E97B: Sleep.KERNEL32 ref: 00E3E9F3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: FindMessagePostSleepWindow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 529655941-2988720461
                                                        • Opcode ID: 1c15337ce0ed08fa2c8f4ec216609d927dbc5ee1f91378bb5502356d21207872
                                                        • Instruction ID: f491f6870c2fe6e673ce0ddeb18976aef400a7147f9ad175f7ec0cbf7ab4a0b9
                                                        • Opcode Fuzzy Hash: 1c15337ce0ed08fa2c8f4ec216609d927dbc5ee1f91378bb5502356d21207872
                                                        • Instruction Fuzzy Hash: 64D0C9323813107BEA64B771EC0FFDB6A549B44B50F105916B696BA1E0C9E0A805CA59
                                                        APIs
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00E6232C
                                                        • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00E6233F
                                                          • Part of subcall function 00E3E97B: Sleep.KERNEL32 ref: 00E3E9F3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: FindMessagePostSleepWindow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 529655941-2988720461
                                                        • Opcode ID: 74768dbe026c2694968c8c3242c29b8c3ce58f12cac7dbc512934e87a4ad92a8
                                                        • Instruction ID: 37a4e792889ce7c2fc142b9ca2e0a37f636410f1198d604fa2a7ea031e759d25
                                                        • Opcode Fuzzy Hash: 74768dbe026c2694968c8c3242c29b8c3ce58f12cac7dbc512934e87a4ad92a8
                                                        • Instruction Fuzzy Hash: E1D0C936394310BBEA64B771EC0FFDB6A549B44B50F105916B696BA1E0C9E0A805CA54
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 00E0BE93
                                                        • GetLastError.KERNEL32 ref: 00E0BEA1
                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00E0BEFC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1448577406.0000000000DD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DD0000, based on PE: true
                                                        • Associated: 00000000.00000002.1448562088.0000000000DD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448627269.0000000000E92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448681442.0000000000E9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1448701713.0000000000EA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_dd0000_file.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$ErrorLast
                                                        • String ID:
                                                        • API String ID: 1717984340-0
                                                        • Opcode ID: da6c6fbb4ebe005fe78033ff34e356dcfa0fa496e46c9dc0a99291063dc0d109
                                                        • Instruction ID: 309511f986a2e45fb7ba566e9611f0bf3b998cd794a936b842798b3c6f8b0158
                                                        • Opcode Fuzzy Hash: da6c6fbb4ebe005fe78033ff34e356dcfa0fa496e46c9dc0a99291063dc0d109
                                                        • Instruction Fuzzy Hash: F141D33470120BAFCB218F65DC44ABA7BA8FF42764F255169FA59B71E1DB308D81CB60